MCQOPTIONS
 Saved Bookmarks
				This section includes 8 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security Securing Systems and Facilities knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    What is known as a sandbox? | 
                            
| A. | It is a program which can be molded to do the desired task | 
| B. | It is a program that is controlled or emulated section of OS | 
| C. | It is a special mode of antivirus | 
| D. | None of the mentioned | 
| Answer» C. It is a special mode of antivirus | |
| 2. | 
                                    How does an antivirus of today identify viruses? | 
                            
| A. | Previously known patterns | 
| B. | It can detect unknown patterns | 
| C. | It can take high priority to increase scanning speed | 
| D. | None of the mentioned | 
| Answer» B. It can detect unknown patterns | |
| 3. | 
                                    How do viruses avoid basic pattern match of antivirus? | 
                            
| A. | They are encrypted | 
| B. | They act with special permissions | 
| C. | They modify themselves | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 4. | 
                                    What are the two features of a tripwire file system? | 
                            
| A. | It is a tool to monitor file systems | 
| B. | It is used to automatically take corrective action | 
| C. | It is used to secure UNIX system | 
| D. | None of the mentioned | 
| Answer» B. It is used to automatically take corrective action | |
| 5. | 
                                    Which direction access cannot happen using DMZ zone by default? | 
                            
| A. | Company computer to DMZ | 
| B. | Internet to DMZ | 
| C. | Internet to company computer | 
| D. | Company computer to internet | 
| Answer» D. Company computer to internet | |
| 6. | 
                                    What is the best practice in the firewall domain environment? | 
                            
| A. | Create two domain trusted and untrusted domain | 
| B. | Create strong policy in firewall to support different types of users | 
| C. | Create a Demilitarized zone | 
| D. | Create two DMZ zones with one untrusted domain | 
| Answer» D. Create two DMZ zones with one untrusted domain | |
| 7. | 
                                    What is used to protect network from outside internet access? | 
                            
| A. | A trusted antivirus | 
| B. | 24 hours scanning for virus | 
| C. | Firewall to separate trusted and untrusted network | 
| D. | Deny users access to websites which can potentially cause security leak | 
| Answer» D. Deny users access to websites which can potentially cause security leak | |
| 8. | 
                                    What is not an important part of security protection? | 
                            
| A. | Large amount of RAM to support antivirus | 
| B. | Strong passwords | 
| C. | Audit log periodically | 
| D. | Scan for unauthorized programs in system directories | 
| Answer» B. Strong passwords | |