Operating system mcqs protection revocation access rights
Click on any option to know the CORRECT ANSWERS
Why is it difficult to revoke capabilities?
They are too many
They are not defined precicely
They are distributed throughout the system
None of the mentioned
What are the incorrect methods of revocation of access rights?
What is the problem of mutually suspicious subsystem?
Service program can steal users data
Service program can malfunction and retain some rights of data provided by user
Calling program can get access to restricted portion from service program
Calling program gets unrestricted access
Question 3 Explanation:
Both calling program and service program are vulnerable to access each others private data/rights.
What are the characteristics of the Hydra system?
It consists of known access rights and interpreted by the system
A user can of protection system can declare other rights
Hydra system is not flexible
Hydra doesn't provide rights amplification
What are the characteristics of rights amplification in Hydra?
This scheme allows a procedure to be certified as trustworthy
Amplification of rights cannot be stated explicitly in declaration
It includes kernel rights such as read
All of the mentioned
There are 5 questions to complete.