Home / CSE MCQs / OS MCQs :: Security - Operating System

CSE MCQs :: OS MCQs

  1. What is used to protect network from outside internet access ?
  2. A.
    A trusted antivirus
    B.
    24 hours scanning for virus
    C.
    Firewall to separate trusted and untrusted network
    D.
    Deny users access to websites which can potentially cause security leak.

  3. What is best practice in firewall domain environment ?
  4. A.
    Create two domain trusted and untrusted domain
    B.
    Create strong policy in firewall to support different types of users
    C.
    Create one Demiliatarized zone
    D.
    Create two DMZ zones with one untrusted domain

  5. Which direction access cannot happen using DMZ zone by default ?
  6. A.
    Company computer to DMZ
    B.
    Internet to DMZ
    C.
    Internet to company computer
    D.
    Company computer to internet

  7. How do viruses avoid basic pattern matchof antivirus ?
  8. A.
    They are encrypted
    B.
    They act with special permissions
    C.
    They modify themselves
    D.
    None of the mentioned

  9. What is known as sandbox ?
  10. A.
    It is a program which can be molded to do desired task.
    B.
    It is program that is controlled or emulated section of OS
    C.
    It is a special mode of antivirus
    D.
    None of the mentioned

  11. What is major drawback of anomaly detection IDS ?
  12. A.
    These are very slow at detection
    B.
    It generates many false alarms
    C.
    It doesnt detect novel attacks
    D.
    None of these

  13. What is preferred way of encryption ?
  14. A.
    pre shared secret key
    B.
    Using key distribution center (KDC)
    C.
    public key-encryption
    D.
    symmetric key

  15. What is not a role of encryption ?
  16. A.
    It is used to protect data from unauthorized access during transmission
    B.
    It is used to ensure user authentication
    C.
    It is used to ensure data integrity
    D.
    It is used to ensure data corruption doesn't happens

  17. What is cipher-block chaining ?
  18. A.
    Data is logically 'ANDed' with previous block
    B.
    Data is logically 'ORed' with previous block
    C.
    Data is logically 'XORed' with previous block
    D.
    none of the mentioned

  19. What is not an encryption standard ?
  20. A.
    AES
    B.
    TES
    C.
    Triple DES
    D.
    DES