Security and Protection Mechanisms # MCQs Practice set

Q.1 Which of the following is the primary goal of operating system security mechanisms?

Efficiency
Data protection
User interface design
Resource scheduling
Explanation - The main purpose of OS security is to protect data and resources from unauthorized access or modification.
Correct answer is: Data protection

Q.2 What is the purpose of an access control list (ACL)?

Scheduling processes
Defining which users can access which resources
Allocating memory
Managing deadlocks
Explanation - ACLs specify permissions for users and groups over system objects like files and directories.
Correct answer is: Defining which users can access which resources

Q.3 Which mechanism ensures that users access only the resources they are authorized for?

Virtual memory
Access control
Paging
Deadlock prevention
Explanation - Access control restricts resource use to authorized users or processes only.
Correct answer is: Access control

Q.4 The principle of 'least privilege' in operating systems means:

Giving users unlimited access
Providing users the minimum access needed
Allowing root access to everyone
Disabling user restrictions
Explanation - Least privilege reduces risks by ensuring users can only perform tasks essential for their roles.
Correct answer is: Providing users the minimum access needed

Q.5 Which of these is NOT a security threat to an operating system?

Virus
Worm
Deadlock
Trojan horse
Explanation - Deadlock is a resource management issue, not a security threat.
Correct answer is: Deadlock

Q.6 Which OS component enforces security policies?

Kernel
Compiler
Scheduler
Device driver
Explanation - The kernel enforces security policies since it controls access to hardware and resources.
Correct answer is: Kernel

Q.7 What does authentication verify?

Who the user is
What the user can access
When the user logged in
How fast the system runs
Explanation - Authentication ensures the identity of the user by mechanisms like passwords or biometrics.
Correct answer is: Who the user is

Q.8 What does authorization determine?

Who the user is
What resources the user is allowed to use
System boot sequence
Network latency
Explanation - Authorization defines user rights and permissions after authentication is done.
Correct answer is: What resources the user is allowed to use

Q.9 Which of these is an example of biometric authentication?

Password
Fingerprint
Captcha
PIN
Explanation - Biometric authentication uses unique physical characteristics like fingerprints or iris scans.
Correct answer is: Fingerprint

Q.10 Which of these is a discretionary access control mechanism?

Mandatory access control
Role-based access control
Access control lists
Multilevel security
Explanation - ACLs allow resource owners to set permissions, hence discretionary in nature.
Correct answer is: Access control lists

Q.11 Which type of malware disguises itself as legitimate software?

Worm
Trojan horse
Virus
Rootkit
Explanation - Trojans mislead users by appearing as safe software but contain malicious code.
Correct answer is: Trojan horse

Q.12 In operating systems, protection domains define:

Memory size
CPU allocation
Set of resources accessible to a process
Network speed
Explanation - Protection domains specify the rights and resources processes can access.
Correct answer is: Set of resources accessible to a process

Q.13 What is the role of encryption in OS security?

Speeding up processing
Protecting data confidentiality
Managing multitasking
Reducing memory usage
Explanation - Encryption prevents unauthorized access to data by converting it into unreadable form.
Correct answer is: Protecting data confidentiality

Q.14 Which attack involves overwhelming a system with requests to make it unavailable?

Phishing
Denial of Service
Trojan horse
Brute force
Explanation - DoS attacks flood resources with traffic, making them inaccessible to legitimate users.
Correct answer is: Denial of Service

Q.15 Which of these ensures integrity of files in an operating system?

Checksums
Scheduling
Deadlock detection
Paging
Explanation - Checksums verify file contents have not been altered or corrupted.
Correct answer is: Checksums

Q.16 What is the function of an intrusion detection system (IDS)?

Allocating CPU resources
Detecting unauthorized system access
Managing memory
Scheduling jobs
Explanation - IDS identifies and reports suspicious or unauthorized activities.
Correct answer is: Detecting unauthorized system access

Q.17 Which of the following is an example of two-factor authentication?

Password only
PIN only
Fingerprint only
Password + OTP
Explanation - Two-factor authentication combines two different verification methods like password and OTP.
Correct answer is: Password + OTP

Q.18 Which of these is NOT part of the CIA triad in security?

Confidentiality
Integrity
Availability
Authenticity
Explanation - The CIA triad includes Confidentiality, Integrity, and Availability, not authenticity.
Correct answer is: Authenticity

Q.19 What is sandboxing in operating systems?

A memory management scheme
Restricting application execution to a safe environment
A scheduling algorithm
A caching mechanism
Explanation - Sandboxing isolates applications to minimize damage if they are compromised.
Correct answer is: Restricting application execution to a safe environment

Q.20 Which access control model is commonly used in military systems?

Discretionary
Mandatory
Role-based
Token-based
Explanation - Mandatory access control enforces strict policies, often used in military and government.
Correct answer is: Mandatory

Q.21 Which of these is the main purpose of auditing in OS security?

Improving performance
Tracking user activities
Allocating resources
Avoiding deadlocks
Explanation - Auditing records user and system activities for accountability and forensic analysis.
Correct answer is: Tracking user activities

Q.22 What is the role of a firewall in operating system security?

Managing processes
Filtering network traffic
Encrypting files
Controlling memory
Explanation - Firewalls block or allow network packets based on security rules.
Correct answer is: Filtering network traffic

Q.23 Which technique prevents buffer overflow attacks?

Stack canaries
Paging
Scheduling
Segmentation
Explanation - Stack canaries detect modifications to stack memory, helping prevent buffer overflow exploits.
Correct answer is: Stack canaries

Q.24 Which of these ensures non-repudiation in system security?

Digital signatures
Passwords
Firewalls
Checksums
Explanation - Digital signatures provide proof of authorship, ensuring non-repudiation.
Correct answer is: Digital signatures

Q.25 Which process ensures that old, unused credentials are not exploited?

Key revocation
Caching
Paging
Scheduling
Explanation - Key revocation ensures expired or compromised credentials are removed from the system.
Correct answer is: Key revocation