NSCT – Protection & Security MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . The main purpose of protection in an operating system is: (A) To ensure that resources are used only by authorized processes (B) To manage CPU scheduling (C) To allocate memory efficiently (D) To delete unused filesShow All Answers 2. . Security in an operating system refers to: (A) Protecting resources from unauthorized access (B) CPU scheduling (C) Memory management (D) File allocation 3. . Authentication is the process of: (A) Verifying the identity of a user or process (B) Granting access to resources (C) Allocating memory (D) Scheduling processes 4. . Authorization is: (A) Determining the resources a user or process can access (B) Verifying user identity (C) Allocating memory (D) CPU scheduling 5. . A password is an example of: (A) Something you control (B) Something you have (C) Something you are (D) Something you know for authentication 6. . Biometrics like fingerprints and retina scans are examples of: (A) Something you are (B) Something you have (C) Something you know (D) Something you control 7. . Access control lists (ACLs) are used to: (A) Allocate memory (B) Increase CPU speed (C) Define which users or processes can access specific resources (D) Manage files 8. . A capability list contains: (A) CPU instructions (B) The list of resources a user or process can access (C) Memory addresses (D) File locations 9. . The principle of least privilege means: (A) Give users maximum access (B) No access for anyone (C) Give users only the minimum access necessary to perform their tasks (D) Unlimited access for administrators 10. . Encryption is used to: (A) Verify identity (B) Allocate memory (C) Manage CPU (D) Protect data from unauthorized access 11. . Symmetric encryption uses: (A) Different keys for encryption and decryption (B) CPU only (C) The same key for both encryption and decryption (D) Memory only 12. . Asymmetric encryption uses: (A) Same key for encryption and decryption (B) Different keys for encryption and decryption (C) Only CPU registers (D) Only files 13. . Firewalls are used to: (A) Increase CPU speed (B) Prevent unauthorized network access (C) Manage files (D) Allocate memory 14. . Trojan horses are: (A) Authorized programs (B) Memory managers (C) CPU instructions (D) Malicious programs that appear legitimate 15. . Viruses differ from worms in that: (A) Both are harmless (B) Worms attach to files, viruses spread independently (C) Viruses attach to files, worms can spread independently (D) Both require CPU scheduling 16. . A buffer overflow attack exploits: (A) CPU scheduling (B) Memory allocation vulnerabilities (C) File system (D) Network speed 17. . Intrusion detection systems (IDS) are used to: (A) Store files (B) Allocate memory (C) Schedule CPU (D) Monitor and detect unauthorized access or attacks 18. . Multi-factor authentication requires: (A) Only a password (B) Only a fingerprint (C) Two or more methods of verifying identity (D) Only a token 19. . Sandboxing is a technique to: (A) Execute programs in a restricted environment to prevent damage (B) Allocate memory (C) Schedule CPU (D) Manage files 20. . The main goal of protection and security in an OS is to: (A) Manage memory only (B) Increase CPU speed (C) Ensure that resources are used safely, securely, and only by authorized users (D) Delete files automatically