MCQOPTIONS
Saved Bookmarks
This section includes 11 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following statements are correct?i) Physical separation – in which process use different physical objects like separate printersii) Temporal separation – in which process having different security requirement at different timesiii) Physical separation – In which users operate under illusion that no other processes existiv) Temporal sepration – In which processes conceal their data and computations |
| A. | i |
| B. | i and ii |
| C. | ii and iii |
| D. | iii and iv |
| Answer» C. ii and iii | |
| 2. |
Which of the following statements are correct?i) Physical separation – in which process use different physical objects like separate printersii) Physical separation – in which process having different security requirement at different timesiii) Logical separation – In which users operate under illusion that no other processes existiv) Logical sepration – In which processes conceal their data and computations |
| A. | i |
| B. | i and iii |
| C. | ii and iii |
| D. | iii and iv |
| Answer» C. ii and iii | |
| 3. |
What are the three copy rights ? |
| A. | copy |
| B. | transfer |
| C. | limited copy |
| D. | all of the mentioned |
| Answer» E. | |
| 4. |
What is need of protection ? |
| A. | Prevent mischievous violation |
| B. | Prevent and intentional |
| C. | Ensure that each program component uses resources allotted to it only |
| D. | All of the mentioned |
| Answer» E. | |
| 5. |
What is reaquisition scheme to revoke capability ? |
| A. | When a process’s capability is revoked then it wont be able to reacquire it |
| B. | Pointers are maintained for each object which can be used to revoke |
| C. | Indirect pointing is done to revoke object’s capabilities |
| D. | Master key can be used compare and revoke. |
| Answer» B. Pointers are maintained for each object which can be used to revoke | |
| 6. |
Which of the following statements are correct?i) logical separation – in which process use different physical objects like separate printersii) cryptographic separation – in which process having different security requirement at different timesiii) Logical separation – In which users operate under illusion that no other processes existiv) cryptographic sepration – In which processes conceal their data and computations |
| A. | i |
| B. | i and ii |
| C. | ii and iii |
| D. | iii and iv |
| Answer» E. | |
| 7. |
In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________. |
| A. | 11 |
| B. | 13 |
| C. | 16 |
| D. | 17 |
| Answer» B. 13 | |
| 8. |
The main reason to encrypt a file is to ______________. |
| A. | Reduce its size |
| B. | Secure it for transmission |
| C. | Prepare it for backup |
| D. | Include it in the start-up sequence |
| Answer» C. Prepare it for backup | |
| 9. |
Program generation activity aims at |
| A. | Automatic generation of program |
| B. | Organize execution of a program written in PL |
| C. | Skips generation of program |
| D. | Speedens generation of program |
| Answer» B. Organize execution of a program written in PL | |
| 10. |
Consider the two statements. (A) Protection is an internal problem.(B) Security is considered as an external environment within which the system works. Which of the statement is not true? |
| A. | Only A |
| B. | Only B |
| C. | Both A and B |
| D. | None of the above |
| Answer» E. | |
| 11. |
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message. |
| A. | (I) and (II) only |
| B. | (I) only |
| C. | (II) only |
| D. | (II) and (III) only |
| Answer» C. (II) only | |