Home / CSE MCQs / OS MCQs :: Security - Operating System

CSE MCQs :: OS MCQs

  1. Which happens first authorization or authentication ?
  2. A.
    Authorization
    B.
    Authentication
    C.
    Both are same
    D.
    None of the mentioned

  3. What is characteristics of Authorization ?
  4. A.
    RADIUS and RSA
    B.
    3 way handshaking with syn and fin.
    C.
    Multilayered protection for securing resources
    D.
    Deals with privileges and rights

  5. What forces the user to change password at first logon ?
  6. A.
    Default behavior of OS
    B.
    Part of AES encryption practice
    C.
    Devices being accessed forces the user
    D.
    Account administrator

  7. What is not a best practice for password policy ?
  8. A.
    Deciding maximum age of password
    B.
    Restriction on password reuse and history
    C.
    Password encryption
    D.
    Having change password every 2 years.

  9. What is breach of integrity ?
  10. A.
    This type of violation involves unauthorized reading of data
    B.
    This violation involves unauthorized modification of data.
    C.
    This violation involves unauthorized destruction of data
    D.
    This violation involves unauthorized use of resources

  11. What is breach of confidentiality ?
  12. A.
    This type of violation involves unauthorized reading of data
    B.
    This violation involves unauthorized modification of data.
    C.
    This violation involves unauthorized destruction of data
    D.
    This violation involves unauthorized use of resources

  13. What is theft of service ?
  14. A.
    This type of violation involves unauthorized reading of data
    B.
    This violation involves unauthorized modification of data.
    C.
    This violation involves unauthorized destruction of data
    D.
    This violation involves unauthorized use of resources

  15. What is breach of availability ?
  16. A.
    This type of violation involves unauthorized reading of data
    B.
    This violation involves unauthorized modification of data.
    C.
    This violation involves unauthorized destruction of data
    D.
    This violation involves unauthorized use of resources

  17. What is Trojan horse ?
  18. A.
    IT a useful way to encrypt password
    B.
    It is a user which steals valuable information
    C.
    It is a rogue program which tricks users
    D.
    It's a brute force attack algorithm.

  19. What is trap door ?
  20. A.
    IT is trap door in WarGames
    B.
    It is a hole in software left by designer.
    C.
    It is a Trojan horse
    D.
    It is a virus which traps and locks user terminal