adplus-dvertising

Welcome to the Protection and Security MCQs Page

Dive deep into the fascinating world of Protection and Security with our comprehensive set of Multiple-Choice Questions (MCQs). This page is dedicated to exploring the fundamental concepts and intricacies of Protection and Security, a crucial aspect of Operating System. In this section, you will encounter a diverse range of MCQs that cover various aspects of Protection and Security, from the basic principles to advanced topics. Each question is thoughtfully crafted to challenge your knowledge and deepen your understanding of this critical subcategory within Operating System.

frame-decoration

Check out the MCQs below to embark on an enriching journey through Protection and Security. Test your knowledge, expand your horizons, and solidify your grasp on this vital area of Operating System.

Note: Each MCQ comes with multiple answer choices. Select the most appropriate option and test your understanding of Protection and Security. You can click on an option to test your knowledge before viewing the solution for a MCQ. Happy learning!

Protection and Security MCQs | Page 1 of 14

Explore more Topics under Operating System

Q1.
Consider the two statements.
(A) Protection is an internal problem.
(B) Security is considered as an external environment within which the system works.
Which of the statement is not true?
Discuss
Answer: (d).None of the above
Discuss
Answer: (c).Both a and b.
Discuss
Answer: (a).Automatic generation of program
Discuss
Answer: (b).Secure it for transmission
Discuss
Answer: (a).Allows only the correct receiver to decode the data
Q6.
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message.
Discuss
Answer: (b).(I) only
Q7.
In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________.
Discuss
Answer: (a).11
Q8.
Which of the following are forms of malicious attack ?
Discuss
Answer: (d).All of the mentioned
Discuss
Answer: (b).File sharing and permission
Q10.
From the following, which is not a common file permission ?
Discuss
Answer: (c).Stop

Suggested Topics

Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.

Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!