Threats to OS Flashcards
Important! (60 cards)
Malicious software that replicates itself is known as a:
a) Trojan Horse
b) Virus
c) Worm
d) Logic Bomb
Answer:
c) Worm
Explanation:
Worms are a type of malware that can replicate themselves and spread to other systems.
Which of the following is NOT a type of malware?
a) Virus
b) Trojan Horse
c) Firewall
d) Worm
Answer:
c) Firewall
Explanation:
A firewall is a security system that monitors and controls incoming and outgoing network traffic, not a type of malware.
A program that appears harmless but performs malicious actions is a:
a) Virus
b) Worm
c) Trojan Horse
d) Logic Bomb
Answer:
c) Trojan Horse
Explanation:
Trojan horses disguise themselves as legitimate software to deceive users.
Which type of attack prevents legitimate users from accessing a system?
a) Buffer Overflow
b) Denial of Service
c) Trap Door
d) Logic Bomb
Answer:
b) Denial of Service
Explanation:
Denial of Service (DoS) attacks overwhelm a system with requests, making it unavailable to intended users.
A vulnerability where more data is written to a buffer than it can hold is called:
a) Denial of Service
b) Trap Door
c) Buffer Overflow
d) Logic Bomb
Answer:
c) Buffer Overflow
Explanation:
Buffer overflows can be exploited to crash a system or execute malicious code.
Which of the following is a program threat?
a) Worm
b) Port Scanning
c) Trojan Horse
d) Denial of Service
Answer:
c) Trojan Horse
Explanation:
Trojan Horses are classified as program threats.
Which of the following is a system threat?
a) Virus
b) Trojan Horse
c) Logic Bomb
d) Denial of Service
Answer:
d) Denial of Service
Explanation:
Denial of Service is a system threat.
Which security measure monitors network traffic to identify intrusions?
a) Authentication
b) Access Control
c) Intrusion Detection System
d) Firewall
Answer:
c) Intrusion Detection System
Explanation:
Intrusion Detection Systems (IDS) analyze system events to detect malicious activity.
Which type of IDS monitors a single host?
a) Network-based IDS
b) Host-based IDS
c) Both a and b
d) None of the above
Answer:
b) Host-based IDS
Explanation:
Host-based IDS (HIDS) focus on monitoring the characteristics of a single host system.
A network security system that protects a network from unwanted traffic is a:
a) Intrusion Detection System
b) Firewall
c) Antivirus Software
d) Access Control System
Answer:
b) Firewall
Explanation:
Firewalls block unwanted network traffic based on predefined rules.
What is the primary purpose of TLS/SSL certificates?
a) Blocking malware
b) Encrypting and protecting private information
c) Monitoring network traffic
d) Managing user accounts
Answer:
b) Encrypting and protecting private information
Explanation:
TLS/SSL certificates encrypt data transmitted between a user and a website.
Which security measure involves verifying the identity of a system entity?
a) Authorization
b) Authentication
c) Access Control
d) Intrusion Detection
Answer:
b) Authentication
Explanation:
Authentication is the process of verifying the identity of a user or device.
The process of verifying access rights to resources is called:
a) Authentication
b) Authorization
c) Identification
d) Verification
Answer:
b) Authorization
Explanation:
Authorization determines what actions a user is allowed to perform.
Which authentication method uses biometric verification?
a) Username/Password
b) User Attribution
c) User Card and Key
d) All of the above
Answer:
b) User Attribution
Explanation:
User attribution, which includes biometric verification like fingerprints, verifies users based on their unique biological traits.
A security policy that specifies who can access system resources is:
a) Authentication
b) Authorization
c) Access Control
d) Intrusion Detection
Answer:
c) Access Control
Explanation:
Access control defines and manages who has permission to access specific resources.
What is the highest level of computer security classification?
a) Type A
b) Type B
c) Type C
d) Type D
Answer:
a) Type A
Explanation:
Type A represents the highest level, using formal design specifications and verification techniques.
Which security classification level involves mandatory protection?
a) Type A
b) Type B
c) Type C
d) Type D
Answer:
b) Type B
Explanation:
Type B provides mandatory protection systems.
What does TCB stand for?
a) Trusted Computer Base
b) Trusted Computing Base
c) Total Computer Base
d) Total Computing Base
Answer:
b) Trusted Computing Base
Explanation:
TCB refers to the combined hardware, firmware, and software components crucial to a computer’s security.
In the Secure OS Trust Model, does the OS trust processes outside the TCB?
a) Yes
b) No
c) Sometimes
d) It depends on the user
Answer:
b) No
Explanation:
A secure OS does not trust processes outside the Trusted Computing Base (TCB).
Which of the following operating systems is mentioned as applying authorization policy while creating a file?
a) Windows
b) macOS
c) Linux
d) Chrome OS
Answer:
c) Linux
Explanation:
Linux applies authorization policies not only when reading a file but also when creating it.
Define “malware” and give two examples.
Answer:
Malware is software designed to infiltrate or damage computer systems.
Examples include viruses and worms.
What is the primary difference between a virus and a worm?
Answer:
A virus requires a host file to spread, while a worm can replicate and spread independently.
Explain the concept of a “Trojan Horse.”
Answer:
A Trojan Horse is a type of malware that disguises itself as legitimate software to trick users into installing it, often to gain unauthorized access.
What is a “Denial of Service” (DoS) attack?
Answer:
A Denial of Service (DoS) attack floods a system with traffic or requests, making it unavailable to legitimate users.