NSCT – Operating System Security MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . What is the main purpose of OS security? (A) To install software automatically (B) To increase internet speed (C) To delete old files (D) To protect system resources from unauthorized accessShow All Answers 2. . User authentication in an OS is used to: (A) Verify the identity of users (B) Install new hardware (C) Delete files (D) Encrypt data 3. . Which of the following is a common OS security threat? (A) All of the above (B) Unauthorized access (C) System misconfiguration (D) Malware 4. . Passwords, fingerprint, and smart cards are examples of: (A) Access control (B) Encryption methods (C) Authentication methods (D) Firewall settings 5. . Access control in an OS ensures that: (A) Files are automatically deleted (B) All users have full access (C) Only administrators can use the system (D) Users can access only authorized resources 6. . Role-Based Access Control (RBAC) assigns permissions based on: (A) Network addresses (B) User roles (C) File types (D) Hardware 7. . Discretionary Access Control (DAC) allows: (A) Only administrators to set permissions (B) Resource owners to set permissions (C) Users to have no control (D) Network devices to control access 8. . Mandatory Access Control (MAC) is: (A) Used only for networks (B) Set by individual users (C) Optional for every file (D) Controlled by the system based on security labels 9. . OS security patches are important because they: (A) Compress data (B) Increase system speed (C) Delete files automatically (D) Fix vulnerabilities and improve security 10. . Which of the following helps prevent malware from running on an OS? (A) Antivirus software (B) Firewalls (C) All of the above (D) Regular updates 11. . File permissions in an OS control: (A) Screen resolution (B) Internet speed (C) Printer usage (D) Read, write, and execute access 12. . OS auditing and logging are important to: (A) Track user activity and detect security incidents (B) Delete files (C) Compress data (D) Increase memory 13. . A buffer overflow vulnerability can lead to: (A) More storage space (B) Faster system performance (C) Unauthorized access or system crashes (D) Improved graphics 14. . Antivirus and anti-malware programs help to: (A) Backup files automatically (B) Encrypt files only (C) Detect and remove malicious software (D) Increase CPU speed 15. . OS hardening refers to: (A) Deleting unused files (B) Increasing internet speed (C) Reducing system vulnerabilities to improve security (D) Installing more software 16. . Sandboxing is used to: (A) Delete malware automatically (B) Run untrusted programs in a restricted environment (C) Encrypt files (D) Backup data 17. . Security updates should be: (A) Ignored (B) Applied regularly to prevent exploits (C) Installed once in the system lifetime (D) Only for antivirus programs 18. . Two-Factor Authentication (2FA) provides: (A) Faster boot time (B) Extra security by requiring two verification methods (C) Automatic file deletion (D) Faster internet speed 19. . Encryption in an OS helps to: (A) Delete files automatically (B) Increase storage space (C) Protect sensitive data from unauthorized access (D) Speed up processing 20. . The main goal of OS security is to ensure: (A) Improved graphics (B) Faster downloads (C) More storage space (D) Confidentiality, Integrity, and Availability of system resources