1. . The main purpose of protection in an operating system is:
(A) To ensure that resources are used only by authorized processes
(B) To manage CPU scheduling
(C) To allocate memory efficiently
(D) To delete unused files
2. . Security in an operating system refers to:
(A) Protecting resources from unauthorized access
(B) CPU scheduling
(C) Memory management
(D) File allocation
3. . Authentication is the process of:
(A) Verifying the identity of a user or process
(B) Granting access to resources
(C) Allocating memory
(D) Scheduling processes
4. . Authorization is:
(A) Determining the resources a user or process can access
(B) Verifying user identity
(C) Allocating memory
(D) CPU scheduling
5. . A password is an example of:
(A) Something you control
(B) Something you have
(C) Something you are
(D) Something you know for authentication
6. . Biometrics like fingerprints and retina scans are examples of:
(A) Something you are
(B) Something you have
(C) Something you know
(D) Something you control
7. . Access control lists (ACLs) are used to:
(A) Allocate memory
(B) Increase CPU speed
(C) Define which users or processes can access specific resources
(D) Manage files
8. . A capability list contains:
(A) CPU instructions
(B) The list of resources a user or process can access
(C) Memory addresses
(D) File locations
9. . The principle of least privilege means:
(A) Give users maximum access
(B) No access for anyone
(C) Give users only the minimum access necessary to perform their tasks
(D) Unlimited access for administrators
10. . Encryption is used to:
(A) Verify identity
(B) Allocate memory
(C) Manage CPU
(D) Protect data from unauthorized access
11. . Symmetric encryption uses:
(A) Different keys for encryption and decryption
(B) CPU only
(C) The same key for both encryption and decryption
(D) Memory only
12. . Asymmetric encryption uses:
(A) Same key for encryption and decryption
(B) Different keys for encryption and decryption
(C) Only CPU registers
(D) Only files
13. . Firewalls are used to:
(A) Increase CPU speed
(B) Prevent unauthorized network access
(C) Manage files
(D) Allocate memory
14. . Trojan horses are:
(A) Authorized programs
(B) Memory managers
(C) CPU instructions
(D) Malicious programs that appear legitimate
15. . Viruses differ from worms in that:
(A) Both are harmless
(B) Worms attach to files, viruses spread independently
(C) Viruses attach to files, worms can spread independently
(D) Both require CPU scheduling
16. . A buffer overflow attack exploits:
(A) CPU scheduling
(B) Memory allocation vulnerabilities
(C) File system
(D) Network speed
17. . Intrusion detection systems (IDS) are used to:
(A) Store files
(B) Allocate memory
(C) Schedule CPU
(D) Monitor and detect unauthorized access or attacks
18. . Multi-factor authentication requires:
(A) Only a password
(B) Only a fingerprint
(C) Two or more methods of verifying identity
(D) Only a token
19. . Sandboxing is a technique to:
(A) Execute programs in a restricted environment to prevent damage
(B) Allocate memory
(C) Schedule CPU
(D) Manage files
20. . The main goal of protection and security in an OS is to:
(A) Manage memory only
(B) Increase CPU speed
(C) Ensure that resources are used safely, securely, and only by authorized users
(D) Delete files automatically