Operating system mcqs security program system threats

DOWNLOAD FREE PDF <<CLICK HERE>>

Operating system mcqs security program system threats

Question 1 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
With regard to DOS attack what is not true from below options?
A
We can stop DOS attack completely
B
By upgrading OS vulnerability we can stop DOS attack to some extent
C
DOS attack has to be stopped at network level
D
Such attack can last for hours
Question 2 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is breach of availability?
A
This type of violation involves unauthorized reading of data
B
This violation involves unauthorized modification of data
C
This violation involves unauthorized destruction of data
D
This violation involves unauthorized use of resources
Question 3 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is Trojan horse?
A
It is a useful way to encrypt password
B
It is a user which steals valuable information
C
It is a rogue program which tricks users
D
It's a brute force attack algorithm
Question 4 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is theft of service?
A
This type of violation involves unauthorized reading of data
B
This violation involves unauthorized modification of data
C
This violation involves unauthorized destruction of data
D
This violation involves unauthorized use of resources
Question 5 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which is not a port scan type?
A
TCP scanning
B
SYN scanning
C
UDP scanning
D
SYSTEM Scanning
There are 5 questions to complete.

DOWNLOAD FREE PDF <<CLICK HERE>>