#1
What is the primary purpose of an operating system?
To manage hardware resources
ExplanationFacilitates efficient utilization and coordination of computer hardware components.
#2
What is the significance of regular software updates in maintaining operating system security?
To fix security vulnerabilities and bugs
ExplanationAddresses and patches known security vulnerabilities, enhancing system security.
#3
Which security measure helps protect sensitive information by converting it into unreadable characters?
Encryption
ExplanationConverts sensitive information into an unreadable format for protection.
#4
Which security measure helps prevent unauthorized access to a computer system?
Firewall
ExplanationActs as a barrier between a trusted internal network and untrusted external networks.
#5
What is the principle of least privilege in the context of user permissions?
Users should have the least amount of privileges necessary to perform their job functions
ExplanationReduces the risk of unauthorized access or misuse by limiting user permissions.
#6
What is the role of a sandbox in the context of operating system security?
An isolated environment for testing and executing untrusted code
ExplanationProvides a secure testing space for untrusted software, minimizing risks.
#7
Which security measure helps protect against malware by monitoring and analyzing system behavior?
Intrusion detection system (IDS)
ExplanationIdentifies and alerts on unusual activities or security breaches.
#8
What is the purpose of a security audit in the context of operating systems?
To identify and assess security vulnerabilities
ExplanationEvaluates system security to identify weaknesses and potential risks.
#9
What is the purpose of encryption in operating system security?
To secure data by converting it into a coded format
ExplanationProtects sensitive information by transforming it into an unreadable format.
#10
Which of the following is an example of a multi-factor authentication method?
Fingerprint and PIN
ExplanationRequires multiple forms of identification for access, enhancing security.
#11
What is the purpose of access control lists (ACLs) in operating systems?
To control permissions for files and directories
ExplanationManages and restricts user access to specific files or directories.
#12
In the context of security, what is the concept of 'defense in depth'?
Layered security with multiple safeguards at different levels
ExplanationUtilizes multiple security layers to mitigate risks at various levels.
#13
What is the role of a honeypot in operating system security?
A trap set to detect and deflect unauthorized access attempts
ExplanationLures attackers to a decoy system, allowing monitoring and countermeasures.