Explore topic-wise MCQs in Operating System.

This section includes 11 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following statements are correct?i) Physical separation – in which process use different physical objects like separate printersii) Temporal separation – in which process having different security requirement at different timesiii) Physical separation – In which users operate under illusion that no other processes existiv) Temporal sepration – In which processes conceal their data and computations

A. i
B. i and ii
C. ii and iii
D. iii and iv
Answer» C. ii and iii
2.

Which of the following statements are correct?i) Physical separation – in which process use different physical objects like separate printersii) Physical separation – in which process having different security requirement at different timesiii) Logical separation – In which users operate under illusion that no other processes existiv) Logical sepration – In which processes conceal their data and computations

A. i
B. i and iii
C. ii and iii
D. iii and iv
Answer» C. ii and iii
3.

What are the three copy rights ?

A. copy
B. transfer
C. limited copy
D. all of the mentioned
Answer» E.
4.

What is need of protection ?

A. Prevent mischievous violation
B. Prevent and intentional
C. Ensure that each program component uses resources allotted to it only
D. All of the mentioned
Answer» E.
5.

What is reaquisition scheme to revoke capability ?

A. When a process’s capability is revoked then it wont be able to reacquire it
B. Pointers are maintained for each object which can be used to revoke
C. Indirect pointing is done to revoke object’s capabilities
D. Master key can be used compare and revoke.
Answer» B. Pointers are maintained for each object which can be used to revoke
6.

Which of the following statements are correct?i) logical separation – in which process use different physical objects like separate printersii) cryptographic separation – in which process having different security requirement at different timesiii) Logical separation – In which users operate under illusion that no other processes existiv) cryptographic sepration – In which processes conceal their data and computations

A. i
B. i and ii
C. ii and iii
D. iii and iv
Answer» E.
7.

In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________.

A. 11
B. 13
C. 16
D. 17
Answer» B. 13
8.

The main reason to encrypt a file is to ______________.

A. Reduce its size
B. Secure it for transmission
C. Prepare it for backup
D. Include it in the start-up sequence
Answer» C. Prepare it for backup
9.

Program generation activity aims at

A. Automatic generation of program
B. Organize execution of a program written in PL
C. Skips generation of program
D. Speedens generation of program
Answer» B. Organize execution of a program written in PL
10.

Consider the two statements. (A) Protection is an internal problem.(B) Security is considered as an external environment within which the system works. Which of the statement is not true?

A. Only A
B. Only B
C. Both A and B
D. None of the above
Answer» E.
11.

A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message.

A. (I) and (II) only
B. (I) only
C. (II) only
D. (II) and (III) only
Answer» C. (II) only