Filters
Question type

What are the main drawbacks of the implementation of the access matrix as a global table?

Correct Answer

verifed

verified

The table is usually large and thus cann...

View Answer

Android cannot provide the same level of protection as UNIX, because it is not able to separate users.

A) True
B) False

Correct Answer

verifed

verified

In a dynamic protection system, sometimes access rights to objects shared by different users need to be revoked.

A) True
B) False

Correct Answer

verifed

verified

How does a lock-key mechanism work?

Correct Answer

verifed

verified

Each object has a list of unique bit pat...

View Answer

Apple's systems employs capability-based protection in the form of entitlements.

A) True
B) False

Correct Answer

verifed

verified

UNIX operating system associates a protection domain with the ____.


A) task
B) tread
C) process
D) user

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Role-based access control (RBAC) increases the security risk associated with superusers.

A) True
B) False

Correct Answer

verifed

verified

The kernel should not run with a higher level of privileges than user processes.

A) True
B) False

Correct Answer

verifed

verified

The owner right allows ___________


A) addition of new rights only
B) addition of new rights and removal of some rights
C) removal of some rights only
D) none of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Describe how the access matrix is implemented in MULTISC.

Correct Answer

verifed

verified

MULTISC uses a combination of access lis...

View Answer

Domains cannot share access rights

A) True
B) False

Correct Answer

verifed

verified

What are the main reasons for implementing a protection subsystem?

Correct Answer

verifed

verified

The most obvious is the need to prevent ...

View Answer

Showing 21 - 32 of 32

Related Exams

Show Answer