Unit 4 - Practice Quiz

CSE316 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following is NOT a necessary condition for a deadlock to occur?

A. Preemption
B. Hold and Wait
C. Circular Wait
D. Mutual Exclusion

2 Which deadlock handling strategy involves ensuring that at least one of the necessary conditions for deadlock cannot hold?

A. Deadlock Detection
B. Deadlock Prevention
C. Deadlock Recovery
D. Deadlock Avoidance

3 The Banker’s Algorithm is used for which purpose in an Operating System?

A. Deadlock Detection
B. Deadlock Avoidance
C. Deadlock Prevention
D. Deadlock Recovery

4 A system is in a 'safe state' if:

A. All resources are currently free.
B. No process is waiting for resources.
C. There is no deadlock.
D. There exists a safe sequence of all processes.

5 In a Resource Allocation Graph, if the graph contains no cycles, then:

A. A deadlock may exist.
B. The system is in an unsafe state.
C. A deadlock exists.
D. No deadlock exists.

6 Which technique addresses the 'Circular Wait' condition to prevent deadlock?

A. Spooling resources
B. Requesting all resources at the start
C. Allowing preemption
D. Imposing a total ordering of all resource types

7 What is the primary difference between a Virus and a Worm?

A. A virus spreads via network only; a worm spreads via disk.
B. A virus requires a host program to spread; a worm can replicate independently.
C. A worm infects hardware; a virus infects software.
D. A virus is harmless; a worm is malicious.

8 Which of the following describes 'Starvation'?

A. A security breach in the kernel.
B. Two processes waiting indefinitely for each other.
C. The system crashing due to memory overload.
D. A process waiting indefinitely because other processes are constantly favored.

9 A 'Trapdoor' (or Backdoor) in a system is:

A. A hardware failure.
B. A protocol for secure file transfer.
C. A mechanism to bypass security controls.
D. A type of antivirus software.

10 Which attack involves overwriting a memory area to corrupt data or execute malicious code?

A. Buffer Overflow
B. Denial of Service
C. Sniffing
D. Phishing

11 Which component of the Access Matrix model represents the protection domain?

A. The column
B. The file system
C. The intersection cell
D. The row

12 Implementing an Access Matrix by storing list of objects and rights with each domain is known as:

A. Access Control List (ACL)
B. Capability List
C. Global Table
D. Lock-key mechanism

13 The 'Principle of Least Privilege' states that:

A. Programs and users should be given just enough privileges to perform their task.
B. Security should be handled only by the OS kernel.
C. All users should have the same privilege level.
D. Users should have maximum access to ensure efficiency.

14 Which of the following is a method for Deadlock Recovery?

A. Banker's Algorithm
B. Ordering Resources
C. Wait-for Graph
D. Process Termination

15 What is 'Cache Poisoning'?

A. Encrypting the cache so the CPU cannot read it.
B. Physically damaging the cache memory.
C. Introducing false information into a DNS or ARP cache.
D. Filling the cache so no valid data can be stored.

16 In the context of Deadlock Detection with single instances of each resource type, which structure is used?

A. Access Control List
B. Gantt Chart
C. Wait-for Graph
D. Banker's Matrix

17 Which of the following is an example of a 'Program Threat'?

A. Shoulder surfing
B. Trojan Horse
C. Dumpster diving
D. Phishing email

18 The practice of adding a random string to a password before hashing it is called:

A. Phishing
B. Salting
C. Snooping
D. Spoofing

19 Which recovery method involves rolling back a process to a safe checkpoint?

A. Mutual Exclusion
B. Resource Preemption
C. Starvation
D. Process Termination

20 A 'Logic Bomb' is:

A. A hardware malfunction.
B. A type of firewall.
C. A virus that spreads via email.
D. Code embedded in a legitimate program that executes when specific conditions are met.

21 In an Access Control List (ACL) implementation, the permissions are associated with:

A. The Network
B. The Object (File/Resource)
C. The Domain (User)
D. The Operating System

22 Which of the following is a goal of Protection in an OS?

A. To maximize memory fragmentation.
B. To ensure that resources are used only by those processes that have proper authorization.
C. To prevent the user from installing applications.
D. To increase CPU speed.

23 What is the 'Ostrich Algorithm' in the context of deadlocks?

A. Preventing the deadlock strictly.
B. Ignoring the deadlock problem altogether.
C. Detecting the deadlock and recovering.
D. Avoiding the deadlock using probabilities.

24 Which attack attempts to guess a password by trying every possible combination of characters?

A. Trojan Horse
B. Brute Force Attack
C. Dictionary Attack
D. Phishing

25 What is a 'Denial of Service' (DoS) attack?

A. Injecting a virus into the boot sector.
B. Stealing user passwords.
C. Encrypting user data for ransom.
D. Preventing legitimate users from accessing a system or network.

26 The 'Need-to-Know' principle suggests:

A. A process should only have access to resources currently required for its task.
B. Security is not necessary for internal networks.
C. Users must know everything about the system.
D. All files should be readable by everyone.

27 Which of the following is NOT a standard method for user authentication?

A. Something the user knows (Password)
B. Something the user wants (Desire)
C. Something the user has (Smart card)
D. Something the user is (Biometrics)

28 In the context of protection, a 'Domain' implies:

A. A set of access rights/privileges.
B. A physical location of the server.
C. The type of operating system used.
D. A website address.

29 Which deadlock prevention strategy denies the 'Hold and Wait' condition?

A. Using the Banker's Algorithm.
B. Requiring a process to request all resources before execution begins.
C. Ordering resources numerically.
D. Preempting resources from a process.

30 What is 'Stack Smashing'?

A. A form of buffer overflow attack targeting the stack.
B. Compressing the stack to save memory.
C. Physical damage to the CPU stack.
D. Deleting the stack pointer.

31 A 'Polymorphic Virus' is one that:

A. Cannot be removed.
B. Infects multiple operating systems.
C. Only attacks graphics files.
D. Changes its signature or code every time it replicates to avoid detection.

32 What does 'Mutual Exclusion' mean in the context of deadlock?

A. Processes must share all resources.
B. At least one resource must be held in a non-sharable mode.
C. Processes wait in a circle.
D. Resources can be preempted.

33 Which of the following best describes 'Phishing'?

A. Guessing passwords using a dictionary.
B. Social engineering via email/web to steal credentials.
C. Flooding a network with traffic.
D. Intercepting Wi-Fi signals.

34 In the Lock-Key mechanism for access control:

A. Every user has a physical key.
B. It is identical to an Access Control List.
C. Each object has a list of unique bit patterns (locks) and domains have patterns (keys).
D. The OS uses a master password.

35 One-Time Passwords (OTP) are used to primarily prevent:

A. Replay attacks.
B. Virus infections.
C. Buffer overflows.
D. Deadlocks.

36 Which of the following is a 'System Threat' rather than a 'Program Threat'?

A. Worm
B. Trapdoor
C. Virus
D. Trojan Horse

37 If a process P1 is holding Resource R1 and waiting for R2, and P2 is holding R2 and waiting for R1, this is an example of:

A. Starvation
B. Safe State
C. Preemption
D. Circular Wait

38 Secure communication over a network often relies on:

A. Faster routers.
B. Short passwords.
C. Open access points.
D. Encryption and Cryptography.

39 Man-in-the-middle (MitM) attack involves:

A. An attacker locking the database.
B. An attacker secretly relaying and possibly altering communication between two parties.
C. An attacker destroying the server hardware.
D. An attacker guessing the password.

40 A 'Stealth Virus' attempts to:

A. Hide its presence from the OS and antivirus software.
B. Make the screen go black.
C. Delete the boot sector immediately.
D. Encrypt the hard drive.

41 Which of the following is a weakness of the Global Table implementation of the Access Matrix?

A. It allows everyone to access everything.
B. It does not support file permissions.
C. It is too secure.
D. The table can become extremely large and cannot be kept in main memory.

42 When a system recovers from deadlock by rolling back a process, what issue must be addressed to prevent the same process from being picked repeatedly?

A. Mutual Exclusion
B. Latency
C. Starvation
D. Throughput

43 What is the main disadvantage of Deadlock Detection compared to Deadlock Prevention?

A. It requires runtime overhead to run the detection algorithm.
B. It never finds deadlocks.
C. It requires user intervention.
D. It restricts resource usage.

44 In protection systems, switching from one domain to another (Domain Switching) typically happens when:

A. A file is deleted.
B. A user logs out.
C. The computer is restarted.
D. A process calls a system call or changes privilege level.

45 The 'Confidentiality' aspect of security ensures that:

A. Assets are accessible only to authorized parties.
B. Assets are accessible to authorized parties.
C. The system is always running.
D. Assets can only be modified by authorized parties.

46 Which of the following is an example of a 'Day Zero' or 'Zero-Day' attack?

A. An attack that happens at midnight.
B. An attack exploiting a vulnerability before the developer knows about it or has a fix.
C. An attack that deletes 0 bytes.
D. An attack using 0s and 1s.

47 Password 'Salting' makes which specific type of attack much more difficult?

A. Social Engineering
B. Brute Force
C. Dictionary Attack using Rainbow Tables
D. Phishing

48 In the context of Application Security, 'Input Validation' helps prevent:

A. Deadlock
B. Starvation
C. Buffer Overflow and SQL Injection
D. Packet Sniffing

49 What is 'Network Sniffing'?

A. Speeding up the network connection.
B. Cleaning the network cables.
C. Smelling the hardware for burning components.
D. Monitoring and capturing data packets passing through a network.

50 Which concept ensures that a modification to a system asset is done only in an authorized manner?

A. Confidentiality
B. Integrity
C. Availability
D. Authentication