Q61
Q61 What is the purpose of access control in operating system security?
To monitor system performance
To control file sizes
To grant or deny access to system resources
To create backup copies
Q62
Q62 What is the role of the kernel in an operating system's security architecture?
It provides network connectivity
It manages file storage
It enforces security policies
It handles system updates
Q63
Q63 Which of the following is a common type of attack that targets operating systems?
Man-in-the-middle
Denial-of-service
Rootkit
Phishing
Q64
Q64 What is the purpose of a system call in an operating system?
To allow applications to request services from the kernel
To execute network requests
To manage power settings
To format the disk
Q65
Q65 Which of the following best describes "sandboxing" in operating system security?
Running applications in isolation
Encrypting all system data
Reducing file sizes
Increasing disk space
Q66
Q66 Which Linux command is used to change file permissions to secure files?
cp
chmod
ls
rm
Q67
Q67 Which Windows command-line tool is used to check for system file integrity and repair issues?
ping
sfc
dir
taskkill
Q68
Q68 How can you securely remove a file in Linux to prevent data recovery?
mv
rm
shred
cp
Q69
Q69 A user complains that they cannot modify a system file. What could be the reason?
The file is encrypted
The file is read-only
The file is corrupted
The file is compressed
Q70
Q70 An administrator notices that the system is running slow due to high CPU usage by an unknown process. What could be the reason?
Antivirus running
New updates available
Malware
File compression
Q71
Q71 A Windows machine keeps crashing with a blue screen error. What might be the cause?
Software installation
Hardware failure
Power outage
File compression
Q72
Q72 What is the main goal of malware?
To enhance system performance
To steal, damage, or manipulate data
To block antivirus software
To improve security
Q73
Q73 Which type of malware replicates itself and spreads across networks without user interaction?
Virus
Worm
Trojan
Ransomware
Q74
Q74 What is the purpose of ransomware in a cyber attack?
To demand payment for releasing encrypted data
To destroy the victim’s data
To hide malicious files
To improve system performance
Q75
Q75 Which type of malware disguises itself as legitimate software to trick users into installing it?
Trojan
Worm
Virus
Adware
Q76
Q76 What is the key difference between a virus and a worm in malware behavior?
A worm needs user interaction, while a virus spreads automatically
A virus needs user interaction, while a worm spreads automatically
They both require user interaction
Both spread automatically
Q77
Q77 Which tool is commonly used to analyze malware behavior in a safe environment?
Task Manager
Wireshark
Sandbox
Control Panel
Q78
Q78 How can you detect malware activity on a system using a Linux command?
cat
top
ls
chmod
Q79
Q79 In which programming language is most ransomware typically written?
Python
Java
C++
C#
Q80
Q80 A user reports that their files have been renamed with a strange extension and cannot be opened. What type of malware could this be?
Adware
Ransomware
Spyware
Trojan
Q81
Q81 A system administrator notices unusual outbound traffic from a workstation that shouldn't be communicating externally. What could be the cause?
Routine updates
Malware infection
Firewall rules
Software update failure
Q82
Q82 A user’s system is running unusually slow, and multiple unknown processes are consuming high CPU usage. What should the next step be?
Ignore the issue
Terminate all processes
Run a malware scan
Reinstall the system
Q83
Q83 What is the primary goal of incident response in cybersecurity?
To identify system updates
To restore normal operations quickly
To punish attackers
To enhance system performance
Q84
Q84 Which phase of the incident response process involves containment and eradication of the threat?
Identification
Preparation
Containment
Recovery
Q85
Q85 In digital forensics, what is the importance of maintaining a proper chain of custody for evidence?
To ensure the integrity of the evidence
To increase the cost of investigation
To destroy irrelevant data
To speed up the analysis
Q86
Q86 Which type of attack is most commonly investigated in digital forensics?
Social engineering
Phishing
Denial-of-service
Data breach
Q87
Q87 What is the primary role of a digital forensic examiner during an investigation?
To punish the attackers
To perform live system updates
To collect and analyze digital evidence
To develop new malware
Q88
Q88 Which Linux tool is commonly used for creating disk images during forensic investigations?
grep
dd
chmod
cat
Q89
Q89 Which forensic tool is used to analyze network traffic for evidence of malicious activity?
Nmap
Wireshark
GIMP
Nessus
Q90
Q90 In a forensic investigation, how would you recover deleted files from a hard drive?
By using ping
By using data recovery software
By reinstalling the OS
By disabling the firewall