MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security Program and System Threats knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What is known as a DOS attack? |
| A. | It is attacked to block traffic of network |
| B. | It is attacked to harm contents stored in HDD by worm spawn processes |
| C. | It is an attempt to make a machine or network resource unavailable |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 2. |
What are zombie systems? |
| A. | Are specific system which are designed to attack by manufacturer |
| B. | They are network of known hacking group |
| C. | These systems are previously compromised independent systems |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 3. |
Which is not a valid port scan type? |
| A. | ACK scanning |
| B. | Window scanning |
| C. | IGMP scan |
| D. | FIN scanning |
| Answer» D. FIN scanning | |
| 4. |
Which is not a port scan type? |
| A. | TCP scanning |
| B. | SYN scanning |
| C. | UDP scanning |
| D. | SYSTEM Scanning |
| Answer» E. | |
| 5. |
What is port scanning? |
| A. | It is a software used to scan system for attack |
| B. | It is a software application designed to probe a server or host for open ports |
| C. | It is software used to scan system for introducing attacks by brute force |
| D. | None of the mentioned |
| Answer» C. It is software used to scan system for introducing attacks by brute force | |
| 6. |
Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions? |
| A. | Robert Morris |
| B. | Bob Milano |
| C. | Mark zuckerberg |
| D. | Bill Gates |
| Answer» B. Bob Milano | |
| 7. |
What is known as masquerading? |
| A. | When one participant in communication pretends to be someone else |
| B. | When attacker modifies data in communication |
| C. | When attack is of fraudulent repeat of a valid data |
| D. | When attack gains access to remote systems |
| Answer» B. When attacker modifies data in communication | |
| 8. |
Which of the following is not a characteristic of a virus? |
| A. | Virus destroy and modify user data |
| B. | Virus is a standalone program |
| C. | Virus is a code embedded in a legitimate program |
| D. | Virus cannot be detected |
| Answer» E. | |
| 9. |
Which mechanism is used by worm process? |
| A. | Trap door |
| B. | Fake process |
| C. | Spawn Process |
| D. | VAX process |
| Answer» D. VAX process | |
| 10. |
What is trap door? |
| A. | IT is trap door in WarGames |
| B. | It is a hole in software left by designer |
| C. | It is a Trojan horse |
| D. | It is a virus which traps and locks user terminal |
| Answer» C. It is a Trojan horse | |
| 11. |
What is Trojan horse? |
| A. | It is a useful way to encrypt password |
| B. | It is a user which steals valuable information |
| C. | It is a rogue program which tricks users |
| D. | It s a brute force attack algorithm |
| Answer» D. It s a brute force attack algorithm | |
| 12. |
What is breach of availability? |
| A. | This type of violation involves unauthorized reading of data |
| B. | This violation involves unauthorized modification of data |
| C. | This violation involves unauthorized destruction of data |
| D. | This violation involves unauthorized use of resources |
| Answer» D. This violation involves unauthorized use of resources | |
| 13. |
What is theft of service? |
| A. | This type of violation involves unauthorized reading of data |
| B. | This violation involves unauthorized modification of data |
| C. | This violation involves unauthorized destruction of data |
| D. | This violation involves unauthorized use of resources |
| Answer» E. | |
| 14. |
What is breach of confidentiality? |
| A. | This type of violation involves unauthorized reading of data |
| B. | This violation involves unauthorized modification of data |
| C. | This violation involves unauthorized destruction of data |
| D. | This violation involves unauthorized use of resources |
| Answer» B. This violation involves unauthorized modification of data | |
| 15. |
What is the breach of integrity? |
| A. | This type of violation involves unauthorized reading of data |
| B. | This violation involves unauthorized modification of data |
| C. | This violation involves unauthorized destruction of data |
| D. | This violation involves unauthorized use of resources |
| Answer» C. This violation involves unauthorized destruction of data | |