1. Protection in an operating system refers to:
A) Preventing system crashes
B) Controlling access to system resources
C) Increasing system speed
D) Managing memory allocation
B) Controlling access to system resources
2. Security in operating systems primarily deals with:
A) CPU utilization
B) Memory management
C) Preventing unauthorized access
D) Disk scheduling
C) Preventing unauthorized access
3. Which of the following is a security violation?
A) Unauthorized reading of data
B) Unauthorized modification of data
C) Unauthorized destruction of data
D) All of the above
D) All of the above
4. The principle of least privilege states that:
A) Users should have maximum privileges
B) Users should have minimum privileges required
C) All users should have equal privileges
D) Privileges should not be changed
B) Users should have minimum privileges required
5. A protection domain is:
A) Set of users
B) Set of access rights
C) Set of objects and rights
D) Set of programs
C) Set of objects and rights
6. Which mechanism specifies who can access an object and how?
A) Authentication
B) Encryption
C) Access control
D) Firewall
C) Access control
7. An access control matrix represents:
A) Users vs passwords
B) Subjects vs objects with access rights
C) Files vs memory blocks
D) Processes vs CPU time
B) Subjects vs objects with access rights
8. Access control lists (ACLs) are associated with:
A) Subjects
B) Objects
C) Processes
D) Domains
B) Objects
9. Capability lists are associated with:
A) Objects
B) Subjects
C) Memory blocks
D) Files only
B) Subjects
10. Authentication is the process of:
A) Granting permissions
B) Verifying user identity
C) Encrypting data
D) Logging activity
B) Verifying user identity
11. Which of the following is NOT an authentication factor?
A) Something you know
B) Something you have
C) Something you are
D) Something you access
D) Something you access
12. Password-based authentication is vulnerable to:
A) Brute force attacks
B) Guessing
C) Dictionary attacks
D) All of the above
D) All of the above
13. Encryption is used to:
A) Compress data
B) Secure data from unauthorized access
C) Speed up data transfer
D) Manage memory
B) Secure data from unauthorized access
14. Which security attack involves disguising as a trusted entity?
A) Denial of Service
B) Masquerade attack
C) Replay attack
D) Man-in-the-middle
B) Masquerade attack
15. A Trojan horse is:
A) Self-replicating malware
B) Program with hidden malicious intent
C) Network flooding attack
D) Firewall mechanism
B) Program with hidden malicious intent
16. Which malware replicates itself automatically?
A) Virus
B) Trojan
C) Spyware
D) Rootkit
A) Virus
17. A worm differs from a virus because it:
A) Needs host program
B) Cannot spread
C) Spreads without user action
D) Is harmless
C) Spreads without user action
18. Which attack makes a system unavailable to legitimate users?
A) Spoofing
B) Replay
C) Denial of Service
D) Masquerade
C) Denial of Service
19. Which mechanism protects systems from external network attacks?
A) Encryption
B) Firewall
C) Authentication
D) Access control
B) Firewall
20. Intrusion detection systems are used to:
A) Prevent attacks completely
B) Detect suspicious activities
C) Encrypt network traffic
D) Schedule processes
B) Detect suspicious activities
21. Which of the following ensures data integrity?
A) Hashing
B) Encryption
C) Authentication
D) Authorization
A) Hashing
22. Which property ensures data is not altered?
A) Confidentiality
B) Availability
C) Integrity
D) Authentication
C) Integrity
23. Which property ensures data is accessible when needed?
A) Confidentiality
B) Integrity
C) Availability
D) Authentication
C) Availability
24. Which OS security goal ensures secrecy of data?
A) Integrity
B) Confidentiality
C) Availability
D) Authorization
B) Confidentiality
25. Which of the following best summarizes OS protection and security?
A) Only protection matters
B) Only security matters
C) Both aim to control and secure resource usage
D) Both are unrelated
C) Both aim to control and secure resource usage