Que- What is breach of availability ?
a. This type of violation involves unauthorized reading of data
b. This violation involves unauthorized modification of data
c. This violation involves unauthorized destruction of data
d. This violation involves unauthorized use of resources
Answer- This violation involves unauthorized destruction of data
Que- What is Trojan horse ?
a. It is a useful way to encrypt password
b. It is a user which steals valuable information
c. It is a rogue program which tricks users
d. It's a brute force attack algorithm
Answer- It is a rogue program which tricks users
Que- What is trap door ?
a. IT is trap door in WarGames
b. It is a hole in software left by designer
c. It is a Trojan horse
d. It is a virus which traps and locks user terminal
Answer- It is a hole in software left by designer
Que- Which mechanism is used by worm process ?
a. Trap door
b. Fake process
c. Spawn Process
d. VAX process
Answer- Spawn Process
Que- Which of the following is not a characteristic of virus ?
a. Virus destroy and modify user data
b. Virus is a standalone program
c. Virus is a code embedded in a legitimate program
d. Virus cannot be detected
Answer- Virus cannot be detected
Que- What is known as masquerading ?
a. When one participant in communication pretends to be someone else
b. When attacker modifies data in communication
c. When attack is of fraudulent repeat of a valid data
d. When attack gains access to remote systems
Answer- When one participant in communication pretends to be someone else
Que- Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ?
a. Robert Morris
b. Bob Milano
c. Mark zuckerberg
d. Bill Gates
Answer- Robert Morris
Que- What is port scanning ?
a. It is a software used to scan system for attack
b. It is a software application designed to probe a server or host for open ports
c. It is software used to scan system for introducing attacks by brute force
d. None of the mentioned
Answer- It is a software application designed to probe a server or host for open ports
Que- Which is not a port scan type ?
a. TCP scanning
b. SYN scanning
c. UDP scanning
d. SYSTEM Scanning
Answer- SYSTEM Scanning
Que- Which is not a valid port scan type ?
a. ACK scanning
b. Window scanning
c. IGMP scan
d. FIN scanning
Answer- IGMP scan
Que- What are zombie systems ?
a. Are specific system which are designed to attack by manufacturer
b. They are network of known hacking group
c. These systems are previously compromised, independent systems
d. None of the mentioned
Answer- These systems are previously compromised, independent systems
Que- What is known as DOS attack ?
a. It is attack to block traffic of network
b. It is attack to harm contents stored in HDD by worm spawn processes
c. It is an attempt to make a machine or network resource unavailable
d. None of the mentioned
Answer- It is an attempt to make a machine or network resource unavailable
Que- With regard to DOS attack what is not true from below options ?
a. We can stop DOS attack completely
b. By upgrading OS vulnerability we can stop DOS attack to some extent
c. DOS attack has to be stopped at network level
d. Such attack can last for hours
Answer- We can stop DOS attack completely
Que- What is not a important part of security protection ?
a. Large amount of RAM to support antivirus
b. Strong passwords
c. Audit log periodically
d. Scan for unauthorized programs in system directories
Answer- Large amount of RAM to support antivirus
Que- What is used to protect network from outside internet access ?
a. A trusted antivirus
b. 24 hours scanning for virus
c. Firewall to separate trusted and untrusted network
d. Deny users access to websites which can potentially cause security leak
Answer- Firewall to separate trusted and untrusted network
Que- What is best practice in firewall domain environment ?
a. Create two domain trusted and untrusted domain
b. Create strong policy in firewall to support different types of users
c. Create a Demilitarized zone
d. Create two DMZ zones with one untrusted domain
Answer- Create a Demilitarized zone
Que- Which direction access cannot happen using DMZ zone by default ?
a. Company computer to DMZ
b. Internet to DMZ
c. Internet to company computer
d. Company computer to internet
Answer- Internet to company computer
Que- What are two features of a tripwire file system ?
a. It is a tool to monitor file systems
b. It is used to automatically take corrective action
c. It is used to secure UNIX system
d. None of the mentioned
Answer- It is a tool to monitor file systems
Que- How do viruses avoid basic pattern match of antivirus ?
a. They are encrypted
b. They act with special permissions
c. They modify themselves
d. None of the mentioned
Answer- They modify themselves
Que- How does an antivirus of today identify viruses ?
a. Previously known patterns
b. It can detect unknown patterns
c. It can take high priority to increase scanning speed
d. None of the mentioned
Answer- Previously known patterns
Que- What is known as sandbox ?
a. It is a program which can be molded to do desired task
b. It is program that is controlled or emulated section of OS
c. It is a special mode of antivirus
d. None of the mentioned
Answer- It is program that is controlled or emulated section of OS
Que- What is are two safe computing practices ?
a. Not to open software from unknown vendors
b. Open and execute programs in admin level/root
c. Open and execute programs in presence of antivirus
d. None of the mentioned
Answer- Not to open software from unknown vendors
Que- What are the different ways to intrude ?
a. Buffer overflows
b. Unexpected combinations and unhandled input
c. Race conditions
d. All of the mentioned
Answer- All of the mentioned
Que- What are major components of intrusion detection system ?
a. Analysis Engine
b. Event provider
c. Alert Database
d. All of the mentioned
Answer- All of the mentioned
Que- What are the different ways to classify an IDS ?
a. anomaly detection
b. signature based misuse
c. stack based
d. all of the mentioned
Answer- all of the mentioned
Que- What are the different ways to classify an IDS ?
a. Zone based
b. Host & Network based
c. Network & Zone based
d. Level based
Answer- Host & Network based
Que- What are characteristics of anomaly based IDS ?
a. It models the normal usage of network as a noise characterization
b. It doesn't detect novel attacks
c. Anything distinct from the noise is not assumed to be intrusion activity
d. It detects based on signature
Answer- It models the normal usage of network as a noise characterization
Que- What is major drawback of anomaly detection IDS ?
a. These are very slow at detection
b. It generates many false alarms
c. It doesn't detect novel attacks
d. None of the mentioned
Answer- It generates many false alarms
Que- What are characteristics of signature based IDS ?
a. Most are based on simple pattern matching algorithms
b. It is programmed to interpret a certain series of packets
c. It models the normal usage of network as a noise characterization
d. Anything distinct from the noise is assumed to be intrusion activity
Answer- Most are based on simple pattern matching algorithms
Que- What are drawbacks of signature based IDS ?
a. They are unable to detect novel attacks
b. They suffer from false alarms
c. They have to be programmed again for every new pattern to be detected
d. All of the mentioned
Answer- All of the mentioned
Que- What are characteristics of Host based IDS ?
a. The host operating system logs in the audit information
b. Logs includes logins,file opens and program executions
c. Logs are analysed to detect tails of intrusion
d. All of the mentioned
Answer- All of the mentioned
Que- What are drawbacks of the host based IDS ?
a. Unselective logging of messages may increase the audit burdens
b. Selective logging runs the risk of missed attacks
c. They are very fast to detect
d. They have to be programmed for new patterns
Answer- Unselective logging of messages may increase the audit burdens
Que- What are strengths of the host based IDS ?
a. Attack verification
b. System specific activity
c. No additional hardware required
d. All of the mentioned
Answer- All of the mentioned
Que- What are characteristics of stack based IDS ?
a. They are integrated closely with the TCP/IP stack and watch packets
b. The host operating system logs in the audit information
c. It is programmed to interpret a certain series of packets
d. It models the normal usage of network as a noise characterization
Answer- They are integrated closely with the TCP/IP stack and watch packets
Que- What are characteristics of Network based IDS ?
a. They look for attack signatures in network traffic
b. Filter decides which traffic will not be discarded or passed
c. It is programmed to interpret a certain series of packet
d. It models the normal usage of network as a noise characterization
Answer- They look for attack signatures in network traffic
Que- What are strengths of Network based IDS ?
a. Cost of ownership reduced
b. Malicious intent detection
c. Real time detection and response
d. All of the mentioned
Answer- All of the mentioned
Que- What is preferred way of encryption ?
a. pre shared secret key
b. using key distribution center (KDC)
c. public key-encryption
d. symmetric key
Answer- public key-encryption
Que- What is not a role of encryption ?
a. It is used to protect data from unauthorized access during transmission
b. It is used to ensure user authentication
c. It is used to ensure data integrity
d. It is used to ensure data corruption doesn't happens
Answer- It is used to ensure data corruption doesn't happens
Que- What is cipher-block chaining ?
a. Data is logically 'ANDed' with previous block
b. Data is logically 'ORed' with previous block
c. Data is logically 'XORed' with previous block
d. None of the mentioned
Answer- Data is logically 'XORed' with previous block
Que- What is not an encryption standard ?
a. AES
b. TES
c. Triple DES
d. DES
Answer- TES
Que- Which of following is not a stream cipher?
a. Two fish
b. RC5
c. RC4
d. TBONE
Answer- TBONE
Que- What is a Hash Function ?
a. It creates a small flexible block of data
b. It creates a small,fixed block of data
c. It creates a encrypted block of data
d. none of the mentioned
Answer- It creates a small,fixed block of data
Que- MD5 produces __ bits hash data.
a. 128
b. 150
c. 160
d. 112
Answer- 128
Que- SHA-1 produces __ bit of hash.
a. 128
b. 160
c. 150
d. 112
Answer- 160
Que- Which two of the following are authentication algorithms ?
a. MAC
b. AES
c. DAS
d. Digital-signature
Answer- MAC
Que- What is role of Key Distribution Center ?
a. It is used to distribute keys to everyone in world
b. It intended to reduce the risks inherent in exchanging keys
c. all of the mentioned
d. none of the mentioned
Answer- It intended to reduce the risks inherent in exchanging keys
Que- Linux uses a time-sharing algorithm
a. to pair preemptive scheduling between multiple processes
b. for tasks where absolute priorities are more important than fairness
c. all of the mentioned
d. none of the mentioned
Answer- to pair preemptive scheduling between multiple processes
Que- First linux kernel which supports the SMP hardware was
a. linux 0.1
b. linux 1.0
c. linux 1.2
d. linux 2.0
Answer- linux 2.0
Que- Which one of the following linux file system does not support journaling feature?
a. ext2
b. ext3
c. ext4
d. none of the mentioned
Answer- ext2
Que- Which binary format is supported by linux?
a. a.out
b. elf
c. both a.out and ELF
d. none of the mentioned
Answer- both a.out and ELF
Que- Which one of the following bootloader is not used by linux?
a. GRUB
b. LILO
c. NTLDR
d. None of the mentioned
Answer- NTLDR
Que- The first process launched by the linux kernel is
a. init process
b. zombie process
c. batch process
d. boot process
Answer- init process
Que- Which desktop environment is not used in any linux distribution?
a. gnome
b. kde
c. unity
d. none of the mentioned
Answer- none of the mentioned
Que- Standard set of functions through which interacts with kernel is defined by
a. system libraries
b. kernel code
c. compilers
d. utility programs
Answer- system libraries
Que- Linux is
a. single user, single tasking
b. single user, multitasking
c. multi user, single tasking
d. multi user, multitasking
Answer- multi user, multitasking
Que- Which one of the following is not a linux distribution?
a. debian
b. gentoo
c. open SUSE
d. multics
Answer- multics
Que- Which one of the following is not shared by threads?
a. program counter
b. stack
c. both program counter and stack
d. none of the mentioned
Answer- both program counter and stack
Que- A process can be
a. single threaded
b. multithreaded
c. both single threaded and multithreaded
d. none of the mentioned
Answer- both single threaded and multithreaded
Que- If one thread opens a file with read privileges then
a. other threads in the another process can also read from that file
b. other threads in the same process can also read from that file
c. any other thread can not read from that file
d. all of the mentioned
Answer- other threads in the same process can also read from that file
Que- The time required to create a new thread in an existing process is
a. greater than the time required to create a new process
b. less than the time required to create a new process
c. equal to the time required to create a new process
d. none of the mentioned
Answer- less than the time required to create a new process
Que- When the event for which a thread is blocked occurs,
a. thread moves to the ready queue
b. thread remains blocked
c. thread completes
d. a new thread is provided
Answer- thread moves to the ready queue
Que- The jacketing technique is used to
a. convert a blocking system call into non blocking system call
b. create a new thread
c. communicate between threads
d. terminate a thread
Answer- convert a blocking system call into non blocking system call
Que- Termination of the process terminates
a. first thread of the process
b. first two threads of the process
c. all threads within the process
d. no thread within the process
Answer- all threads within the process
Que- Which one of the following is not a valid state of a thread?
a. running
b. parsing
c. ready
d. blocked
Answer- parsing
Que- The register context and stacks of a thread are deallocated when the thread
a. terminates
b. blocks
c. unblocks
d. spawns
Answer- terminates
Que- Thread synchronization is required because
a. all threads of a process share the same address space
b. all threads of a process share the same global variables
c. all threads of a process can share the same files
d. all of the mentioned
Answer- all of the mentioned
Que- A thread is also called :
a. Light Weight Process(LWP)
b. Heavy Weight Process(HWP)
c. Process
d. None of the mentioned
Answer- Light Weight Process(LWP)
Que- A thread shares its resources(like data section, code section, open files, signals) with :
a. other process similar to the one that the thread belongs to
b. other threads that belong to similar processes
c. other threads that belong to the same process
d. all of the mentioned
Answer- other threads that belong to the same process
Que- A heavy weight process :
a. has multiple threads of execution
b. has a single thread of execution
c. can have multiple or a single thread for execution
d. none of the mentioned
Answer- has a single thread of execution
Que- A process having multiple threads of control implies :
a. it can do more than one task at a time
b. it can do only one task at a time, but much faster
c. it has to use only one thread per process
d. none of the mentioned
Answer- it can do more than one task at a time
Que- Multithreading an interactive program will increase responsiveness to the user by :
a. continuing to run even if a part of it is blocked
b. waiting for one part to finish before the other begins
c. asking the user to decide the order of multithreading
d. none of the mentioned
Answer- continuing to run even if a part of it is blocked
Que- Resource sharing helps :
a. share the memory and resources of the process to which the threads belong
b. an application have several different threads of activity all within the same address space
c. reduce the address space that a process could potentially use
d. all of the mentioned
Answer- all of the mentioned
Que- Multithreading on a multi - CPU machine :
a. decreases concurrency
b. increases concurrency
c. doesn't affect the concurrency
d. can increase or decrease the concurrency
Answer- increases concurrency
Que- The kernel is _______ of user threads.
a. a part of
b. the creator of
c. unaware of
d. aware of
Answer- unaware of
Que- If the kernel is single threaded, then any user level thread performing a blocking system call will :
a. cause the entire process to run along with the other threads
b. cause the thread to block with the other threads running
c. cause the entire process to block even if the other threads are available to run
d. none of the mentioned
Answer- cause the entire process to block even if the other threads are available to run
Que- Because the kernel thread management is done by the Operating System itself :
a. kernel threads are faster to create than user threads
b. kernel threads are slower to create than user threads
c. kernel threads are easier to manage as well as create then user threads
d. none of the mentioned
Answer- kernel threads are slower to create than user threads
Que- If a kernel thread performs a blocking system call, ____________
a. the kernel can schedule another thread in the application for execution
b. the kernel cannot schedule another thread in the same application for execution
c. the kernel must schedule another thread of a different application for execution
d. the kernel must schedule another thread of the same application on a different processor
Answer- the kernel can schedule another thread in the application for execution
Que- Which of the following is FALSE ?
a. Context switch time is longer for kernel level threads than for user level threads
b. User level threads do not need any hardware support
c. Related kernel level threads can be scheduled on different processors in a multiprocessor system
d. Blocking one kernel level thread blocks all other related threads
Answer- Blocking one kernel level thread blocks all other related threads
Que- The model in which one kernel thread is mapped to many user-level threads is called :
a. Many to One model
b. One to Many model
c. Many to Many model
d. One to One model
Answer- Many to One model
Que- The model in which one user-level thread is mapped to many kernel level threads is called :
a. Many to One model
b. One to Many model
c. Many to Many model
d. One to One model
Answer- One to Many model
Que- In the Many to One model, if a thread makes a blocking system call :
a. the entire process will be blocked
b. a part of the process will stay blocked, with the rest running
c. the entire process will run
d. none of the mentioned
Answer- the entire process will be blocked
Que- In the Many to One model, multiple threads are unable to run in parallel on multiprocessors because :
a. only one thread can access the kernel at a time
b. many user threads have access to just one kernel thread
c. there is only one kernel thread
d. none of the mentioned
Answer- only one thread can access the kernel at a time