Skip to content
MCQtimes.com
GK
Pakistan Studies
Current Affairs
Islamic Studies
English
MCQtimes.com
Toggle Menu
OS Protection
Home
/
Computer Science
/
Operating System
/
OS Protection
Show/Hide Answers
OS Protection
Global table implementation of the matrix table contains _____________
domain
object
right-set
all of the mentioned
Author:
rikazzz
Comment
OS Protection
How is disadvantage of all-or-nothing approach overcome?
Base/Bound
Relocation technique
Fence method
Tagged architecture
Author:
rikazzz
Comment
OS Protection
What is true regarding ‘Fence’?
Its a method to confine users to one side of a boundary
It can protect Operating system from one user
It cannot protect users from each other
All of the mentioned
Author:
rikazzz
Comment
OS Protection
What is Domain?
Domain = Set of all objects
It is a collection of protection policies
Domain= set of access-rights
None of the mentioned
Author:
rikazzz
Comment
OS Protection
Which one of the following is capability based protection system?
hydra
cambridge CAP system
both hydra and cambridge CAP system
none of the mentioned
Author:
rikazzz
Comment
OS Protection
Multipartite viruses attack on _____________
files
boot sector
memory
all of the mentioned
Author:
rikazzz
Comment
OS Protection
How can Keys be defined or replaced?
create [keyname] [bits]
set-key
Key
MAKE [Key Name]
Author:
rikazzz
Comment
OS Protection
What are the characteristics of the Hydra system?
It consists of known access rights and interpreted by the system
A user can of protection system can declare other rights
Hydra system is not flexible
Hydra doesn’t provide rights amplification
Author:
rikazzz
Comment
OS Protection
What is meaning of right-set?
It is a subset consist of read and write
It is a subset of all valid operations that can be performed on the object
It is a subset consist of read, write and execute
None of the mentioned
Author:
rikazzz
Comment
OS Protection
What is a trap door in a program?
a security hole, inserted at programming time in the system for later use
a type of antivirus
security hole in a network
none of the mentioned
Author:
rikazzz
Comment
Page navigation
1
2
3
…
6
Next Page
Next
Go to Page
Light
Dark
GK
Pakistan Studies
Current Affairs
Islamic Studies
English