Protection on Operating System related Questions and Answers - Page 5

Question 41 : Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical separation – In which processes conceal their data and computations
1. i
2. i and iii
3. ii and iii
4. iii and iv
View Answer   Discuss with Members

Question 42 : Which of the following objects require protection ?
1. CPU
2. Printers
3. Motherboard
4. All of the mentioned
View Answer   Discuss with Members

Question 43 : Which is an unsolvable problem in access-matrix ?
1. Owner override
2. Brute force
3. Access denied
4. Confinement
View Answer   Discuss with Members

Question 44 : Which two rights allow a process to change the entries in a column ?
1. copy and transfer
2. copy and owner
3. owner and transfer
4. deny and copy
View Answer   Discuss with Members

Question 46 : Who can add new rights and remove some rights ?
1. copy
2. transfer
3. limited copy
4. owner
View Answer   Discuss with Members

Question 47 : What are the three additional operations to change the contents of the access-matrix ?
1. copy
2. Owner
3. control
4. all of the mentioned
View Answer   Discuss with Members


View 41 - 50 of 51 Questions

* Be the First to Post a Comment.

Submit comment :


Captcha Image
Reload

Ask Question

Captcha Image
Reload

Note : Name and Email never shown.





Subscribe


Become a part of EducationForever. Subscribe to our FREE Newsletter