ALL PRINTABLE PDF BOOKS FREE DOWNLOAD <<CLICK HERE>>
Operating system mcqs protection revocation access rights


Question 1 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
Why is it difficult to revoke capabilities?
They are too many | |
They are not defined precicely | |
They are distributed throughout the system | |
None of the mentioned |
Question 2 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What are the incorrect methods of revocation of access rights?
Immediate/Delayed | |
Selective/General | |
Partial/total | |
Crucial |
Question 3 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What is the problem of mutually suspicious subsystem?
Service program can steal users data | |
Service program can malfunction and retain some rights of data provided by user | |
Calling program can get access to restricted portion from service program | |
Calling program gets unrestricted access |
Question 3 Explanation:
Both calling program and service program are vulnerable to access each others private data/rights.
Question 4 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What are the characteristics of the Hydra system?
It consists of known access rights and interpreted by the system | |
A user can of protection system can declare other rights | |
Hydra system is not flexible | |
Hydra doesn't provide rights amplification |
Question 5 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What are the characteristics of rights amplification in Hydra?
This scheme allows a procedure to be certified as trustworthy | |
Amplification of rights cannot be stated explicitly in declaration | |
It includes kernel rights such as read | |
All of the mentioned |
There are 5 questions to complete.