Exam 17: Protection

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

What are the main drawbacks of the implementation of the access matrix as a global table?

(Essay)
4.8/5
(45)

The owner right allows ___________

(Multiple Choice)
4.8/5
(31)

How does a lock-key mechanism work?

(Essay)
4.8/5
(31)

Describe how the access matrix is implemented in MULTISC.

(Essay)
4.9/5
(34)

What are the main reasons for implementing a protection subsystem?

(Essay)
4.9/5
(29)

Domains cannot share access rights

(True/False)
4.9/5
(30)

UNIX operating system associates a protection domain with the ____.

(Multiple Choice)
4.9/5
(35)

Apple's systems employs capability-based protection in the form of entitlements.

(True/False)
4.7/5
(25)

Role-based access control (RBAC) increases the security risk associated with superusers.

(True/False)
4.9/5
(30)

The kernel should not run with a higher level of privileges than user processes.

(True/False)
4.9/5
(34)

In a dynamic protection system, sometimes access rights to objects shared by different users need to be revoked.

(True/False)
4.7/5
(33)

Android cannot provide the same level of protection as UNIX, because it is not able to separate users.

(True/False)
4.8/5
(33)
Showing 21 - 32 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)