

MCQOPTIONS
Saved Bookmarks
This section includes 11 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following statements are correct?i) Physical separation – in which process use different physical objects like separate printersii) Temporal separation – in which process having different security requirement at different timesiii) Physical separation – In which users operate under illusion that no other processes existiv) Temporal sepration – In which processes conceal their data and computations |
A. | i |
B. | i and ii |
C. | ii and iii |
D. | iii and iv |
Answer» C. ii and iii | |
2. |
Which of the following statements are correct?i) Physical separation – in which process use different physical objects like separate printersii) Physical separation – in which process having different security requirement at different timesiii) Logical separation – In which users operate under illusion that no other processes existiv) Logical sepration – In which processes conceal their data and computations |
A. | i |
B. | i and iii |
C. | ii and iii |
D. | iii and iv |
Answer» C. ii and iii | |
3. |
What are the three copy rights ? |
A. | copy |
B. | transfer |
C. | limited copy |
D. | all of the mentioned |
Answer» E. | |
4. |
What is need of protection ? |
A. | Prevent mischievous violation |
B. | Prevent and intentional |
C. | Ensure that each program component uses resources allotted to it only |
D. | All of the mentioned |
Answer» E. | |
5. |
What is reaquisition scheme to revoke capability ? |
A. | When a process’s capability is revoked then it wont be able to reacquire it |
B. | Pointers are maintained for each object which can be used to revoke |
C. | Indirect pointing is done to revoke object’s capabilities |
D. | Master key can be used compare and revoke. |
Answer» B. Pointers are maintained for each object which can be used to revoke | |
6. |
Which of the following statements are correct?i) logical separation – in which process use different physical objects like separate printersii) cryptographic separation – in which process having different security requirement at different timesiii) Logical separation – In which users operate under illusion that no other processes existiv) cryptographic sepration – In which processes conceal their data and computations |
A. | i |
B. | i and ii |
C. | ii and iii |
D. | iii and iv |
Answer» E. | |
7. |
In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________. |
A. | 11 |
B. | 13 |
C. | 16 |
D. | 17 |
Answer» B. 13 | |
8. |
The main reason to encrypt a file is to ______________. |
A. | Reduce its size |
B. | Secure it for transmission |
C. | Prepare it for backup |
D. | Include it in the start-up sequence |
Answer» C. Prepare it for backup | |
9. |
Program generation activity aims at |
A. | Automatic generation of program |
B. | Organize execution of a program written in PL |
C. | Skips generation of program |
D. | Speedens generation of program |
Answer» B. Organize execution of a program written in PL | |
10. |
Consider the two statements. (A) Protection is an internal problem.(B) Security is considered as an external environment within which the system works. Which of the statement is not true? |
A. | Only A |
B. | Only B |
C. | Both A and B |
D. | None of the above |
Answer» E. | |
11. |
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message. |
A. | (I) and (II) only |
B. | (I) only |
C. | (II) only |
D. | (II) and (III) only |
Answer» C. (II) only | |