Exam 17: Protection
A capability list for a domain is ____________________
C
Explain the need-to-known principle.
The need-to-know principle means that at any time, a process should be able to access only those objects that it currently requires to complete its task. This rule is useful in limiting the amount of damage a faulty process or an attacker can cause in the system.
How does Linux use system-call filtering?
A code can be added to the kernel to perform an inspection at the system-call gate, restricting a caller to a subset of system calls deemed safe or required for that caller's function. Specific system-call profiles can be constructed for individual processes. The Linux mechanism SECCOMP-BPF uses the Berkeley Packet Filter language to load a custom profile through Linux's proprietary prctl system call. This filtering can be effectively enforced if called from within a run-time library when it initializes or from within the loader itself before it transfers control to the program's entry point.
Rings of protection separate functions into domains and order them hierarchically.
The ability to copy an access right from one domain to another may be realized as follows
What protection mechanism is used to ensure that operating-system distributions and patches have not be changed?
Which of the following is an advantage of compiler-based enforcement of access control?
A protection domain is a collection of access rights, each of which is ___________________
The default set of access rights are used if no entry in the access list is found.
Which of the following is true of the Java programming language in relation to protection?
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)