250+ TOP MCQs on Protection Concepts and Answers

Operating System Multiple Choice Questions on “Protection concepts”.

1. Which principle states that programs, users and even the systems be given just enough privileges to perform their task?
a) principle of operating system
b) principle of least privilege
c) principle of process scheduling
d) none of the mentioned

Answer: b

2. _______ is an approach to restricting system access to authorized users.
a) Role-based access control
b) Process-based access control
c) Job-based access control
d) None of the mentioned

Answer: a

3. For system protection, a process should access _____________
a) all the resources
b) only those resources for which it has authorization
c) few resources but authorization is not required
d) all of the mentioned

Answer: b

4. The protection domain of a process contains _____________
a) object name
b) rights-set
c) both object name and rights-set
d) none of the mentioned

Answer: c

5. If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is _____________
a) static
b) dynamic
c) neither static nor dynamic
d) none of the mentioned

Answer: a
Clarification: None.

6. Access matrix model for user authentication contains _____________
a) a list of objects
b) a list of domains
c) a function which returns an object’s type
d) all of the mentioned

Answer: d
Clarification: None.

7. Global table implementation of the matrix table contains _____________
a) domain
b) object
c) right-set
d) all of the mentioned

Answer: d
Clarification: None.

8. For a domain _______ is a list of objects together with the operation allowed on these objects.
a) capability list
b) access list
c) both capability and access list
d) none of the mentioned

Answer: a
Clarification: None.

9. Which one of the following is capability based protection system?
a) hydra
b) cambridge CAP system
c) both hydra and cambridge CAP system
d) none of the mentioned

Answer: c
Clarification: None.

10. In UNIX, domain switch is accomplished via _____________
a) file system
b) user
c) superuser
d) none of the mentioned

Answer: a

Leave a Reply

Your email address will not be published. Required fields are marked *