Operating System Mcqs

Page No. 51

How do viruses avoid basic pattern match of antivirus?


aThey are encrypted


bThey act with special permissions


cThey modify themselves


dNone of the mentioned



What are the two features of a tripwire file system?


aIt is a tool to monitor file systems


bIt is used to automatically take corrective action


cIt is used to secure UNIX system


dNone of the mentioned



Which direction access cannot happen using DMZ zone by default?


aCompany computer to DMZ


bInternet to DMZ


cInternet to company computer


dCompany computer to internet



What is the best practice in the firewall domain environment?


aCreate two domain trusted and untrusted domain


bCreate strong policy in firewall to support different types of users


cCreate a Demilitarized zone


dCreate two DMZ zones with one untrusted domain



What is used to protect network from outside internet access?


aA trusted antivirus


b24 hours scanning for virus


cFirewall to separate trusted and untrusted network


dDeny users access to websites which can potentially cause security leak



What is not an important part of security protection?


aLarge amount of RAM to support antivirus


bStrong passwords


cAudit log periodically


dScan for unauthorized programs in system directories



What are strengths of Network based IDS?


aCost of ownership reduced


bMalicious intent detection


cReal time detection and response


dAll of the mentioned


View Answer All of the mentioned

What are characteristics of Network based IDS?


aThey look for attack signatures in network traffic


bFilter decides which traffic will not be discarded or passed


cIt is programmed to interpret a certain series of packet


dIt models the normal usage of network as a noise characterization



What are characteristics of stack based IDS?


aThey are integrated closely with the TCP/IP stack and watch packets


bThe host operating system logs in the audit information


cIt is programmed to interpret a certain series of packets


dIt models the normal usage of network as a noise characterization



What are the strengths of the host based IDS?


aAttack verification


bSystem specific activity


cNo additional hardware required


dAll of the mentioned


View Answer All of the mentioned

Goto Page No.

Page 51 of 108

Alphabetical MCQs Categories

Here below You find all kind of categories of MCQs in alphabetical order.


"Comprehensive Collection of MCQs: Alphabetically Organized by Subject"

"Discover an extensive collection of multiple-choice questions (MCQs) neatly categorized by subject from A to Z. This resource is designed for anyone eager to explore various topics in a straightforward and organized manner. Whether you're a student preparing for exams, an educator seeking supplementary materials, or simply curious about different subjects, this compilation offers a convenient way to learn and assess your knowledge. With questions arranged alphabetically, navigation is effortless, allowing you to delve into subjects of interest at your own pace. Engage, learn, and expand your understanding with this accessible and comprehensive repository of MCQs!"


BolPakistan

bolpakistan.com.pk includes Job Mcqs and Pak Mcqs is the Top Largest Mcqs Forum in World, in which you can read Mcqs of All Subjects, PPSC test preparation, FPSC, NTS and PPSC PAST PAPERS, PPSC PAST MCQS. A Collection of Repeated MCQs for JOBs seekers.

Copyright © 2024, Designed & Developed by BolPakistan