Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

The replacement of a bad block generally is not totally automatic because ___________(a) data in bad block can not be replaced(b) data in bad block is usually lost(c) bad block does not contain any data(d) none of the mentionedI had been asked this question during a job interview.This interesting question is from Secondary Storage topic in division Security of Operating System

Answer»

The CORRECT CHOICE is (b) data in bad block is usually lost

To explain I WOULD say: NONE.

2.

What will happen during the recovery from a failure?(a) each pair of physical block is examined(b) specified pair of physical block is examined(c) first pair of physical block is examined(d) none of the mentionedThe question was posed to me in an interview for job.Asked question is from Secondary Storage in portion Security of Operating System

Answer»

The correct choice is (a) each PAIR of physical BLOCK is examined

Explanation: None.

3.

When we write something on the disk, which one of the following can not happen?(a) successful completion(b) partial failure(c) total failure(d) none of the mentionedThe question was posed to me by my college director while I was bunking the class.This intriguing question originated from Secondary Storage in chapter Security of Operating System

Answer» CORRECT ANSWER is (d) NONE of the mentioned

Easiest EXPLANATION - None.
4.

RAID level 1 refers to ___________(a) disk arrays with striping(b) disk mirroring(c) both disk arrays with striping and disk mirroring(d) none of the mentionedThe question was asked during a job interview.My doubt is from Secondary Storage in portion Security of Operating System

Answer»

The correct ANSWER is (B) disk mirroring

Explanation: A VARIETY of disk-organization techniques is called “redundant arrays of independent disks (RAID)”.

5.

A swap space can reside in___________(a) Separate disk partition(b) RAM(c) Cache(d) None of the mentionedI had been asked this question in an internship interview.Origin of the question is Secondary Storage topic in chapter Security of Operating System

Answer»

The correct option is (a) SEPARATE DISK partition

To EXPLAIN: NONE.

6.

The operating system is responsible for?(a) disk initialization(b) booting from disk(c) bad-block recovery(d) all of the mentionedThis question was addressed to me in homework.Query is from Secondary Storage topic in chapter Security of Operating System

Answer» CORRECT ANSWER is (d) all of the mentioned

Explanation: NONE.
7.

Which algorithm of disk scheduling selects the request with the least seek time from the current head positions?(a) SSTF scheduling(b) FCFS scheduling(c) SCAN scheduling(d) LOOK schedulingI got this question during an internship interview.Question is taken from Secondary Storage in division Security of Operating System

Answer» CORRECT CHOICE is (a) SSTF scheduling

The EXPLANATION: NONE.
8.

The time for the disk arm to move the heads to the cylinder containing the desired sector is called ___________(a) disk time(b) seek time(c) arm time(d) sector timeThe question was posed to me in exam.This intriguing question originated from Secondary Storage in portion Security of Operating System

Answer»

The CORRECT OPTION is (B) SEEK time

Explanation: NONE.

9.

Which private network uses storage protocol rather than networking protocol?(a) storage area network(b) local area network(c) wide area network(d) none of the mentionedThe question was posed to me during an online exam.The question is from Secondary Storage in chapter Security of Operating System

Answer»

Right CHOICE is (a) STORAGE area network

Best EXPLANATION: NONE.

10.

Which one of the following is not a secondary storage?(a) Magnetic disks(b) Magnetic tapes(c) RAM(d) None of the mentionedThe question was asked in unit test.I would like to ask this question from Secondary Storage in division Security of Operating System

Answer»

The correct answer is (C) RAM

The BEST I can EXPLAIN: NONE.

11.

What is the role of Key Distribution Center?(a) It is used to distribute keys to everyone in world(b) It intended to reduce the risks inherent in exchanging keys(c) All of the mentioned(d) None of the mentionedI have been asked this question during an interview.I'm obligated to ask this question of Security topic in chapter Security of Operating System

Answer» RIGHT choice is (B) It INTENDED to REDUCE the risks inherent in exchanging keys

Best explanation: NONE.
12.

Which two of the following are authentication algorithms?(a) MAC(b) AES(c) DAS(d) Digital-signatureThis question was addressed to me during an online interview.My doubt stems from Security in chapter Security of Operating System

Answer» RIGHT CHOICE is (a) MAC

For EXPLANATION: NONE.
13.

SHA-1 produces __________ bit of hash.(a) 128(b) 160(c) 150(d) 112This question was posed to me during an interview.My question is from Security in section Security of Operating System

Answer»

The CORRECT OPTION is (B) 160

Explanation: NONE.

14.

MD5 produces __________ bits hash data.(a) 128(b) 150(c) 160(d) 112I had been asked this question in final exam.Question is taken from Security in chapter Security of Operating System

Answer» CORRECT CHOICE is (a) 128

Best EXPLANATION: NONE.
15.

What is a Hash Function?(a) It creates a small flexible block of data(b) It creates a small,fixed block of data(c) It creates a encrypted block of data(d) None of the mentionedThe question was posed to me by my college director while I was bunking the class.The question is from Security topic in division Security of Operating System

Answer» CORRECT CHOICE is (b) It creates a small,fixed BLOCK of data

Explanation: None.
16.

Which of the following is not a stream cipher?(a) Two fish(b) RC5(c) RC4(d) TBONEThe question was asked in an interview.This interesting question is from Security topic in section Security of Operating System

Answer» RIGHT CHOICE is (d) TBONE

Best EXPLANATION: NONE.
17.

What is not an encryption standard?(a) AES(b) TES(c) Triple DES(d) DESThis question was posed to me during an interview.I'd like to ask this question from Security topic in chapter Security of Operating System

Answer» CORRECT answer is (b) TES

The BEST explanation: NONE.
18.

What is cipher-block chaining?(a) Data is logically ‘ANDed’ with previous block(b) Data is logically ‘ORed’ with previous block(c) Data is logically ‘XORed’ with previous block(d) None of the mentionedI have been asked this question in final exam.I would like to ask this question from Security in portion Security of Operating System

Answer»

The correct CHOICE is (c) Data is logically ‘XORED’ with PREVIOUS block

Explanation: None.

19.

What is not a role of encryption?(a) It is used to protect data from unauthorized access during transmission(b) It is used to ensure user authentication(c) It is used to ensure data integrity(d) It is used to ensure data corruption doesn’t happensI had been asked this question in a job interview.Asked question is from Security in chapter Security of Operating System

Answer»

Correct answer is (d) It is used to ENSURE DATA corruption doesn’t happens

To EXPLAIN: Encryption doesn’t have error correction or detection facility thus cannot be used to safeguard from data corruption.

20.

What is the preferred way of encryption?(a) pre shared secret key(b) using key distribution center (KDC)(c) public key-encryption(d) symmetric keyI have been asked this question in an international level competition.The doubt is from Security topic in chapter Security of Operating System

Answer»

Right CHOICE is (c) public key-encryption

For explanation: Pre Shared key can be compromised and either party can be suspected. Likewise KDC or symmetric key can have breach which are UNDESIRABLE. Public and private key encryption is a KNOWN INDUSTRY standard.

21.

What are strengths of Network based IDS?(a) Cost of ownership reduced(b) Malicious intent detection(c) Real time detection and response(d) All of the mentionedI had been asked this question in an online quiz.This is a very interesting question from Security in portion Security of Operating System

Answer»

Correct CHOICE is (d) All of the mentioned

To explain I WOULD say: NONE.

22.

What are characteristics of Network based IDS?(a) They look for attack signatures in network traffic(b) Filter decides which traffic will not be discarded or passed(c) It is programmed to interpret a certain series of packet(d) It models the normal usage of network as a noise characterizationI have been asked this question in a national level competition.This question is from Security topic in division Security of Operating System

Answer» CORRECT choice is (a) They LOOK for ATTACK signatures in NETWORK traffic

The best I can EXPLAIN: None.
23.

What are characteristics of stack based IDS?(a) They are integrated closely with the TCP/IP stack and watch packets(b) The host operating system logs in the audit information(c) It is programmed to interpret a certain series of packets(d) It models the normal usage of network as a noise characterizationI had been asked this question in unit test.This question is from Security in chapter Security of Operating System

Answer»

Right CHOICE is (a) They are integrated CLOSELY with the TCP/IP STACK and watch packets

The explanation is: NONE.

24.

What are the strengths of the host based IDS?(a) Attack verification(b) System specific activity(c) No additional hardware required(d) All of the mentionedThe question was asked in an internship interview.My doubt stems from Security in division Security of Operating System

Answer» RIGHT OPTION is (d) All of the mentioned

Easy EXPLANATION - NONE.
25.

What are the drawbacks of the host based IDS?(a) Unselective logging of messages may increase the audit burdens(b) Selective logging runs the risk of missed attacks(c) They are very fast to detect(d) They have to be programmed for new patternsI have been asked this question in an interview.This question is from Security topic in portion Security of Operating System

Answer» RIGHT ANSWER is (a) Unselective LOGGING of messages may INCREASE the AUDIT burdens

Explanation: None.
26.

What are the characteristics of Host based IDS?(a) The host operating system logs in the audit information(b) Logs includes logins,file opens and program executions(c) Logs are analysed to detect tails of intrusion(d) All of the mentionedThe question was posed to me in an internship interview.This question is from Security in chapter Security of Operating System

Answer»

The CORRECT ANSWER is (d) All of the mentioned

Best EXPLANATION: NONE.

27.

What are the drawbacks of signature based IDS?(a) They are unable to detect novel attacks(b) They suffer from false alarms(c) They have to be programmed again for every new pattern to be detected(d) All of the mentionedI have been asked this question at a job interview.My doubt stems from Security topic in division Security of Operating System

Answer» CORRECT CHOICE is (d) All of the mentioned

The BEST EXPLANATION: NONE.
28.

What are the characteristics of signature based IDS?(a) Most are based on simple pattern matching algorithms(b) It is programmed to interpret a certain series of packets(c) It models the normal usage of network as a noise characterization(d) Anything distinct from the noise is assumed to be intrusion activityThis question was posed to me by my college professor while I was bunking the class.This is a very interesting question from Security in portion Security of Operating System

Answer»

The correct answer is (a) Most are BASED on SIMPLE PATTERN MATCHING algorithms

The explanation: NONE.

29.

What is the major drawback of anomaly detection IDS?(a) These are very slow at detection(b) It generates many false alarms(c) It doesn’t detect novel attacks(d) None of the mentionedI had been asked this question during an interview.The question is from Security topic in portion Security of Operating System

Answer» CORRECT option is (B) It generates many false alarms

Best explanation: NONE.
30.

What are the characteristics of anomaly based IDS?(a) It models the normal usage of network as a noise characterization(b) It doesn’t detect novel attacks(c) Anything distinct from the noise is not assumed to be intrusion activity(d) It detects based on signatureThis question was addressed to me in examination.I need to ask this question from Security topic in chapter Security of Operating System

Answer» RIGHT option is (a) It models the normal USAGE of network as a noise characterization

The EXPLANATION is: NONE.
31.

What are the different ways to classify an IDS?(a) Zone based(b) Host & Network based(c) Network & Zone based(d) Level basedThis question was addressed to me in a job interview.The query is from Security in division Security of Operating System

Answer»

The correct option is (b) Host & NETWORK based

Best explanation: NONE.

32.

What are the different ways to classify an IDS?(a) anomaly detection(b) signature based misuse(c) stack based(d) all of the mentionedThis question was posed to me during an interview.My question is based upon Security topic in chapter Security of Operating System

Answer»

The CORRECT OPTION is (d) all of the mentioned

To EXPLAIN: NONE.

33.

What are the major components of the intrusion detection system?(a) Analysis Engine(b) Event provider(c) Alert Database(d) All of the mentionedI got this question during an online interview.My question comes from Security in section Security of Operating System

Answer» RIGHT ANSWER is (d) All of the mentioned

Explanation: NONE.
34.

What are the different ways to intrude?(a) Buffer overflows(b) Unexpected combinations and unhandled input(c) Race conditions(d) All of the mentionedThis question was addressed to me during an online interview.My question is from Security in division Security of Operating System

Answer» RIGHT OPTION is (d) All of the mentioned

The BEST EXPLANATION: NONE.
35.

What is are two safe computing practices?(a) Not to open software from unknown vendors(b) Open and execute programs in admin level/root(c) Open and execute programs in presence of antivirus(d) None of the mentionedThis question was addressed to me by my school teacher while I was bunking the class.My doubt is from Security topic in division Security of Operating System

Answer»

Right choice is (a) Not to open software from unknown vendors

The best I can explain: DISGRUNTLED employees have in PAST INFECTED the master copies of software programs to do economic HARM to the COMPANY.

36.

What is known as a sandbox?(a) It is a program which can be molded to do the desired task(b) It is a program that is controlled or emulated section of OS(c) It is a special mode of antivirus(d) None of the mentionedThe question was asked during an interview.I need to ask this question from Security topic in portion Security of Operating System

Answer»

Correct OPTION is (b) It is a program that is controlled or EMULATED SECTION of OS

The explanation is: None.

37.

How does an antivirus of today identify viruses?(a) Previously known patterns(b) It can detect unknown patterns(c) It can take high priority to increase scanning speed(d) None of the mentionedThis question was addressed to me in an internship interview.My question is based upon Security topic in chapter Security of Operating System

Answer»

The CORRECT OPTION is (a) PREVIOUSLY known patterns

Best explanation: NONE.

38.

How do viruses avoid basic pattern match of antivirus?(a) They are encrypted(b) They act with special permissions(c) They modify themselves(d) None of the mentionedThe question was posed to me in an internship interview.Question is taken from Security topic in chapter Security of Operating System

Answer» RIGHT OPTION is (c) They modify themselves

The best I can EXPLAIN: None.
39.

What are the two features of a tripwire file system?(a) It is a tool to monitor file systems(b) It is used to automatically take corrective action(c) It is used to secure UNIX system(d) None of the mentionedThe question was posed to me by my college director while I was bunking the class.Asked question is from Security in portion Security of Operating System

Answer» CORRECT OPTION is (a) It is a tool to MONITOR file systems

To explain: None.
40.

Which direction access cannot happen using DMZ zone by default?(a) Company computer to DMZ(b) Internet to DMZ(c) Internet tocompany computer(d) Company computer to internetI got this question by my college professor while I was bunking the class.This intriguing question comes from Security topic in section Security of Operating System

Answer»

The correct answer is (c) Internet tocompany computer

The EXPLANATION is: Connection from internet is never ALLOWED to DIRECTLY access internal PCs but is ROUTED through DMZ zone to prevent attacks.

41.

What is the best practice in the firewall domain environment?(a) Create two domain trusted and untrusted domain(b) Create strong policy in firewall to support different types of users(c) Create a Demilitarized zone(d) Create two DMZ zones with one untrusted domainThe question was posed to me during an internship interview.Question is from Security in division Security of Operating System

Answer»

Correct choice is (C) Create a Demilitarized zone

To explain I WOULD say: All live SERVERS or workstations are KEPT in a separate zone than INSIDE and outside to enhance protection.

42.

What is used to protect network from outside internet access?(a) A trusted antivirus(b) 24 hours scanning for virus(c) Firewall to separate trusted and untrusted network(d) Deny users access to websites which can potentially cause security leakI have been asked this question during an interview for a job.My enquiry is from Security in division Security of Operating System

Answer»

Right ANSWER is (c) Firewall to separate trusted and untrusted NETWORK

To explain: Firewall create a protective barrier to secure INTERNAL network. An antivirus can only detect harmful viruses but cannot stop ILLEGAL access by remote attacker.

43.

What is not an important part of security protection?(a) Large amount of RAM to support antivirus(b) Strong passwords(c) Audit log periodically(d) Scan for unauthorized programs in system directoriesI have been asked this question in unit test.My query is from Security topic in chapter Security of Operating System

Answer»

Right answer is (a) LARGE amount of RAM to SUPPORT antivirus

The explanation: RAM has no effect on SECURITY of a SYSTEM. System’s protection remains unchanged in increasing or decreasing amount of RAM.

44.

With regard to DOS attack what is not true from below options?(a) We can stop DOS attack completely(b) By upgrading OS vulnerability we can stop DOS attack to some extent(c) DOS attack has to be stopped at network level(d) Such attack can last for hoursThis question was addressed to me during an interview.This intriguing question originated from Security topic in portion Security of Operating System

Answer»

The CORRECT CHOICE is (a) We can stop DOS ATTACK completely

Best EXPLANATION: NONE.

45.

What is known as a DOS attack?(a) It is attacked to block traffic of network(b) It is attacked to harm contents stored in HDD by worm spawn processes(c) It is an attempt to make a machine or network resource unavailable(d) None of the mentionedI have been asked this question at a job interview.I need to ask this question from Security topic in division Security of Operating System

Answer»

The correct OPTION is (c) It is an ATTEMPT to make a machine or NETWORK RESOURCE unavailable

To explain: None.

46.

What are zombie systems?(a) Are specific system which are designed to attack by manufacturer(b) They are network of known hacking group(c) These systems are previously compromised independent systems(d) None of the mentionedThis question was addressed to me in homework.I'm obligated to ask this question of Security topic in division Security of Operating System

Answer» RIGHT choice is (c) These systems are PREVIOUSLY compromised independent systems

For EXPLANATION: None.
47.

Which is not a valid port scan type?(a) ACK scanning(b) Window scanning(c) IGMP scan(d) FIN scanningThe question was posed to me in semester exam.I need to ask this question from Security topic in portion Security of Operating System

Answer»

Correct answer is (C) IGMP scan

Easy EXPLANATION - NONE.

48.

Which is not a port scan type?(a) TCP scanning(b) SYN scanning(c) UDP scanning(d) SYSTEMScanningThe question was posed to me in quiz.The query is from Security topic in chapter Security of Operating System

Answer»

The CORRECT ANSWER is (d) SYSTEMScanning

Easy EXPLANATION - NONE.

49.

What is port scanning?(a) It is a software used to scan system for attack(b) It is a software application designed to probe a server or host for open ports(c) It is software used to scan system for introducing attacks by brute force(d) None of the mentionedThis question was addressed to me in a job interview.My question is based upon Security topic in chapter Security of Operating System

Answer»

The correct option is (B) It is a software application DESIGNED to PROBE a server or host for open ports

To EXPLAIN: NONE.

50.

Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?(a) Robert Morris(b) Bob Milano(c) Mark zuckerberg(d) Bill GatesThis question was addressed to me during an internship interview.This is a very interesting question from Security in section Security of Operating System

Answer» RIGHT CHOICE is (a) ROBERT Morris

Easiest EXPLANATION - NONE.