Operating System MCQ (Multiple Choice Questions) - SchoolingAxis

Operating System MCQ (Multiple Choice Questions)

 Que- What is breach of availability ? 

a. This type of violation involves unauthorized reading of data 

b. This violation involves unauthorized modification of data 

c. This violation involves unauthorized destruction of data 

d. This violation involves unauthorized use of resources 


Answer- This violation involves unauthorized destruction of data        


Que- What is Trojan horse ? 

a. It is a useful way to encrypt password 

b. It is a user which steals valuable information 

c. It is a rogue program which tricks users 

d. It's a brute force attack algorithm 


Answer- It is a rogue program which tricks users        


Que- What is trap door ? 

a. IT is trap door in WarGames 

b. It is a hole in software left by designer 

c. It is a Trojan horse 

d. It is a virus which traps and locks user terminal 


Answer- It is a hole in software left by designer        


Que- Which mechanism is used by worm process ? 

a. Trap door 

b. Fake process 

c. Spawn Process 

d. VAX process 


Answer- Spawn Process        


Que- Which of the following is not a characteristic of virus ? 

a. Virus destroy and modify user data 

b. Virus is a standalone program 

c. Virus is a code embedded in a legitimate program 

d. Virus cannot be detected 


Answer- Virus cannot be detected        


Que- What is known as masquerading ? 

a. When one participant in communication pretends to be someone else 

b. When attacker modifies data in communication 

c. When attack is of fraudulent repeat of a valid data 

d. When attack gains access to remote systems 


Answer- When one participant in communication pretends to be someone else        


Que- Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ? 

a. Robert Morris 

b. Bob Milano 

c. Mark zuckerberg 

d. Bill Gates 


Answer- Robert Morris        


Que- What is port scanning ? 

a. It is a software used to scan system for attack 

b. It is a software application designed to probe a server or host for open ports 

c. It is software used to scan system for introducing attacks by brute force 

d. None of the mentioned 


Answer- It is a software application designed to probe a server or host for open ports        


Que- Which is not a port scan type ? 

a. TCP scanning 

b. SYN scanning 

c. UDP scanning 

d. SYSTEM  Scanning 


Answer- SYSTEM  Scanning        


Que- Which is not a valid port scan type ? 

a. ACK scanning 

b. Window scanning 

c. IGMP scan 

d. FIN scanning 


Answer- IGMP scan        


Que- What are zombie systems ? 

a. Are specific system which are designed to attack by manufacturer 

b. They are network of known hacking group 

c. These systems are previously compromised, independent systems 

d. None of the mentioned 


Answer- These systems are previously compromised, independent systems        


Que- What is known as DOS attack ? 

a. It is attack to block traffic of network 

b. It is attack to harm contents stored in HDD by worm spawn processes 

c. It is an attempt to make a machine or network resource unavailable 

d. None of the mentioned 


Answer- It is an attempt to make a machine or network resource unavailable        


Que- With regard to DOS attack what is not true from below options ? 

a. We can stop DOS attack completely 

b. By upgrading OS vulnerability we can stop DOS attack to some extent 

c. DOS attack has to be stopped at network level 

d. Such attack can last for hours 


Answer- We can stop DOS attack completely        


Que- What is not a important part of security protection ? 

a. Large amount of RAM to support antivirus 

b. Strong passwords 

c. Audit log periodically 

d. Scan for unauthorized programs in system directories 


Answer- Large amount of RAM to support antivirus        


Que- What is used to protect network from outside internet access ? 

a. A trusted antivirus 

b. 24 hours scanning for virus 

c. Firewall to separate trusted and untrusted network 

d. Deny users access to websites which can potentially cause security leak 


Answer- Firewall to separate trusted and untrusted network        


Que- What is best practice in firewall domain environment ? 

a. Create two domain trusted and untrusted domain 

b. Create strong policy in firewall to support different types of users 

c. Create a Demilitarized zone 

d. Create two DMZ zones with one untrusted domain 


Answer- Create a Demilitarized zone        


Que- Which direction access cannot happen using DMZ zone by default ? 

a. Company computer to DMZ 

b. Internet to DMZ 

c. Internet to  company computer 

d. Company computer to internet 


Answer- Internet to  company computer        


Que- What are two features of a tripwire file system ? 

a. It is a tool to monitor file systems 

b. It is used to automatically take corrective action 

c. It is used to secure UNIX system 

d. None of the mentioned 


Answer- It is a tool to monitor file systems        


Que- How do viruses avoid basic pattern match of antivirus ? 

a. They are encrypted 

b. They act with special permissions 

c. They modify themselves 

d. None of the mentioned 


Answer- They modify themselves        


Que- How does an antivirus of today identify viruses ? 

a. Previously known patterns 

b. It can detect unknown patterns 

c. It can take high priority to increase scanning speed 

d. None of the mentioned 


Answer- Previously known patterns        


Que- What is known as sandbox ? 

a. It is a program which can be molded to do desired task 

b. It is program that is controlled or emulated section of OS 

c. It is a special mode of antivirus 

d. None of the mentioned 


Answer- It is program that is controlled or emulated section of OS        


Que- What is are two safe computing practices ? 

a. Not to open software from unknown vendors 

b. Open and execute programs in admin level/root 

c. Open and execute programs in presence of antivirus 

d. None of the mentioned 


Answer- Not to open software from unknown vendors        


Que- What are the different ways to intrude ? 

a. Buffer overflows 

b. Unexpected combinations and unhandled input 

c. Race conditions 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are major components of intrusion detection system ? 

a. Analysis Engine 

b. Event provider 

c. Alert Database 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are the different ways to classify an IDS ? 

a. anomaly detection 

b. signature based misuse 

c. stack based 

d. all of the mentioned 


Answer- all of the mentioned        


Que- What are the different ways to classify an IDS ? 

a. Zone based 

b. Host & Network based 

c. Network & Zone based 

d. Level based 


Answer- Host & Network based        


Que- What are characteristics of anomaly based IDS ? 

a. It models the normal usage of network as a noise characterization 

b. It doesn't detect novel attacks 

c. Anything distinct from the noise is not assumed to be intrusion activity 

d. It detects based on signature 


Answer- It models the normal usage of network as a noise characterization        


Que- What is major drawback of anomaly detection IDS ? 

a. These are very slow at detection 

b. It generates many false alarms 

c. It doesn't detect novel attacks 

d. None of the mentioned 


Answer- It generates many false alarms        


Que- What are characteristics of signature based IDS ? 

a. Most are based on simple pattern matching algorithms 

b. It is programmed to interpret a certain series of packets 

c. It models the normal usage of network as a noise characterization 

d. Anything distinct from the noise is assumed to be intrusion activity 


Answer- Most are based on simple pattern matching algorithms        


Que- What are drawbacks of signature based IDS ? 

a. They are unable to detect novel attacks 

b. They suffer from false alarms 

c. They have to be programmed again for every new pattern to be detected 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are characteristics of Host based IDS ? 

a. The host operating system logs in the audit information 

b. Logs includes logins,file opens and program executions 

c. Logs are analysed to detect tails of intrusion 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are drawbacks of the host based IDS ? 

a. Unselective logging of messages may increase the audit burdens 

b. Selective logging runs the risk of missed attacks 

c. They are very fast to detect 

d. They have to be programmed for new patterns 


Answer- Unselective logging of messages may increase the audit burdens        


Que- What are strengths of the host based IDS ? 

a. Attack verification 

b. System specific activity 

c. No additional hardware required 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are characteristics of stack based IDS ? 

a. They are integrated closely with the TCP/IP stack and watch packets 

b. The host operating system logs in the audit information 

c. It is programmed to interpret a certain series of packets 

d. It models the normal usage of network as a noise characterization 


Answer- They are integrated closely with the TCP/IP stack and watch packets        


Que- What are characteristics of Network based IDS ? 

a. They look for attack signatures in network traffic 

b. Filter decides which traffic will not be discarded or passed 

c. It is programmed to interpret a certain series of packet 

d. It models the normal usage of network as a noise characterization 


Answer- They look for attack signatures in network traffic        


Que- What are strengths of Network based IDS ? 

a. Cost of ownership reduced 

b. Malicious intent detection 

c. Real time detection and response 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What is preferred way of encryption ? 

a. pre shared secret key 

b. using key distribution center (KDC) 

c. public key-encryption 

d. symmetric key 


Answer- public key-encryption        


Que-  What is not a role of encryption ? 

a. It is used to protect data from unauthorized access during transmission 

b. It is used to ensure user authentication 

c. It is used to ensure data integrity 

d. It is used to ensure data corruption doesn't happens 


Answer- It is used to ensure data corruption doesn't happens        


Que- What is cipher-block chaining ? 

a. Data is logically 'ANDed' with previous block 

b. Data is logically 'ORed' with previous block 

c. Data is logically 'XORed' with previous block 

d. None of the mentioned 


Answer- Data is logically 'XORed' with previous block        


Que- What is not an encryption standard ? 

a. AES 

b. TES 

c. Triple DES 

d. DES 


Answer- TES        


Que- Which of following is not a stream cipher? 

a. Two fish 

b. RC5 

c. RC4 

d. TBONE 


Answer- TBONE        


Que- What is a Hash Function ? 

a. It creates a small flexible block of data 

b. It creates a small,fixed block of data 

c. It creates a encrypted block of data 

d. none of the mentioned 


Answer- It creates a small,fixed block of data        


Que- MD5 produces __ bits hash data. 

a. 128 

b. 150 

c. 160 

d. 112 


Answer- 128        


Que- SHA-1 produces __ bit of hash. 

a. 128 

b. 160 

c. 150 

d. 112 


Answer- 160        


Que- Which two of the following are authentication algorithms ? 

a. MAC 

b. AES 

c. DAS 

d. Digital-signature 


Answer- MAC        


Que- What is role of Key Distribution Center ? 

a. It is used to distribute keys to everyone in world 

b. It intended to reduce the risks inherent in exchanging keys 

c. all of the mentioned 

d. none of the mentioned 


Answer- It intended to reduce the risks inherent in exchanging keys        


Que- Linux uses a time-sharing algorithm 

a. to pair preemptive scheduling between multiple processes 

b. for tasks where absolute priorities are more important than fairness 

c. all of the mentioned 

d. none of the mentioned  


Answer- to pair preemptive scheduling between multiple processes        


Que- First linux kernel which supports the SMP hardware was 

a. linux 0.1 

b. linux 1.0 

c. linux 1.2 

d. linux 2.0  


Answer- linux 2.0         


Que- Which one of the following linux file system does not support journaling feature? 

a. ext2 

b. ext3 

c. ext4 

d. none of the mentioned  


Answer- ext2        


Que- Which binary format is supported by linux? 

a. a.out 

b. elf 

c. both a.out and ELF 

d. none of the mentioned  


Answer- both a.out and ELF        


Que- Which one of the following bootloader is not used by linux? 

a. GRUB 

b. LILO 

c. NTLDR 

d. None of the mentioned  


Answer- NTLDR        


Que- The first process launched by the linux kernel is 

a. init process 

b. zombie process 

c. batch process 

d. boot process  


Answer- init process        


Que- Which desktop environment is not used in any linux distribution? 

a. gnome 

b. kde 

c. unity 

d. none of the mentioned  


Answer- none of the mentioned         


Que- Standard set of functions through which interacts with kernel is defined by 

a. system libraries 

b. kernel code 

c. compilers 

d. utility programs  


Answer- system libraries        


Que- Linux is 

a. single user, single tasking 

b. single user, multitasking 

c. multi user, single tasking 

d. multi user, multitasking  


Answer- multi user, multitasking         


Que- Which one of the following is not a linux distribution? 

a. debian 

b. gentoo 

c. open SUSE 

d. multics  


Answer- multics         


Que- Which one of the following is not shared by threads? 

a. program counter 

b. stack 

c. both program counter and stack 

d. none of the mentioned  


Answer- both program counter and stack        


Que- A process can be 

a. single threaded 

b. multithreaded 

c. both single threaded and multithreaded 

d. none of the mentioned  


Answer- both single threaded and multithreaded        


Que- If one thread opens a file with read privileges then 

a. other threads in the another process can also read from that file 

b. other threads in the same process can also read from that file 

c. any other thread can not read from that file 

d. all of the mentioned  


Answer- other threads in the same process can also read from that file        


Que- The time required to create a new thread in an existing process is 

a. greater than the time required to create a new process 

b. less than the time required to create a new process 

c. equal to the time required to create a new process 

d. none of the mentioned  


Answer- less than the time required to create a new process        


Que- When the event for which a thread is blocked occurs, 

a. thread moves to the ready queue 

b. thread remains blocked 

c. thread completes 

d. a new thread is provided  


Answer- thread moves to the ready queue        


Que- The jacketing technique is used to 

a. convert a blocking system call into non blocking system call 

b. create a new thread 

c. communicate between threads 

d. terminate a thread  


Answer- convert a blocking system call into non blocking system call        


Que- Termination of the process terminates 

a. first thread of the process 

b. first two threads of the process 

c. all threads within the process 

d. no thread within the process  


Answer- all threads within the process        


Que- Which one of the following is not a valid state of a thread? 

a. running 

b. parsing 

c. ready 

d. blocked  


Answer- parsing        


Que- The register context and stacks of a thread are deallocated when the thread 

a. terminates 

b. blocks 

c. unblocks 

d. spawns  


Answer- terminates        


Que- Thread synchronization is required because 

a. all threads of a process share the same address space 

b. all threads of a process share the same global variables 

c. all threads of a process can share the same files 

d. all of the mentioned  


Answer- all of the mentioned         


Que- A thread is also called : 

a. Light Weight Process(LWP) 

b. Heavy Weight Process(HWP) 

c. Process 

d. None of the mentioned 


Answer- Light Weight Process(LWP)        


Que- A thread shares its resources(like data section, code section, open files, signals) with : 

a. other process similar to the one that the thread belongs to 

b. other threads that belong to similar processes 

c. other threads that belong to the same process 

d. all of the mentioned 


Answer- other threads that belong to the same process        


Que- A heavy weight process : 

a. has multiple threads of execution 

b. has a single thread of execution 

c. can have multiple or a single thread for execution 

d. none of the mentioned 


Answer- has a single thread of execution        


Que- A process having multiple threads of control implies : 

a. it can do more than one task at a time 

b. it can do only one task at a time, but much faster 

c. it has to use only one thread per process 

d. none of the mentioned 


Answer- it can do more than one task at a time        


Que- Multithreading an interactive program will increase responsiveness to the user by : 

a. continuing to run even if a part of it is blocked 

b. waiting for one part to finish before the other begins 

c. asking the user to decide the order of multithreading 

d. none of the mentioned 


Answer- continuing to run even if a part of it is blocked        


Que- Resource sharing helps : 

a. share the memory and resources of the process to which the threads belong 

b. an application have several different threads of activity all within the same address space 

c. reduce the address space that a process could potentially use 

d. all of the mentioned 


Answer- all of the mentioned        


Que- Multithreading on a multi - CPU machine : 

a. decreases concurrency 

b. increases concurrency 

c. doesn't affect the concurrency 

d. can increase or decrease the concurrency 


Answer- increases concurrency        


Que- The kernel is _______ of user threads. 

a. a part of 

b. the creator of 

c. unaware of 

d. aware of 


Answer- unaware of        


Que- If the kernel is single threaded, then any user level thread performing a blocking system call will : 

a. cause the entire process to run along with the other threads 

b. cause the thread to block with the other threads running 

c. cause the entire process to block even if the other threads are available to run 

d. none of the mentioned 


Answer- cause the entire process to block even if the other threads are available to run        


Que- Because the kernel thread management is done by the Operating System itself : 

a. kernel threads are faster to create than user threads 

b. kernel threads are slower to create than user threads 

c. kernel threads are easier to manage as well as create then user threads 

d. none of the mentioned 


Answer- kernel threads are slower to create than user threads        


Que- If a kernel thread performs a blocking system call, ____________ 

a. the kernel can schedule another thread in the application for execution 

b. the kernel cannot schedule another thread in the same application for execution 

c. the kernel must schedule another thread of a different application for execution 

d. the kernel must schedule another thread of the same application on a different processor 


Answer- the kernel can schedule another thread in the application for execution        


Que- Which of the following is FALSE ? 

a. Context switch time is longer for kernel level threads than for user level threads 

b. User level threads do not need any hardware support 

c. Related kernel level threads can be scheduled on different processors in a multiprocessor system 

d. Blocking one kernel level thread blocks all other related threads 


Answer- Blocking one kernel level thread blocks all other related threads        


Que- The model in which one kernel thread is mapped to many user-level threads is called : 

a. Many to One model 

b. One to Many model 

c. Many to Many model 

d. One to One model 


Answer- Many to One model        


Que- The model in which one user-level thread is mapped to many kernel level threads is called : 

a. Many to One model 

b. One to Many model 

c. Many to Many model 

d. One to One model 


Answer- One to Many model        


Que- In the Many to One model, if a thread makes a blocking system call : 

a. the entire process will be blocked 

b. a part of the process will stay blocked, with the rest running 

c. the entire process will run 

d. none of the mentioned 


Answer- the entire process will be blocked        


Que- In the Many to One model, multiple threads are unable to run in parallel on multiprocessors because : 

a. only one thread can access the kernel at a time 

b. many user threads have access to just one kernel thread 

c. there is only one kernel thread 

d. none of the mentioned 


Answer- only one thread can access the kernel at a time        


Previous Post Next Post