Protection Concepts - Operating System Questions & Answers

1.

Which principle states that programs, users and even the systems be given just enough privileges to perform their task?

   A.) principle of operating system
   B.) principle of least privilege
   C.) principle of process scheduling
   D.) none of the mentioned

Answer: Option 'B'

​principle of least privilege

2.

_______ is an approach to restricting system access to authorized users.

   A.) Job-based access control
   B.) Process-based access control
   C.) Role-based access control
   D.) None of the mentioned

Answer: Option 'C'

​Role-based access control

3.

If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is

   A.) static
   B.) dynamic
   C.) neither static nor dynamic
   D.) none of the mentioned

Answer: Option 'A'

​static

4.

The protection domain of a process contains

   A.) object name
   B.) rights-set
   C.) both object name and rights-set
   D.) none of the mentioned

Answer: Option 'C'

​both object name and rights-set

5.

For system protection, a process should access

   A.) all the resources
   B.) only those resources for which it has authorization
   C.) few resources but authorization is not required
   D.) all of the mentioned

Answer: Option 'B'

​only those resources for which it has authorization

6.

Access matrix model for user authentication contains

   A.) a list of objects
   B.) a list of domains
   C.) a function which returns an object’s type
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned

7.

Global table implementation of matrix table contains

   A.) domain
   B.) object
   C.) right-set
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned

8.

For a domain _______ is a list of objects together with the operation allowed on these objects.

   A.) capability list
   B.) access list
   C.) both capability and access list
   D.) none of the mentioned

Answer: Option 'A'

​capability list

9.

Which one of the following is capability based protection system?

   A.) hydra
   B.) cambridge CAP system
   C.) both hydra and cambridge CAP system
   D.) none of the mentioned

Answer: Option 'C'

​both hydra and cambridge CAP system

10.

In UNIX, domain switch is accomplished via

   A.) file system
   B.) user
   C.) superuser
   D.) none of the mentioned

Answer: Option 'A'

file system


Protection Concepts - Operating System Questions & Answers Download Pdf

Recent Posts