Exam 17: Protection

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A capability list for a domain is ____________________

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

Explain the need-to-known principle.

Free
(Essay)
4.8/5
(42)
Correct Answer:
Verified

The need-to-know principle means that at any time, a process should be able to access only those objects that it currently requires to complete its task. This rule is useful in limiting the amount of damage a faulty process or an attacker can cause in the system.

How does Linux use system-call filtering?

Free
(Essay)
4.7/5
(40)
Correct Answer:
Verified

A code can be added to the kernel to perform an inspection at the system-call gate, restricting a caller to a subset of system calls deemed safe or required for that caller's function. Specific system-call profiles can be constructed for individual processes. The Linux mechanism SECCOMP-BPF uses the Berkeley Packet Filter language to load a custom profile through Linux's proprietary prctl system call. This filtering can be effectively enforced if called from within a run-time library when it initializes or from within the loader itself before it transfers control to the program's entry point.

Rings of protection separate functions into domains and order them hierarchically.

(True/False)
4.9/5
(26)

________________ is not a protection mechanism.

(Multiple Choice)
4.8/5
(32)

The ability to copy an access right from one domain to another may be realized as follows

(Multiple Choice)
4.9/5
(32)

root user can modify mandatory access control (MAC)

(True/False)
4.9/5
(39)

What capability is not used by Linux?

(Multiple Choice)
4.8/5
(28)

Explain a confinement problem.

(Essay)
4.8/5
(30)

Describe domain switching.

(Essay)
4.7/5
(32)

What does compartmentalization mean?

(Essay)
4.9/5
(31)

Describe the idea of the sandboxing.

(Essay)
4.9/5
(31)

Describe the idea of SIP (System Integrity Protection).

(Essay)
4.8/5
(24)

What protection mechanism is used to ensure that operating-system distributions and patches have not be changed?

(Essay)
4.9/5
(39)

Which of the following is an advantage of compiler-based enforcement of access control?

(Multiple Choice)
4.8/5
(33)

A protection domain is a collection of access rights, each of which is ___________________

(Multiple Choice)
4.9/5
(40)

The default set of access rights are used if no entry in the access list is found.

(True/False)
4.7/5
(30)

What is the difference between mechanisms and policies?

(Multiple Choice)
4.7/5
(32)

Which of the following is true of the Java programming language in relation to protection?

(Multiple Choice)
4.8/5
(38)

Object means __________

(Multiple Choice)
4.7/5
(29)
Showing 1 - 20 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)