Operating System MCQ Number 01282

Operating System MCQ Set 1

1. A monitor is a type of :
a) semaphore
b) low level synchronization construct
c) high level synchronization construct
d) none of the mentioned

Answer

Answer: c [Reason:] None.

2. A monitor is characterized by :
a) a set of programmer defined operators
b) an identifier
c) the number of variables in it
d) all of the mentioned

Answer

Answer: a [Reason:] None.

3. A procedure defined within a ________ can access only those variables declared locally within the _______ and its formal parameters.
a) process, semaphore
b) process, monitor
c) semaphore, semaphore
d) monitor, monitor

Answer

Answer: d [Reason:] None.

4. The monitor construct ensures that :
a) only one process can be active at a time within the monitor
b) n number of processes can be active at a time within the monitor (n being greater than 1)
c) the queue has only one process in it at a time
d) all of the mentioned

Answer

Answer: a [Reason:] None.

5. The operations that can be invoked on a condition variable are :
a) wait & signal
b) hold & wait
c) signal & hold
d) continue & signal

Answer

Answer: a [Reason:] None.

6. The process invoking the wait operation is :
a) suspended until another process invokes the signal operation
b) waiting for another process to complete before it can itself call the signal operation
c) stopped until the next process in the queue finishes execution
d) none of the mentioned

Answer

Answer: a [Reason:] None.

7. If no process is suspended, the signal operation :
a) puts the system into a deadlock state
b) suspends some default process’ execution
c) nothing happens
d) the output is unpredictable

Answer

Answer: c [Reason:] None.

Operating System MCQ Set 2

1. In domain structure what is Access-right equal to ?
a) Access-right = object-name, rights-set
b) Access-right = read-name, write-set
c) Access-right = read-name, execute-set
d) Access-right = object-name, execute-set

Answer

Answer: a [Reason:] None.

2. What is meaning of right-set ?
a) It is a subset consist of read and write
b) It is a subset of all valid operations that can be performed on the object
c) It is a subset consist of read,write and execute
d) None of the mentioned

Answer

Answer: b [Reason:] None.

3. What is Domain ?
a) Domain = Set of all objects
b) It is a collection of protection policies
c) Domain= set of access-rights
d) None of the mentioned

Answer

Answer: c [Reason:] None.

4. What does access matrix represent ?
a) Rows-Domains, Columns-Objects
b) Rows-Objects, Columns-Domains
c) Rows-Access List, Columns-Domains
d) Rows-Domains, Columns-Access list

Answer

Answer: a [Reason:] None.

5. What are the three additional operations to change the contents of the access-matrix ?
a) copy
b) Owner
c) control
d) all of the mentioned

Answer

Answer: d [Reason:] None.

6. Who can add new rights and remove some rights ?
a) copy
b) transfer
c) limited copy
d) owner

Answer

Answer: d [Reason:] None.

7. What are the three copy rights ?
a) copy
b) transfer
c) limited copy
d) all of the mentioned

Answer

Answer: d [Reason:] None.

8. Which two rights allow a process to change the entries in a column ?
a) copy and transfer
b) copy and owner
c) owner and transfer
d) deny and copy

Answer

Answer: a [Reason:] None.

9. Which is an unsolvable problem in access-matrix ?
a) Owner override
b) Brute force
c) Access denied
d) Confinement

Answer

Answer: d [Reason:] None.

10. Which of the following objects require protection ?
a) CPU
b) Printers
c) Motherboard
d) All of the mentioned

Answer

Answer: b [Reason:] None.

11. What is ‘separation’ in security of Operating systems ?
a) To have separate login for different users
b) To have separate Hard disk drive/partition for different users
c) It means keeping one user’s objects separate from other users
d) None of the mentioned

Answer

Answer: c [Reason:] None.

12. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical sepration – In which processes conceal their data and computations
a) i
b) i and iii
c) ii and iii
d) iii and iv

Answer

Answer: b [Reason:] None.

13. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal sepration – In which processes conceal their data and computations
a) i
b) i and ii
c) ii and iii
d) iii and iv

Answer

Answer: b [Reason:] None.

14. Which of the following statements are correct?
i) logical separation – in which process use different physical objects like separate printers
ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) cryptographic sepration – In which processes conceal their data and computations
a) i
b) i and ii
c) ii and iii
d) iii and iv

Answer

Answer: d [Reason:] None.

15. What are various roles of protection ?
a) It is used to detect errors which can prevent contamination of system
b) It is used used to accelerate a process
c) It is used to optimize system downtime
d) None of the mentioned

Answer

Answer: a [Reason:] None.

16. Which of the following objects require protection ?
a) Memory
b) Monitor
c) Power supply unit
d) All of the mentioned

Answer

Answer: a [Reason:] None.

Operating System MCQ Set 3

1. What is true regarding ‘Fence’ ?
a) Its a method to confine users to one side of a boundary
b) It can protect Operating system from one user
c) It cannot protect users from each other
d) All of the mentioned

Answer

Answer: d [Reason:] None.

2. What is not true regarding ‘Fence’ ?
a) It is implemented via hardware register
b) It doesn’t protect users from each other
c) It good to protect OS from abusive users
d) Its implementation is unrestricted and can take any amount of space in Operating system.

Answer

Answer: d [Reason:] None.

3. What is correct regarding ‘relocation’ w.r.t protecting memory ?
a) It is a process of taking a program as if it began at address 0
b) It is a process of taking a program as if it began at address 0A
c) Fence cannot be used within relocation process
d) All of the mentioned

Answer

Answer: a [Reason:] None.

4. How can fence and relocation be used together ?
a) To each program address, the contents of fence register are added
b) To contents of fence register is subtracted from actual address of program
c) To each program address, the contents of fence register are not added
d) None of the mentioned

Answer

Answer: a [Reason:] This both relocates the address and guarantees that no one can access a location lower than a fence address.

5. What is basic need in protecting memory in multi-user environment ?
a) We need two registers one ‘start’ and other ‘end’
b) We need a variable register
c) A fence register has to be used known as base register.
d) None of the mentioned

Answer

Answer: c [Reason:] None.

6. What is role of base/bound registers ?
a) They give starting address to a program
b) Program’s addresses are neatly confined to space between the base and the bound registers
c) They provide encrypted environment
d) This technique doesn’t protects a program’s address from modification by another user

Answer

Answer: b [Reason:] None.

7. What is all-or-nothing situation for sharing in memory ?
a) Program makes all its data available to be accessed
b) It prohibits access to some
c) It creates rules who can access program memory
d) It separates program memory and data memory

Answer

Answer: a [Reason:] None.

8. How is disadvantage of all-or-nothing approach overcome ?
a) Base/Bound
b) Relocation technique
c) Fence method
d) Tagged architecture

Answer

Answer: d [Reason:] None.

9. What is true regarding tagged architecture ?
a) Every word of machine memory has one or more extra bits
b) Extra bits are used to do padding
c) Extra bits are not used to identify rights to that word
d) It is very compatible to code upgrades

Answer

Answer: a [Reason:] None.

10. What is best solution to have effect of unbounded number if base/bound registers?
a) Tagged architecture
b) Segmentation
c) Fence method
d) None of the mentioned

Answer

Answer: b [Reason:] None.

11. What is major feature of segmentation ?
a) Program is divided in data memory and program memory
b) Program is executed in segments
c) Program is divided into pieces having different access rights
d) It has effect of an unbounded architecture

Answer

Answer: c [Reason:] None.

12. What is correct way the segmentation program address is stored ?
a) name, offset
b) start, stop
c) access, rights
d) offset, rights

Answer

Answer: a [Reason:] OS can retrieve the real address via looking for the table then making a simple calculation : address of the name + offset.

13. What is main objective of protection ?
a) Ensure all objects are protected individually
b) Objects have different priority and thus different levels of protection
c) Ensure that each object is accessed correctly and only by allowed processes
d) None of the mentioned

Answer

Answer: c [Reason:] None.

14. What is principle of least privilege ?
a) Less privileges provide difficulty in executing admin tasks
b) Users can get temporary high privilege access
c) Users should be given just enough privileges to perform their tasks
d) None of the mentioned

Answer

Answer: c [Reason:] None.

15. What is need of protection ?
a) Prevent mischievous violation
b) Prevent and intentional
c) Ensure that each program component uses resources allotted to it only
d) All of the mentioned

Answer

Answer: d [Reason:] None.

Operating System MCQ Set 4

1. What is preferred way of encryption ?
a) pre shared secret key
b) using key distribution center (KDC)
c) public key-encryption
d) symmetric key

Answer

Answer: c [Reason:] Preshared key can be compromised and either party can be suspected. Likewise KDC or symmetric key can have breach which are undesirable. Public and private key encryption is a known industry standard.

2. What is not a role of encryption ?
a) It is used to protect data from unauthorized access during transmission
b) It is used to ensure user authentication
c) It is used to ensure data integrity
d) It is used to ensure data corruption doesn’t happens

Answer

Answer: d [Reason:] Encryption doesn’t have error correction or detection facility thus cannot be used to safeguard from data corruption.

3. What is cipher-block chaining ?
a) Data is logically ‘ANDed’ with previous block
b) Data is logically ‘ORed’ with previous block
c) Data is logically ‘XORed’ with previous block
d) None of the mentioned

Answer

Answer: c [Reason:] None.

4. What is not an encryption standard ?
a) AES
b) TES
c) Triple DES
d) DES

Answer

Answer: b [Reason:] None.

5. Which of following is not a stream cipher?
a) Two fish
b) RC5
c) RC4
d) TBONE

Answer

Answer: d [Reason:] None.

6. What is a Hash Function ?
a) It creates a small flexible block of data
b) It creates a small,fixed block of data
c) It creates a encrypted block of data
d) none of the mentioned

Answer

Answer: b [Reason:] None.

7. MD5 produces __ bits hash data.
a) 128
b) 150
c) 160
d) 112

Answer

Answer: a [Reason:] None.

8. SHA-1 produces __ bit of hash.
a) 128
b) 160
c) 150
d) 112

Answer

Answer: b [Reason:] None.

9. Which two of the following are authentication algorithms ?
a) MAC
b) AES
c) DAS
d) Digital-signature

Answer

Answer: a [Reason:] None.

10. What is role of Key Distribution Center ?
a) It is used to distribute keys to everyone in world
b) It intended to reduce the risks inherent in exchanging keys
c) all of the mentioned
d) none of the mentioned

Answer

Answer: b [Reason:] None.

Operating System MCQ Set 5

1. What are the different ways to intrude ?
a) Buffer overflows
b) Unexpected combinations and unhandled input
c) Race conditions
d) All of the mentioned

Answer

Answer: d [Reason:] None.

2. What are major components of intrusion detection system ?
a) Analysic Engine
b) Event provider
c) Alert Database
d) All of the mentioned

Answer

Answer: d [Reason:] None.

3. What are the different ways to classify an IDS ?
a) anomaly detection
b) signature based misuse
c) stack based
d) all of the mentioned

Answer

Answer: d [Reason:] None.

4. What are the different ways to classify an IDS ?
a) Zone based
b) Host & Network based
c) Network & Zone based
d) Level based

Answer

Answer: b [Reason:] None.

5. What are characteristics of anomaly based IDS ?
a) It models the normal usage of network as a noise characterization
b) It doesnt detect novel attacks
c) Anything distinct from the noise is not assumed to be intrusion activity
d) It detects based on signature

Answer

Answer: a [Reason:] None.

6. What is major drawback of anomaly detection IDS ?
a) These are very slow at detection
b) It generates many false alarms
c) It doesnt detect novel attacks
d) None of the mentioned

Answer

Answer: b [Reason:] None.

7. What are characteristics of signature based IDS ?
a) Most are based on simple pattern matching algorithms
b) It is programmed to interpret a certain series of packets
c) It models the normal usage of network as a noise characterization
d) Anything distinct from the noise is assumed to be intrusion activity

Answer

Answer: a [Reason:] None.

8. What are drawbacks of signature based IDS ?
a) They are unable to detect novel attacks
b) They suffer from false alarms
c) They have to be programmed again for every new pattern to be detected
d) All of the mentioned

Answer

Answer: d [Reason:] None.

9. What are characteristics of Host based IDS ?
a) The host operating system logs in the audit information
b) Logs includes logins,file opens and program executions
c) Logs are analysed to detect tails of intrusion
d) All of the mentioned

Answer

Answer: d [Reason:] None.

10. What are drawbacks of the host based IDS ?
a) Unselective logging of messages may increase the audit burdens
b) Selective logging runs the rish of missed attacks
c) They are very fast to detect
d) They have to be programmed for new patterns

Answer

Answer: a [Reason:] None.

11. What are strengths of the host based IDS ?
a) Attack verification
b) System specific acitvity
c) No addition hardware required
d) All of the mentioned

Answer

Answer: d [Reason:] None.

12. What are characteristics of stack based IDS ?
a) They are integrated closely with the TCP/IP stack and watch packets
b) The host operating system logs in the audit information
c) It is programmed to interpret a certain series of packets
d) It models the normal usage of network as a noise characterization

Answer

Answer: a [Reason:] None.

13. What are characteristics of Network based IDS ?
a) They look for attack signatures in network traffic
b) Filter decides which traffic will not be discarded or passed
c) It is programmed to interpret a certain series of packet
d) It models the normal usage of network as a noise characterization

Answer

Answer: a [Reason:] None.

14. What are strengths of Network based IDS ?
a) Cost of ownership reduced
b) Malicious intent detection
c) Real time detection and response
d) All of the mentioned

Answer

Answer: d [Reason:] None.

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.