Protection - Access Matrix - Operating System Questions & Answers

1.

Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical separation – In which processes conceal their data and computations

   A.) i
   B.) i and iii
   C.) ii and iii
   D.) iii and iv

Answer: Option 'B'

i and iii

2.

What is ‘separation’ in security of Operating systems ?

   A.) To have separate login for different users
   B.) To have separate Hard disk drive/partition for different users
   C.) It means keeping one user’s objects separate from other users
   D.) None of the mentioned

Answer: Option 'C'

It means keeping one user’s objects separate from other users

3.

Which of the following objects require protection ?

   A.) CPU
   B.) Printers
   C.) Motherboard
   D.) All of the mentioned

Answer: Option 'B'

Printers

4.

Which is an unsolvable problem in access-matrix ?

   A.) Owner override
   B.) Brute force
   C.) Access denied
   D.) Confinement

Answer: Option 'D'

Confinement

5.

Which two rights allow a process to change the entries in a column ?

   A.) copy and transfer
   B.) copy and owner
   C.) owner and transfer
   D.) deny and copy

Answer: Option 'A'

copy and transfer

6.

What are the three copyrights ?

   A.) copy
   B.) transfer
   C.) limited copy
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned

7.

Who can add new rights and remove some rights ?

   A.) copy
   B.) transfer
   C.) limited copy
   D.) owner

Answer: Option 'D'

owner

8.

What are the three additional operations to change the contents of the access-matrix ?

   A.) copy
   B.) Owner
   C.) control
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned

9.

In domain structure what is Access-right equal to ?

   A.) Access-right = object-name, rights-set
   B.) Access-right = read-name, write-set
   C.) Access-right = read-name, execute-set
   D.) Access-right = object-name, execute-set

Answer: Option 'A'

Access-right = object-name, rights-set

10.

What is meaning of right-set ?

   A.) It is a subset consist of read and write
   B.) It is a subset of all valid operations that can be performed on the object
   C.) It is a subset consist of read,write and execute
   D.) None of the mentioned

Answer: Option 'B'

It is a subset of all valid operations that can be performed on the object

Protection - Access Matrix - Operating System Questions & Answers Download Pdf

Recent Posts