Operating system mcqs protection revocation access rights

ALL PRINTABLE PDF BOOKS FREE DOWNLOAD <<CLICK HERE>>

Operating system mcqs protection revocation access rights

Question 1 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Why is it difficult to revoke capabilities?
A
They are too many
B
They are not defined precicely
C
They are distributed throughout the system
D
None of the mentioned
Question 2 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What are the incorrect methods of revocation of access rights?
A
Immediate/Delayed
B
Selective/General
C
Partial/total
D
Crucial
Question 3 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is the problem of mutually suspicious subsystem?
A
Service program can steal users data
B
Service program can malfunction and retain some rights of data provided by user
C
Calling program can get access to restricted portion from service program
D
Calling program gets unrestricted access
Question 3 Explanation: 
Both calling program and service program are vulnerable to access each others private data/rights.
Question 4 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What are the characteristics of the Hydra system?
A
It consists of known access rights and interpreted by the system
B
A user can of protection system can declare other rights
C
Hydra system is not flexible
D
Hydra doesn't provide rights amplification
Question 5 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What are the characteristics of rights amplification in Hydra?
A
This scheme allows a procedure to be certified as trustworthy
B
Amplification of rights cannot be stated explicitly in declaration
C
It includes kernel rights such as read
D
All of the mentioned
There are 5 questions to complete.

DOWNLOAD ALL SUBJECTS PDF <<CLICK HERE>>