Skip to content
MCQtimes.com
GK
Pakistan Studies
Current Affairs
Islamic Studies
English
MCQtimes.com
Toggle Menu
OS Security
Home
/
Computer Science
/
Operating System
/
OS Security
Show/Hide Answers
OS Security
What is cipher-block chaining?
Data is logically ‘ANDed’ with previous block
Data is logically ‘ORed’ with previous block
Data is logically ‘XORed’ with previous block
None of the mentioned
Author:
rikazzz
Comment
OS Security
What is trap door?
IT is trap door in WarGames
It is a hole in software left by designer
It is a Trojan horse
It is a virus which traps and locks user terminal
Author:
rikazzz
Comment
OS Security
What are the drawbacks of signature based IDS?
They are unable to detect novel attacks
They suffer from false alarms
They have to be programmed again for every new pattern to be detected
All of the mentioned
Author:
rikazzz
Comment
OS Security
Which direction access cannot happen using DMZ zone by default?
Company computer to DMZ
Internet to DMZ
Internet to company computer
Company computer to internet
Connection from internet is never allowed to directly access internal PCs but is routed through DMZ zone to prevent attacks.
Author:
rikazzz
Comment
OS Security
What are strengths of Network based IDS?
Cost of ownership reduced
Malicious intent detection
Real time detection and response
All of the mentioned
Author:
rikazzz
Comment
OS Security
What are the characteristics of anomaly based IDS?
It models the normal usage of network as a noise characterization
It doesn’t detect novel attacks
Anything distinct from the noise is not assumed to be intrusion activity
It detects based on signature
Author:
rikazzz
Comment
OS Security
Which mechanism is used by worm process?
Trap door
Fake process
Spawn Process
VAX process
Author:
rikazzz
Comment
OS Security
What is known as a DOS attack?
It is attacked to block traffic of network
It is attacked to harm contents stored in HDD by worm spawn processes
It is an attempt to make a machine or network resource unavailable
None of the mentioned
Author:
rikazzz
Comment
OS Security
Which is not a port scan type?
TCP scanning
SYN scanning
UDP scanning
SYSTEM Scanning
Author:
rikazzz
Comment
OS Security
Which of the following is a strong password?
19thAugust88
Delhi88
[email protected]
!augustdelhi
It has a combination of Alphabet both capital and small along with number and special character. Thus always use complex password with a combination of all these.
Author:
rikazzz
Comment
Page navigation
1
2
3
…
8
Next Page
Next
Go to Page
Light
Dark
GK
Pakistan Studies
Current Affairs
Islamic Studies
English