Operating System Multiple Choice Questions on “Protection – Access Matrix”.
1. In domain structure what is Access-right equal to?
a) Access-right = object-name, rights-set
b) Access-right = read-name, write-set
c) Access-right = read-name, execute-set
d) Access-right = object-name, execute-set
Answer: a
2. What is meaning of right-set?
a) It is a subset consist of read and write
b) It is a subset of all valid operations that can be performed on the object
c) It is a subset consist of read, write and execute
d) None of the mentioned
Answer: b
3. What is Domain?
a) Domain = Set of all objects
b) It is a collection of protection policies
c) Domain= set of access-rights
d) None of the mentioned
Answer: c
4. What does the access matrix represent?
a) Rows-Domains, Columns-Objects
b) Rows-Objects, Columns-Domains
c) Rows-Access List, Columns-Domains
d) Rows-Domains, Columns-Access list
Answer: a
Clarification: None.
5. What are the three additional operations to change the contents of the access-matrix?
a) copy
b) Owner
c) control
d) all of the mentioned
Answer: d
Clarification: None.
6. Who can add new rights and remove some rights?
a) copy
b) transfer
c) limited copy
d) owner
Answer: d
Clarification: None.
7. What are the three copyrights?
a) copy
b) transfer
c) limited copy
d) all of the mentioned
Answer: d
Clarification: None.
8. Which two rights allow a process to change the entries in a column?
a) copy and transfer
b) copy and owner
c) owner and transfer
d) deny and copy
Answer: a
Clarification: None.
9. Which is an unsolvable problem in access-matrix?
a) Owner override
b) Brute force
c) Access denied
d) Confinement
Answer: d
Clarification: None.
10. Which of the following objects require protection?
a) CPU
b) Printers
c) Motherboard
d) All of the mentioned
Answer: b
Clarification: None.
11. What is ‘separation’ in security of Operating systems?
a) To have separate login for different users
b) To have separate Hard disk drive/partition for different users
c) It means keeping one user’s objects separate from other users
d) None of the mentioned
Answer: c
Clarification: None.
12. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical separation – In which processes conceal their data and computations
a) i
b) i and iii
c) ii and iii
d) iii and iv
Answer: b
Clarification: None.
13. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal separation – In which processes conceal their data and computations
a) i
b) i and ii
c) ii and iii
d) iii and iv
Answer: b
Clarification: None.
14. Which of the following statements are correct?
i) logical separation – in which process use different physical objects like separate printers
ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) cryptographic separation – In which processes conceal their data and computations
a) i
b) i and ii
c) ii and iii
d) iii and iv
View Answer
Answer: d
Clarification: None.
15. What are the various roles of protection?
a) It is used to detect errors which can prevent contamination of system
b) It is used used to accelerate a process
c) It is used to optimize system downtime
d) None of the mentioned
Answer: a
Clarification: None.
16. Which of the following objects require protection?
a) Memory
b) Monitor
c) Power supply unit
d) All of the mentioned
Answer: a