A Learning Platform

SUCCESS

Success = Discipline + Consistency + Sacrifice.
Discipline - in what you do.
Consistency - in what you do.
Sacrifice - for what you do.

                   -- Manjunatha C. P. --

OPERATING SYSTEM MCQ SET 12

1. Protection in an operating system refers to:
A) Preventing system crashes
B) Controlling access to system resources
C) Increasing system speed
D) Managing memory allocation

B) Controlling access to system resources

2. Security in operating systems primarily deals with:
A) CPU utilization
B) Memory management
C) Preventing unauthorized access
D) Disk scheduling

C) Preventing unauthorized access

3. Which of the following is a security violation?
A) Unauthorized reading of data
B) Unauthorized modification of data
C) Unauthorized destruction of data
D) All of the above

D) All of the above

4. The principle of least privilege states that:
A) Users should have maximum privileges
B) Users should have minimum privileges required
C) All users should have equal privileges
D) Privileges should not be changed

B) Users should have minimum privileges required

5. A protection domain is:
A) Set of users
B) Set of access rights
C) Set of objects and rights
D) Set of programs

C) Set of objects and rights

6. Which mechanism specifies who can access an object and how?
A) Authentication
B) Encryption
C) Access control
D) Firewall

C) Access control

7. An access control matrix represents:
A) Users vs passwords
B) Subjects vs objects with access rights
C) Files vs memory blocks
D) Processes vs CPU time

B) Subjects vs objects with access rights

8. Access control lists (ACLs) are associated with:
A) Subjects
B) Objects
C) Processes
D) Domains

B) Objects

9. Capability lists are associated with:
A) Objects
B) Subjects
C) Memory blocks
D) Files only

B) Subjects

10. Authentication is the process of:
A) Granting permissions
B) Verifying user identity
C) Encrypting data
D) Logging activity

B) Verifying user identity

11. Which of the following is NOT an authentication factor?
A) Something you know
B) Something you have
C) Something you are
D) Something you access

D) Something you access

12. Password-based authentication is vulnerable to:
A) Brute force attacks
B) Guessing
C) Dictionary attacks
D) All of the above

D) All of the above

13. Encryption is used to:
A) Compress data
B) Secure data from unauthorized access
C) Speed up data transfer
D) Manage memory

B) Secure data from unauthorized access

14. Which security attack involves disguising as a trusted entity?
A) Denial of Service
B) Masquerade attack
C) Replay attack
D) Man-in-the-middle

B) Masquerade attack

15. A Trojan horse is:
A) Self-replicating malware
B) Program with hidden malicious intent
C) Network flooding attack
D) Firewall mechanism

B) Program with hidden malicious intent

16. Which malware replicates itself automatically?
A) Virus
B) Trojan
C) Spyware
D) Rootkit

A) Virus

17. A worm differs from a virus because it:
A) Needs host program
B) Cannot spread
C) Spreads without user action
D) Is harmless

C) Spreads without user action

18. Which attack makes a system unavailable to legitimate users?
A) Spoofing
B) Replay
C) Denial of Service
D) Masquerade

C) Denial of Service

19. Which mechanism protects systems from external network attacks?
A) Encryption
B) Firewall
C) Authentication
D) Access control

B) Firewall

20. Intrusion detection systems are used to:
A) Prevent attacks completely
B) Detect suspicious activities
C) Encrypt network traffic
D) Schedule processes

B) Detect suspicious activities

21. Which of the following ensures data integrity?
A) Hashing
B) Encryption
C) Authentication
D) Authorization

A) Hashing

22. Which property ensures data is not altered?
A) Confidentiality
B) Availability
C) Integrity
D) Authentication

C) Integrity

23. Which property ensures data is accessible when needed?
A) Confidentiality
B) Integrity
C) Availability
D) Authentication

C) Availability

24. Which OS security goal ensures secrecy of data?
A) Integrity
B) Confidentiality
C) Availability
D) Authorization

B) Confidentiality

25. Which of the following best summarizes OS protection and security?
A) Only protection matters
B) Only security matters
C) Both aim to control and secure resource usage
D) Both are unrelated

C) Both aim to control and secure resource usage