T4Tutorials .PK

NSCT – Protection & Security MCQs

1. . The main purpose of protection in an operating system is:

(A) To ensure that resources are used only by authorized processes


(B) To manage CPU scheduling


(C) To allocate memory efficiently


(D) To delete unused files




2. . Security in an operating system refers to:

(A) Protecting resources from unauthorized access


(B) CPU scheduling


(C) Memory management


(D) File allocation




3. . Authentication is the process of:

(A) Verifying the identity of a user or process


(B) Granting access to resources


(C) Allocating memory


(D) Scheduling processes




4. . Authorization is:

(A) Determining the resources a user or process can access


(B) Verifying user identity


(C) Allocating memory


(D) CPU scheduling




5. . A password is an example of:

(A) Something you control


(B) Something you have


(C) Something you are


(D) Something you know for authentication




6. . Biometrics like fingerprints and retina scans are examples of:

(A) Something you are


(B) Something you have


(C) Something you know


(D) Something you control




7. . Access control lists (ACLs) are used to:

(A) Allocate memory


(B) Increase CPU speed


(C) Define which users or processes can access specific resources


(D) Manage files




8. . A capability list contains:

(A) CPU instructions


(B) The list of resources a user or process can access


(C) Memory addresses


(D) File locations




9. . The principle of least privilege means:

(A) Give users maximum access


(B) No access for anyone


(C) Give users only the minimum access necessary to perform their tasks


(D) Unlimited access for administrators




10. . Encryption is used to:

(A) Verify identity


(B) Allocate memory


(C) Manage CPU


(D) Protect data from unauthorized access




11. . Symmetric encryption uses:

(A) Different keys for encryption and decryption


(B) CPU only


(C) The same key for both encryption and decryption


(D) Memory only




12. . Asymmetric encryption uses:

(A) Same key for encryption and decryption


(B) Different keys for encryption and decryption


(C) Only CPU registers


(D) Only files




13. . Firewalls are used to:

(A) Increase CPU speed


(B) Prevent unauthorized network access


(C) Manage files


(D) Allocate memory




14. . Trojan horses are:

(A) Authorized programs


(B) Memory managers


(C) CPU instructions


(D) Malicious programs that appear legitimate




15. . Viruses differ from worms in that:

(A) Both are harmless


(B) Worms attach to files, viruses spread independently


(C) Viruses attach to files, worms can spread independently


(D) Both require CPU scheduling




16. . A buffer overflow attack exploits:

(A) CPU scheduling


(B) Memory allocation vulnerabilities


(C) File system


(D) Network speed




17. . Intrusion detection systems (IDS) are used to:

(A) Store files


(B) Allocate memory


(C) Schedule CPU


(D) Monitor and detect unauthorized access or attacks




18. . Multi-factor authentication requires:

(A) Only a password


(B) Only a fingerprint


(C) Two or more methods of verifying identity


(D) Only a token




19. . Sandboxing is a technique to:

(A) Execute programs in a restricted environment to prevent damage


(B) Allocate memory


(C) Schedule CPU


(D) Manage files




20. . The main goal of protection and security in an OS is to:

(A) Manage memory only


(B) Increase CPU speed


(C) Ensure that resources are used safely, securely, and only by authorized users


(D) Delete files automatically




Exit mobile version