Exam 17: Protection
Exam 1: Introduction57 Questions
Exam 2: Operating-System Structures42 Questions
Exam 3: Processes55 Questions
Exam 4: Threads Concurrency59 Questions
Exam 5: Cpu Scheduling57 Questions
Exam 6: Synchronization Tools61 Questions
Exam 7: Synchronization Examples57 Questions
Exam 8: Deadlocks40 Questions
Exam 9: Main Memory58 Questions
Exam 10: Virtual Memory54 Questions
Exam 11: Mass-Storage Structure46 Questions
Exam 12: Io Systems30 Questions
Exam 13: File-System Interface50 Questions
Exam 14: File-System Implementation36 Questions
Exam 15: File-System Internals25 Questions
Exam 16: Security32 Questions
Exam 17: Protection32 Questions
Select questions type
What are the main drawbacks of the implementation of the access matrix as a global table?
(Essay)
4.8/5
(45)
UNIX operating system associates a protection domain with the ____.
(Multiple Choice)
4.9/5
(35)
Apple's systems employs capability-based protection in the form of entitlements.
(True/False)
4.7/5
(25)
Role-based access control (RBAC) increases the security risk associated with superusers.
(True/False)
4.9/5
(30)
The kernel should not run with a higher level of privileges than user processes.
(True/False)
4.9/5
(34)
In a dynamic protection system, sometimes access rights to objects shared by different users need to be revoked.
(True/False)
4.7/5
(33)
Android cannot provide the same level of protection as UNIX, because it is not able to separate users.
(True/False)
4.8/5
(33)
Showing 21 - 32 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)