MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Protection Memory Protection knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What is the principle of least privilege? |
| A. | Less privileges provide difficulty in executing admin tasks |
| B. | Users can get temporary high privilege access |
| C. | Users should be given just enough privileges to perform their tasks |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 2. |
What is the main objective of protection? |
| A. | Ensure all objects are protected individually |
| B. | Objects have different priority and thus different levels of protection |
| C. | Ensure that each object is accessed correctly and only by allowed processes |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 3. |
What is the correct way the segmentation program address is stored? |
| A. | name, offset |
| B. | start, stop |
| C. | access, rights |
| D. | offset, rights |
| Answer» B. start, stop | |
| 4. |
What is a major feature of segmentation? |
| A. | Program is divided in data memory and program memory |
| B. | Program is executed in segments |
| C. | Program is divided into pieces having different access rights |
| D. | It has effect of an unbounded architecture |
| Answer» D. It has effect of an unbounded architecture | |
| 5. |
What is true regarding tagged architecture? |
| A. | Every word of machine memory has one or more extra bits |
| B. | Extra bits are used to do padding |
| C. | Extra bits are not used to identify rights to that word |
| D. | It is very compatible to code upgrades |
| Answer» B. Extra bits are used to do padding | |
| 6. |
How is disadvantage of all-or-nothing approach overcome? |
| A. | Base/Bound |
| B. | Relocation technique |
| C. | Fence method |
| D. | Tagged architecture |
| Answer» E. | |
| 7. |
What is all-or-nothing situation for sharing in memory? |
| A. | Program makes all its data available to be accessed |
| B. | It prohibits access to some |
| C. | It creates rules who can access program memory |
| D. | It separates program memory and data memory |
| Answer» B. It prohibits access to some | |
| 8. |
What is the role of base/bound registers? |
| A. | They give starting address to a program |
| B. | Program s addresses are neatly confined to space between the base and the bound registers |
| C. | They provide encrypted environment |
| D. | This technique doesn t protects a program s address from modification by another user |
| Answer» C. They provide encrypted environment | |
| 9. |
What is the basic need in protecting memory in multi-user environment? |
| A. | We need two registers one start and other end |
| B. | We need a variable register |
| C. | A fence register has to be used known as base register. |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 10. |
How can fence and relocation be used together? |
| A. | To each program address, the contents of fence register are added |
| B. | To contents of fence register is subtracted from actual address of program |
| C. | To each program address, the contents of fence register are not added |
| D. | None of the mentioned |
| Answer» B. To contents of fence register is subtracted from actual address of program | |
| 11. |
What is correct regarding relocation w.r.t protecting memory? |
| A. | It is a process of taking a program as if it began at address 0 |
| B. | It is a process of taking a program as if it began at address 0A |
| C. | Fence cannot be used within relocation process |
| D. | All of the mentioned |
| Answer» B. It is a process of taking a program as if it began at address 0A | |
| 12. |
What is not true regarding Fence ? |
| A. | It is implemented via hardware register |
| B. | It doesn t protect users from each other |
| C. | It good to protect OS from abusive users |
| D. | Its implementation is unrestricted and can take any amount of space in Operating system. |
| Answer» E. | |
| 13. |
What is true regarding Fence ? |
| A. | Its a method to confine users to one side of a boundary |
| B. | It can protect Operating system from one user |
| C. | It cannot protect users from each other |
| D. | All of the mentioned |
| Answer» E. | |