0% found this document useful (0 votes)
156 views

Operating Systems/OS and Security Multiple Choice Questions

The document contains 10 multiple choice questions about operating systems and security: 1. A question about classifying allowing unauthorized use of a PC's processor as a breach of security. 2. A question about how passport spoofing can be classified. 3. A question about how a compiler planted attack is classified. 4. A question about considerations for choosing a strong password.

Uploaded by

Sundeep Chopra
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views

Operating Systems/OS and Security Multiple Choice Questions

The document contains 10 multiple choice questions about operating systems and security: 1. A question about classifying allowing unauthorized use of a PC's processor as a breach of security. 2. A question about how passport spoofing can be classified. 3. A question about how a compiler planted attack is classified. 4. A question about considerations for choosing a strong password.

Uploaded by

Sundeep Chopra
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Operating Systems/OS and Security

Multiple Choice Questions

Multiple Choice Questions 9.1 Suppose you leave your PC connected to internet all the time. Some one has decided to use your PCs processor cycles for some of his work which is computationally intensive. If we regard this as a breach of security which way would you classify it: a. Disclosure of information b. Compromising integrity of the PC c. Denial of service attack 9.2 Passport spoofing can be regarded as follows: a. Active misuse b. Indirect abuse c. By passing the internal controls d. Virus e. Active authority misuse 9.3 A compiler planted attack is regarded as a. A pest program b. Use of facility for a purpose different from one intended c. Trojan horse attack d. Logic bomb 9.4 What consideration should go into choosing a pass-word a. It should be short and easy to remember word b. It should be long and difficult word c. It should be difficult to guess or synthesize but easy to recall d. It should be an unusual combination of alphabets, digits and special characters which may be changed frequently. 9.5 On a network the r series of remote operations command are: a. Quite secure as the NW infrastructure provides authentication and access control. b. Is insecure as the encryption algorithm used is simple and can be cracked easily. c. Is insecure because the authentication for access happens in clear text.
P.C.P.Bhat/IISc Bangalore M9/V1/June 04/1

Operating Systems/OS and Security

Multiple Choice Questions

9.6 The DES is a symmetric encryption / decryption procedure a. True b. False 9.7 The public key encryption system is useful for: a. Only bulk data transfer b. For authentication as well as bulk data transfer c. Mostly for symmetric key exchange 9.8 When a browser is used for web access: a. The same key is used for every web access b. Once a computer is authenticated it can repeated use the key as long as the power is on c. A different session key is generated for each separate connection. d. It is the responsibility of the internet service provider to ensure the connection. 9.9 Use of the access control list does not offer a fine grain access control a. True b. False 9.10 The RSA algorithm can transfer data as efficiently as DES a. True b. False

P.C.P.Bhat/IISc Bangalore

M9/V1/June 04/2

You might also like