Computer Security - Protection In General Purpose Operating System

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By M.Priyavani
M
M.Priyavani
Community Contributor
Quizzes Created: 1 | Total Attempts: 182
Questions: 10 | Attempts: 182

SettingsSettingsSettings
Computer Security - Protection In General Purpose Operating System - Quiz


Questions and Answers
  • 1. 

    Operating system functions can be categorized as :

    • A.

      Access control

    • B.

      Identity & credential management

    • C.

      Information flow

    • D.

      Audit & integrity protection

    Correct Answer(s)
    A. Access control
    B. Identity & credential management
    C. Information flow
    D. Audit & integrity protection
    Explanation
    The operating system functions can be categorized into four main categories: access control, identity and credential management, information flow, and audit and integrity protection. Access control refers to the mechanisms that determine what resources a user or process can access. Identity and credential management involves managing user identities and their associated credentials, such as passwords or digital certificates. Information flow ensures that data is properly transmitted and protected within the system. Audit and integrity protection involve monitoring and recording system activities to detect and prevent unauthorized changes or breaches.

    Rate this question:

  • 2. 

    As the operating system becomes more complex, the security considerations increases.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    As the operating system becomes more complex, it requires more features and functionalities to support various applications and hardware. This complexity also introduces more potential vulnerabilities and attack vectors, increasing the security considerations. With more complex code, there is a higher likelihood of bugs, loopholes, and weaknesses that can be exploited by attackers. Therefore, it is true that the security considerations increase as the operating system becomes more complex.

    Rate this question:

  • 3. 

    In ____________ separation, the processes having different security requirements are executed at different times.

    • A.

      Physical

    • B.

      Temporal

    • C.

      Logical

    • D.

      Cryptographic

    Correct Answer
    B. Temporal
    Explanation
    Temporal separation refers to the practice of executing processes with different security requirements at different times. This ensures that processes with higher security requirements are executed separately from processes with lower security requirements, reducing the risk of unauthorized access or compromise. By scheduling these processes at different times, the potential for security breaches or conflicts is minimized, enhancing overall system security.

    Rate this question:

  • 4. 

    ________ is a method to confine users to one side of a boundary of memory.

    • A.

      Fence

    • B.

      Relocation

    • C.

      Base-Bound registers

    • D.

      Tagging

    Correct Answer
    A. Fence
    Explanation
    A fence is a method used to confine users to one side of a boundary of memory. It acts as a barrier or boundary that prevents users from accessing memory outside of a specific range. This can be useful in ensuring the security and integrity of memory by preventing unauthorized access or modification. By implementing a fence, the system can control and restrict user access to specific memory regions, improving overall system stability and security.

    Rate this question:

  • 5. 

    In _________ memory management, a program is divided into separate pieces where each piece has a logical unity exhibiting a relation among all of its codes or data values.

    • A.

      Paging

    • B.

      Tagged

    • C.

      Relocated

    • D.

      Segmented

    Correct Answer
    D. Segmented
    Explanation
    Segmented memory management is a technique where a program is divided into separate pieces called segments. Each segment represents a logical unit that contains related codes or data values. This division allows for efficient memory allocation and management, as each segment can be independently loaded into memory and accessed. The use of segmented memory management helps to organize and optimize the memory usage in a program, improving overall performance and flexibility.

    Rate this question:

  • 6. 

    ACL stands for

    • A.

      Access Class Loader

    • B.

      Acquired Control Loader

    • C.

      Access Control List

    • D.

      Access Control Loader

    Correct Answer
    C. Access Control List
    Explanation
    ACL stands for Access Control List. An Access Control List is a set of permissions that determines what actions a user or group can perform on a resource. It is used to control access to files, folders, networks, or other system resources. By defining specific rules and restrictions, ACL helps in enforcing security policies and ensuring that only authorized users can access certain resources.

    Rate this question:

  • 7. 

    _______ is an unforgeable token  that gives the possessor certain right to an object.

    • A.

      Access control list

    • B.

      Access control matrix

    • C.

      Capability

    • D.

      Domain

    Correct Answer
    C. Capability
    Explanation
    A capability is an unforgeable token that gives the possessor certain rights to an object. It is a security mechanism used in access control systems to ensure that only authorized entities can access and manipulate objects. Capabilities are typically associated with specific permissions or privileges, allowing the possessor to perform certain actions on the object. Unlike access control lists or matrices, which rely on predefined rules and permissions, capabilities provide a more flexible and dynamic approach to access control by granting specific rights to individual entities.

    Rate this question:

  • 8. 

    The quality to confirm a user identity using something the user is called as __________

    Correct Answer
    biometrics
    Explanation
    Biometrics refers to the quality or method of confirming a user's identity by using something that is unique to them, such as their fingerprints, facial features, or iris patterns. This technology relies on the fact that these biological characteristics are difficult to replicate, making it a reliable and secure way to authenticate a user's identity.

    Rate this question:

  • 9. 

    Exhaustive attack on passwords is also called as ____________

    Correct Answer
    brute force attack
    Explanation
    An exhaustive attack on passwords, also known as a brute force attack, is a method where an attacker systematically tries all possible combinations of characters until the correct password is found. This approach is time-consuming and requires significant computational power, but it can be effective in cracking passwords that are weak or easily guessable.

    Rate this question:

  • 10. 

    The system that provides an argument to the function and the user computes and returns the function values are called as ____________

    Correct Answer
    challenge response systems
    Explanation
    The term "challenge response systems" refers to a system where an argument is provided to a function and the user computes and returns the function values. This type of system involves a challenge or request for information, and the user responds with the appropriate response or computation. It is a method commonly used in authentication or verification processes, where the user must provide a correct response to a challenge in order to gain access or prove their identity.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 06, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 23, 2020
    Quiz Created by
    M.Priyavani
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.