Homechevron_rightEngineeringchevron_rightComputer Sciencechevron_rightOperating Systemchevron_rightProtection and Security

Protection and Security MCQs

  • 1. Which of the following are forms of malicious attack?
  • filter_dramaExplanation
    Answer is : D
    None.
  • 2. What are the common security threats?
  • filter_dramaExplanation
    Answer is : B
    Sharing and associated permissions are usual exploits which can compromise the system.
  • 3. From the following, which is not a common file permission?
  • filter_dramaExplanation
    Answer is : C
    None.
  • 4. Which of the following is a good practice?
  • filter_dramaExplanation
    Answer is : C

    Limited access is a key method to prevent unauthorized access and exploits.

  • 5. What is not a good practice for user administration?
  • filter_dramaExplanation
    Answer is : D
    Telnet and FTP are not encrypted and can be compromised.
  • 6. Which of the following is the least secure method of authentication?
  • filter_dramaExplanation
    Answer is : D
    Passwords can be compromised more easily than to replicate a physical thing like key card, fingerprint or retina.
  • 7. Which of the following is a strong password?
  • filter_dramaExplanation
    Answer is : C
    It has a combination of Alphabet both capital and small along with number and special character. Thus always use complex password with a combination of all these.
  • 8. Why is one time password safe?
  • filter_dramaExplanation
    Answer is : C
    One time password is safe since it is generated per access and thus cannot be brute forced or deduced.
  • 9. What does Light Directory Access Protocol (LDAP) doesn
  • filter_dramaExplanation
    Answer is : B
    None.
  • 10. What is characteristic of RADIUS system?
  • filter_dramaExplanation
    Answer is : C
    None.
leaderboardLeaderboard
  • Rahul Kumar

    191 Points

  • VIKRAM JEET

    54 Points

  • GEETHIKA CHOWDARY

    53 Points

  • sunita saini

    52 Points

  • Zain

    49 Points