MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Protection Revocation of Access Rights knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What are the characteristics of Cambridge CAP system as compared to Hydra system? |
| A. | It is simpler and less powerful than hydra system |
| B. | It is more powerful than hydra system |
| C. | It is powerful than hydra system |
| D. | It is not as secure as Hydra system |
| Answer» B. It is more powerful than hydra system | |
| 2. |
What is the problem of mutually suspicious subsystem? |
| A. | Service program can steal users data |
| B. | Service program can malfunction and retain some rights of data provided by user |
| C. | Calling program can get access to restricted portion from service program |
| D. | Calling program gets unrestricted access |
| Answer» C. Calling program can get access to restricted portion from service program | |
| 3. |
What are the characteristics of rights amplification in Hydra? |
| A. | This scheme allows a procedure to be certified as trustworthy |
| B. | Amplification of rights cannot be stated explicitly in declaration |
| C. | It includes kernel rights such as read |
| D. | All of the mentioned |
| Answer» B. Amplification of rights cannot be stated explicitly in declaration | |
| 4. |
What are the characteristics of the Hydra system? |
| A. | It consists of known access rights and interpreted by the system |
| B. | A user can of protection system can declare other rights |
| C. | Hydra system is not flexible |
| D. | Hydra doesn t provide rights amplification |
| Answer» B. A user can of protection system can declare other rights | |
| 5. |
How can Keys be defined or replaced? |
| A. | create [keyname] [bits] |
| B. | set-key |
| C. | Key |
| D. | MAKE [Key Name] |
| Answer» C. Key | |
| 6. |
What is true about Indirection to revoke capability? |
| A. | Capabilities point indirectly to the objects |
| B. | Each capability will not have a unique entry in global |
| C. | Table entries cannot be reused for other capabilities |
| D. | This system was adopted in MULTICS system |
| Answer» B. Each capability will not have a unique entry in global | |
| 7. |
What is false regarding Back-Pointers scheme to revoke capability? |
| A. | List of pointers is maintained with each object |
| B. | When revocation is required these pointers are followed |
| C. | This scheme is not adopted in MULTICS system |
| D. | These point to all capabilities associated with that object |
| Answer» D. These point to all capabilities associated with that object | |
| 8. |
What is the reacquisition scheme to revoke capability? |
| A. | When a process capability is revoked then it won t be able to reacquire it |
| B. | Pointers are maintained for each object which can be used to revoke |
| C. | Indirect pointing is done to revoke object s capabilities |
| D. | Master key can be used compare and revoke. |
| Answer» B. Pointers are maintained for each object which can be used to revoke | |
| 9. |
Why is it difficult to revoke capabilities? |
| A. | They are too many |
| B. | They are not defined precicely |
| C. | They are distributed throughout the system |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 10. |
What are the incorrect methods of revocation of access rights? |
| A. | Immediate/Delayed |
| B. | Selective/General |
| C. | Partial/total |
| D. | Crucial |
| Answer» E. | |