InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
What is known as masquerading?(a) When one participant in communication pretends to be someone else(b) When attacker modifies data in communication(c) When attack is of fraudulent repeat of a valid data(d) When attack gains access to remote systemsThis question was addressed to me in examination.My query is from Security in chapter Security of Operating System |
|
Answer» The correct option is (a) When one PARTICIPANT in COMMUNICATION pretends to be someone else |
|
| 52. |
Which of the following is not a characteristic of a virus?(a) Virus destroy and modify user data(b) Virus is a standalone program(c) Virus is a code embedded in a legitimate program(d) Virus cannot be detectedThis question was addressed to me during an online interview.This is a very interesting question from Security in chapter Security of Operating System |
|
Answer» Right ANSWER is (d) Virus cannot be DETECTED |
|
| 53. |
Which mechanism is used by worm process?(a) Trap door(b) Fake process(c) Spawn Process(d) VAX processThis question was addressed to me in an interview for internship.This is a very interesting question from Security in division Security of Operating System |
|
Answer» CORRECT ANSWER is (c) Spawn Process For explanation: NONE. |
|
| 54. |
What is trap door?(a) IT is trap door in WarGames(b) It is a hole in software left by designer(c) It is a Trojan horse(d) It is a virus which traps and locks user terminalThis question was addressed to me in a job interview.This is a very interesting question from Security topic in chapter Security of Operating System |
|
Answer» CORRECT ANSWER is (B) It is a hole in SOFTWARE left by designer The explanation: NONE. |
|
| 55. |
What is Trojan horse?(a) It is a useful way to encrypt password(b) It is a user which steals valuable information(c) It is a rogue program which tricks users(d) It’s a brute force attack algorithmI have been asked this question by my school teacher while I was bunking the class.Asked question is from Security in chapter Security of Operating System |
|
Answer» The CORRECT option is (c) It is a rogue program which TRICKS users |
|
| 56. |
What is breach of availability?(a) This type of violation involves unauthorized reading of data(b) This violation involves unauthorized modification of data(c) This violation involves unauthorized destruction of data(d) This violation involves unauthorized use of resourcesThe question was posed to me in an interview for job.I would like to ask this question from Security topic in chapter Security of Operating System |
|
Answer» The correct CHOICE is (C) This VIOLATION involves UNAUTHORIZED destruction of data |
|
| 57. |
What is theft of service?(a) This type of violation involves unauthorized reading of data(b) This violation involves unauthorized modification of data(c) This violation involves unauthorized destruction of data(d) This violation involves unauthorized use of resourcesI had been asked this question by my school principal while I was bunking the class.My question is from Security topic in chapter Security of Operating System |
|
Answer» CORRECT answer is (d) This VIOLATION INVOLVES unauthorized use of resources Explanation: None. |
|
| 58. |
What is breach of confidentiality?(a) This type of violation involves unauthorized reading of data(b) This violation involves unauthorized modification of data(c) This violation involves unauthorized destruction of data(d) This violation involves unauthorized use of resourcesThis question was addressed to me in my homework.The origin of the question is Security in portion Security of Operating System |
|
Answer» The correct answer is (a) This type of violation involves UNAUTHORIZED READING of data |
|
| 59. |
What is the breach of integrity?(a) This type of violation involves unauthorized reading of data(b) This violation involves unauthorized modification of data(c) This violation involves unauthorized destruction of data(d) This violation involves unauthorized use of resourcesI got this question in an international level competition.This intriguing question originated from Security in division Security of Operating System |
|
Answer» Correct ANSWER is (B) This VIOLATION involves unauthorized modification of data |
|
| 60. |
What is not a best practice for password policy?(a) Deciding maximum age of password(b) Restriction on password reuse and history(c) Password encryption(d) Having change password every 2 yearsThis question was posed to me at a job interview.This question is from Security in division Security of Operating System |
|
Answer» The correct option is (d) Having CHANGE PASSWORD every 2 years |
|
| 61. |
What forces the user to change password at first login?(a) Default behavior of OS(b) Part of AES encryption practice(c) Devices being accessed forces the user(d) Account administratorI had been asked this question in an online quiz.My query is from Security topic in division Security of Operating System |
|
Answer» The correct answer is (d) Account administrator |
|
| 62. |
What are the characteristics of Authorization?(a) RADIUS and RSA(b) 3 way handshaking with syn and fin(c) Multilayered protection for securing resources(d) Deals with privileges and rightsI have been asked this question in my homework.I want to ask this question from Security topic in division Security of Operating System |
|
Answer» Right ANSWER is (d) Deals with PRIVILEGES and rights |
|
| 63. |
Which happens first authorization or authentication?(a) Authorization(b) Authentication(c) Authorization & Authentication are same(d) None of the mentionedThe question was posed to me during an internship interview.This question is from Security topic in division Security of Operating System |
|
Answer» RIGHT ANSWER is (a) Authorization Easiest EXPLANATION - NONE. |
|
| 64. |
What is characteristic of RADIUS system?(a) Itis essential for centralized encryption and authentication(b) It works on Network layer to deny access to unauthorized people(c) It provides centralized authentication mechanism via network devices(d) It’s a strong File access systemI have been asked this question during an online interview.Question is from Security in chapter Security of Operating System |
|
Answer» The correct ANSWER is (C) It provides centralized authentication mechanism via NETWORK devices |
|
| 65. |
What does Light Directory Access Protocol (LDAP) doesn’t store?(a) Users(b) Address(c) Passwords(d) Security KeysI have been asked this question during an interview.Question is from Security in division Security of Operating System |
|
Answer» CORRECT CHOICE is (B) Address Explanation: NONE. |
|
| 66. |
Why is one time password safe?(a) It is easy to generated(b) It cannot be shared(c) It is different for every access(d) It is a complex encrypted passwordThe question was asked by my college director while I was bunking the class.This is a very interesting question from Security topic in chapter Security of Operating System |
|
Answer» The correct option is (c) It is different for every access |
|
| 67. |
Which of the following is a strong password?(a) 19thAugust88(b) Delhi88(c) [email protected](d) !augustdelhiI had been asked this question in quiz.I want to ask this question from Security topic in portion Security of Operating System |
|
Answer» CORRECT answer is (C) [email protected] Best explanation: It has a COMBINATION of Alphabet both capital and small along with number and special CHARACTER. Thus always USE complex password with a combination of all these. |
|
| 68. |
Which of the following is the least secure method of authentication?(a) Key card(b) fingerprint(c) retina pattern(d) PasswordThis question was posed to me during an online exam.My enquiry is from Security topic in division Security of Operating System |
|
Answer» Correct option is (d) Password |
|
| 69. |
What is not a good practice for user administration?(a) Isolating a system after a compromise(b) Perform random auditing procedures(c) Granting privileges on a per host basis(d) Using telnet and FTP for remote accessThis question was addressed to me by my school teacher while I was bunking the class.This question is from Security in chapter Security of Operating System |
|
Answer» CORRECT option is (d) USING TELNET and FTP for remote access Explanation: Telnet and FTP are not ENCRYPTED and can be compromised. |
|
| 70. |
Which of the following is a good practice?(a) Give full permission for remote transferring(b) Grant read only permission(c) Grant limited permission to specified account(d) Give both read and write permission but not executeThis question was addressed to me during an interview.I'm obligated to ask this question of Security in section Security of Operating System |
|
Answer» The correct choice is (c) GRANT LIMITED permission to SPECIFIED account |
|
| 71. |
From the following, which is not a common file permission?(a) Write(b) Execute(c) Stop(d) ReadThis question was addressed to me during an interview.The doubt is from Security topic in division Security of Operating System |
|
Answer» CORRECT ANSWER is (C) Stop Easiest EXPLANATION - NONE. |
|
| 72. |
What are the common security threats?(a) File Shredding(b) File sharing and permission(c) File corrupting(d) File integrityThis question was addressed to me in an interview for job.I need to ask this question from Security in section Security of Operating System |
|
Answer» Right option is (b) FILE sharing and permission |
|
| 73. |
Which of the following are forms of malicious attack?(a) Theft of information(b) Modification of data(c) Wiping of information(d) All of the mentionedI had been asked this question in my homework.This question is from Security in chapter Security of Operating System |
|
Answer» CORRECT CHOICE is (d) All of the mentioned To EXPLAIN: NONE. |
|