MCQOPTIONS
Saved Bookmarks
This section includes 8 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security Securing Systems and Facilities knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What is known as a sandbox? |
| A. | It is a program which can be molded to do the desired task |
| B. | It is a program that is controlled or emulated section of OS |
| C. | It is a special mode of antivirus |
| D. | None of the mentioned |
| Answer» C. It is a special mode of antivirus | |
| 2. |
How does an antivirus of today identify viruses? |
| A. | Previously known patterns |
| B. | It can detect unknown patterns |
| C. | It can take high priority to increase scanning speed |
| D. | None of the mentioned |
| Answer» B. It can detect unknown patterns | |
| 3. |
How do viruses avoid basic pattern match of antivirus? |
| A. | They are encrypted |
| B. | They act with special permissions |
| C. | They modify themselves |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 4. |
What are the two features of a tripwire file system? |
| A. | It is a tool to monitor file systems |
| B. | It is used to automatically take corrective action |
| C. | It is used to secure UNIX system |
| D. | None of the mentioned |
| Answer» B. It is used to automatically take corrective action | |
| 5. |
Which direction access cannot happen using DMZ zone by default? |
| A. | Company computer to DMZ |
| B. | Internet to DMZ |
| C. | Internet to company computer |
| D. | Company computer to internet |
| Answer» D. Company computer to internet | |
| 6. |
What is the best practice in the firewall domain environment? |
| A. | Create two domain trusted and untrusted domain |
| B. | Create strong policy in firewall to support different types of users |
| C. | Create a Demilitarized zone |
| D. | Create two DMZ zones with one untrusted domain |
| Answer» D. Create two DMZ zones with one untrusted domain | |
| 7. |
What is used to protect network from outside internet access? |
| A. | A trusted antivirus |
| B. | 24 hours scanning for virus |
| C. | Firewall to separate trusted and untrusted network |
| D. | Deny users access to websites which can potentially cause security leak |
| Answer» D. Deny users access to websites which can potentially cause security leak | |
| 8. |
What is not an important part of security protection? |
| A. | Large amount of RAM to support antivirus |
| B. | Strong passwords |
| C. | Audit log periodically |
| D. | Scan for unauthorized programs in system directories |
| Answer» B. Strong passwords | |