MCQOPTIONS
 Saved Bookmarks
				This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security Program and System Threats knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    What is known as a DOS attack? | 
                            
| A. | It is attacked to block traffic of network | 
| B. | It is attacked to harm contents stored in HDD by worm spawn processes | 
| C. | It is an attempt to make a machine or network resource unavailable | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 2. | 
                                    What are zombie systems? | 
                            
| A. | Are specific system which are designed to attack by manufacturer | 
| B. | They are network of known hacking group | 
| C. | These systems are previously compromised independent systems | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 3. | 
                                    Which is not a valid port scan type? | 
                            
| A. | ACK scanning | 
| B. | Window scanning | 
| C. | IGMP scan | 
| D. | FIN scanning | 
| Answer» D. FIN scanning | |
| 4. | 
                                    Which is not a port scan type? | 
                            
| A. | TCP scanning | 
| B. | SYN scanning | 
| C. | UDP scanning | 
| D. | SYSTEM Scanning | 
| Answer» E. | |
| 5. | 
                                    What is port scanning? | 
                            
| A. | It is a software used to scan system for attack | 
| B. | It is a software application designed to probe a server or host for open ports | 
| C. | It is software used to scan system for introducing attacks by brute force | 
| D. | None of the mentioned | 
| Answer» C. It is software used to scan system for introducing attacks by brute force | |
| 6. | 
                                    Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions? | 
                            
| A. | Robert Morris | 
| B. | Bob Milano | 
| C. | Mark zuckerberg | 
| D. | Bill Gates | 
| Answer» B. Bob Milano | |
| 7. | 
                                    What is known as masquerading? | 
                            
| A. | When one participant in communication pretends to be someone else | 
| B. | When attacker modifies data in communication | 
| C. | When attack is of fraudulent repeat of a valid data | 
| D. | When attack gains access to remote systems | 
| Answer» B. When attacker modifies data in communication | |
| 8. | 
                                    Which of the following is not a characteristic of a virus? | 
                            
| A. | Virus destroy and modify user data | 
| B. | Virus is a standalone program | 
| C. | Virus is a code embedded in a legitimate program | 
| D. | Virus cannot be detected | 
| Answer» E. | |
| 9. | 
                                    Which mechanism is used by worm process? | 
                            
| A. | Trap door | 
| B. | Fake process | 
| C. | Spawn Process | 
| D. | VAX process | 
| Answer» D. VAX process | |
| 10. | 
                                    What is trap door? | 
                            
| A. | IT is trap door in WarGames | 
| B. | It is a hole in software left by designer | 
| C. | It is a Trojan horse | 
| D. | It is a virus which traps and locks user terminal | 
| Answer» C. It is a Trojan horse | |
| 11. | 
                                    What is Trojan horse? | 
                            
| A. | It is a useful way to encrypt password | 
| B. | It is a user which steals valuable information | 
| C. | It is a rogue program which tricks users | 
| D. | It s a brute force attack algorithm | 
| Answer» D. It s a brute force attack algorithm | |
| 12. | 
                                    What is breach of availability? | 
                            
| A. | This type of violation involves unauthorized reading of data | 
| B. | This violation involves unauthorized modification of data | 
| C. | This violation involves unauthorized destruction of data | 
| D. | This violation involves unauthorized use of resources | 
| Answer» D. This violation involves unauthorized use of resources | |
| 13. | 
                                    What is theft of service? | 
                            
| A. | This type of violation involves unauthorized reading of data | 
| B. | This violation involves unauthorized modification of data | 
| C. | This violation involves unauthorized destruction of data | 
| D. | This violation involves unauthorized use of resources | 
| Answer» E. | |
| 14. | 
                                    What is breach of confidentiality? | 
                            
| A. | This type of violation involves unauthorized reading of data | 
| B. | This violation involves unauthorized modification of data | 
| C. | This violation involves unauthorized destruction of data | 
| D. | This violation involves unauthorized use of resources | 
| Answer» B. This violation involves unauthorized modification of data | |
| 15. | 
                                    What is the breach of integrity? | 
                            
| A. | This type of violation involves unauthorized reading of data | 
| B. | This violation involves unauthorized modification of data | 
| C. | This violation involves unauthorized destruction of data | 
| D. | This violation involves unauthorized use of resources | 
| Answer» C. This violation involves unauthorized destruction of data | |