Explore topic-wise MCQs in Operating System.

This section includes 411 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.

351.

In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encryption)WELCOME TO NETWORK SECURITY !

A. WMEKREETSILTWETCOOCYONRU!
B. EETSICOOCYWMEKRONRU!LTWET
C. LTWETONRU!WMEKRCOOCYEETSI
D. ONRU!COOCYLTWETEETSIWMEKR
Answer» C. LTWETONRU!WMEKRCOOCYEETSI
352.

In _______ authentication, the claimant proves that she knows the secret without sending it to the verifier.

A. zero knowledge
B. symmetric
C. asymmetric
D. challenge response
Answer» E.
353.

Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires

A. Anarkali’s public key.
B. Salim’s public key.
C. Salim’s private key.
D. Anarkali’s private key.
Answer» B. Salim’s public key.
354.

A computer virus is a

A. Hardware
B. Software
C. Bacteria
D. Freeware
Answer» C. Bacteria
355.

Consider the following statement.I. Packet Filter Firewall analyze network traffic at transport layer.II. Circuit Level Firewall operate at transport and session layer of OSI Model.From the above statement which statement/s is/are True

A. None
B. Only II
C. I and II
D. Only I
Answer» C. I and II
356.

A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario. One or more of the following security violations can take place.1) S can launch a birthday attack to replace m with a fraudulent message.2) A third-party attacker can launch a birthday attack to replace m with a fraudulent message. 3) R can launch a birthday attack to replace m with a fraudulent message.Which of the following are possible security violations?

A. 1 and 2 only
B. 1 only
C. 2 only
D. 2 and 3 only
Answer» C. 2 only
357.

In RSA algorithm if p = 7, q = 11 and e = 13 then what will be the value of d?

A. 40
B. 13
C. 37
D. 23
Answer» D. 23
358.

Let P = 17 and Q = 11 is taken in RSA algorithm, what are possible values of E( (public key), N and D (Private key) respectively?

A. 5, 187, 37
B. 7, 160, 23
C. 7, 187, 23
D. 9, 160, 37
Answer» D. 9, 160, 37
359.

MD5 is a widely used hash function for producing hash value of

A. 64 bits
B. 128 bits
C. 512 bits
D. 1024 bits
Answer» C. 512 bits
360.

A digital signature is required:

A. for non-repudiation of communication by a sender
B. for all e-mail sending
C. for all DHCP server
D. for FTP transactions
Answer» B. for all e-mail sending
361.

_______ is not a public key cryptosystem.

A. El Gamal
B. AES
C. Rabin
D. RSA
Answer» C. Rabin
362.

For using passwords on the Internet, a software is used so that the password is not intercepted easily. It is called

A. Coding
B. Malware
C. Virus
D. Encryption
Answer» E.
363.

_____ uses pretty good privacy algorithm.

A. Electronic mails
B. File encryption
C. Both Electronic mails and File encryption
D. None of the options
Answer» D. None of the options
364.

In a columnar transposition cipher, the plain text is “the tomato is a plant in the night shade family”, keyword is “TOMATO”. The cipher text is

A. “TINESAX / EOAHTFX / HTLTHEY / MAILAIX / TAPNGDL / OSTNHMX”
B. “TINESAX / EOAHTEX / MAILAIX / HTLTHEY / TAPNGDL / OSTNHMX”
C. “TINESAX / EOAHTFX / HTLTHEY / MAILAIX / OSTNHMX / TAPNGDL”
D. “EOAHTFX / TINESAX / HTLTHEY / MAILAIX / TAPNGDL / OSTNHMX”
Answer» B. “TINESAX / EOAHTEX / MAILAIX / HTLTHEY / TAPNGDL / OSTNHMX”
365.

Avalanche effect in cryptography refers

A. Large changes in cipher text when the keyword is changed minimally
B. Large changes in cipher text when the plain text is changed
C. Large Impact of keyword change to length of the cipher text
D. Both 1 and 2
Answer» E.
366.

_____ tells a firewall about how to reassemble a data stream that has been divided into packets.

A. The source routing feature
B. The number in the header's identification field
C. The destination IP address
D. The header checksum field in the packet header
Answer» B. The number in the header's identification field
367.

In RSA1. p and q are chosen as very large prime number2. Compute n = p * q and ϕ(n) = (p-1) * (q-1)Later e encryption key chosen. How this encryption key is selected?

A. e is chosen as a relative prime to ϕ(n)
B. e is chosen as a relative prime to q
C. e is chosen as a relative prime to n
D. e is chosen as a relative prime to p
Answer» B. e is chosen as a relative prime to q
368.

Given below are two statements: One is labeled as Assertion (A) and the other is labeled as Reason (R) :Statement I: In Caesar Cipher each letter of Plain text is replaced by another letter for encryption. Statement II: Diffie-Hellman algorithm is used for exchange of secret key. In the light of the above statements, choose the correct answer from the options given below:

A. Both Statement I and Statement II are true
B. Both Statement I and Statement II are false
C. Statement I is correct but Statement II is false
D. Statement I is incorrect but Statement II is true
Answer» B. Both Statement I and Statement II are false
369.

An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3.Q—R1—R2—R3—HH acts as an HTTP server, and Q connects to H via HTTP and downloads a file. Session layer Encryption is used, with DES as the shared key encryption protocol. Consider the following fourPieces of information:[I1] The URL of the file downloaded by Q[I2] The TCP port numbers at Q and H[I3] The IP addresses of Q and H[I4] The link layer addresses of Q and HWhich of I1, I2, I3, and I4 can an intruder learn through sniffing at R2 alone?

A. Only I1 and I2
B. Only I1
C. Only I2 and I3
D. Only I3 and I4
Answer» D. Only I3 and I4
370.

Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted by \(K_{x}^{-}\) and \(K_{x}^{+}\) for x = A, B, respectively. Let Kx(m) represent the operation of encrypting m with a key Kx and H(m) represent the message digest. Which one of the following indicates the CORRECT way of sending the message m along with the digital signature to A?

A. \(\left\{ m,~K_{B}^{+}~\left( H\left( m \right) \right) \right\}\)
B. \(\left\{ m,~K_{B}^{-}\left( H\left( m \right) \right) \right\}\)
C. \(\left\{ m,~K_{A}^{-}\left( H\left( m \right) \right) \right\}\)
D. \(\left\{ m,~K_{A}^{+}\left( m \right) \right\}\)
Answer» C. \(\left\{ m,~K_{A}^{-}\left( H\left( m \right) \right) \right\}\)
371.

Which of the following script creates master key?

A. CREATE MASTER KEY
B. CREATE MASTER KEY ENCRYPTION
C. CREATE MASTER ENCRYPTION
D. All of the mentioned
Answer» C. CREATE MASTER ENCRYPTION
372.

The schema securable scope contains the following securable is __________

A. Contract
B. Asymmetric key
C. Schema
D. Object
Answer» E.
373.

What is the syntax for HAS_PERMS_BY_NAME in SQL Server 2014?

A. HAS_PERMS_NAME ( securable_class , permission
B. HAS_PERMS_BY_NAME ( securable , securable_class , permission
C. HAS_PERMS_BY_NAME ( securable , securable_class , permission
D. HAS_PERMS( securable , securable_class , permission
Answer» C. HAS_PERMS_BY_NAME ( securable , securable_class , permission
374.

What is the syntax for fn_my_permissions function in SQL Server 2014?

A. fn_my_permissions ( securable , securable_class )
B. fn_my_permissions ( securable , ‘securable_class’ )
C. fn_my_permissions ( ‘securable’ , securable_class)
D. fn_my_permissions ( ‘securable’ , ‘securable_class’ )
Answer» C. fn_my_permissions ( ‘securable’ , securable_class)
375.

The major components of the Label Security Toolkit are _____________

A. Documentation
B. The Label Policy Designer application
C. Examples showing the implementation of row- and cell-level security in different scenarios
D. All of the mentioned
Answer» E.
376.

Which of the following is valid code to backup a certificate?

A. USE Master
B. USE Master
C. USE Master
D. USE Master
Answer» B. USE Master
377.

To add or remove server role membership use ____________

A. ALTER ROLE
B. ALTER ANY LOGIN
C. ALTER SERVER ROLE
D. None of the mentioned
Answer» D. None of the mentioned
378.

Which of the following returns a row for each security principal in a SQL Server database?

A. sys.database_role_members
B. sys.sql_logins
C. sys.database_principals
D. None of the mentioned
Answer» D. None of the mentioned
379.

Which of the statement is used to create a new certificate with a valid subject in SQL Server?

A. CREATE CERTI MySQLCert
B. CREATE CERTIFICATE MySQLCert
C. CREATE CERTIFICATE MySQLCert
D. None of the mentioned
Answer» C. CREATE CERTIFICATE MySQLCert
380.

Return type of CertName field in vwVisibleLabels is __________

A. XML
B. INT
C. NVARCHAR(256)
D. VARCHAR(256)
Answer» D. VARCHAR(256)
381.

View that contains the list of all the security labels present in the database are __________

A. vwVisibleLabels
B. VisibleLabels
C. vwVisibleLabel
D. All of the mentioned
Answer» B. VisibleLabels
382.

Which of the following will not return user name of the current session?

A. CUURENT_USER()
B. USER_NAME()
C. CUSER_NAME()
D. None of the mentioned
Answer» E.
383.

Which of the field must be 1 using an authenticator in the following code?

A. @add_authenticator
B. @cleartext
C. key_GUID
D. None of the mentioned
Answer» B. @cleartext
384.

What is the role of WITH NAME in the following code?

A. Removes the specified server principal from the server role
B. Adds the specified server principal to the server role
C. Specifies the new name of the user-defined server role
D. None of the mentioned
Answer» D. None of the mentioned
385.

Which of the following authentication modes is more secure?

A. SQL Server Authentication
B. Windows Authentication
C. Mixed Mode
D. All of the mentioned
Answer» C. Mixed Mode
386.

Windows Authentication Mode is not available when an instance of SQL Server is running on ____________

A. Windows 98
B. Windows 7
C. Windows 95
D. All of the mentioned
Answer» B. Windows 7
387.

________ optional password policies are available for SQL Server logins.

A. 2
B. 3
C. 5
D. All of the mentioned
Answer» C. 5
388.

Which of the following code is used to enable the sa login?

A. ALTER LOGIN sa ENABLE ;
B. ALTER LOGIN sa DISABLE ;
C. ALTER LOGIN sa ENABLE ;
D. None of the mentioned
Answer» B. ALTER LOGIN sa DISABLE ;
389.

Which of the following is the biggest disadvantage of SQL Server Authentication mode?

A. SQL Server Authentication cannot use Kerberos security protocol
B. Allows SQL Server to support Web-based applications where users create their own identities
C. Allows SQL Server to support older applications and applications provided by third parties that require SQL Server Authentication
D. None of the mentioned
Answer» B. Allows SQL Server to support Web-based applications where users create their own identities
390.

When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialog ?

A. Security procedure
B. Log-on procedure
C. Safeguard procedure
D. Identification procedure
Answer» C. Safeguard procedure
391.

Decryption and Encryption of data are the responsibility of which of the following layer?

A. Session layer
B. Network layer
C. Transport layer
D. Presentation layer
Answer» E.
392.

Firewalls are used for ................

A. routing
B. security
C. tunnelling
D. congestion control
Answer» C. tunnelling
393.

What is the port number for (HTTP Secure) HTTPS?

A. 43
B. 443
C. 445
D. 444
Answer» C. 445
394.

Caesar cipher is represented as .................

A. C = (p+3)mod3
B. C = (p+26)mod3
C. C = (p-3)mod26
D. C = (p+3)mod26
Answer» E.
395.

………….transform message into format (cyber text) that cannot be read by hackers.

A. Decryption
B. Encryption
C. Transformation
D. None of these
Answer» C. Transformation
396.

..………..is used to validate the identity of the message sender to the recipient.

A. Encryption
B. Decryption
C. Digital certificate
D. None of these
Answer» D. None of these
397.

Number of rounds in Data Encryption Standard algorithm?

A. 8 rounds
B. 12 rounds
C. 16 rounds
D. 24 rounds
Answer» D. 24 rounds
398.

In cryptography the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message (spaces are omitted during encryption) WELCOME TO NETWORK SECURITY!

A. WMEKREETSILTWETCOOCYONRU!
B. EETSICOOCYWMEKRONRU!LTWET
C. LTWETONRU!WMEKRCOOCYEETSI
D. ONRU!COOCYLTWETEETSIWMEKR
Answer» C. LTWETONRU!WMEKRCOOCYEETSI
399.

............... is an example for public key algorithm.

A. RSA
B. DES
C. IREA
D. RC5
Answer» B. DES
400.

The protocol used to provide security to e-mails?

A. POP
B. PGP
C. SNMP
D. HTTP
Answer» C. SNMP