1. |
Which principle states that programs, users and even the systems be given just enough privileges to perform their task?
|
||||||||
Answer:
Option (b) |
2. |
_______ is an approach to restricting system access to authorized users.
|
||||||||
Answer:
Option (a) |
3. |
For system protection, a process should access _____________
|
||||||||
Answer:
Option (c) |
4. |
The protection domain of a process contains _____________
|
||||||||
Answer:
Option (c) |
5. |
If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is _____________
|
||||||||
Answer:
Option (a) |
6. |
Access matrix model for user authentication contains _____________
|
||||||||
Answer:
Option (d) |
7. |
In domain structure what is Access-right equal to?
|
||||||||
Answer:
Option (b) |
8. |
What does the access matrix represent?
|
||||||||
Answer:
Option (a) |
9. |
Who can add new rights and remove some rights?
|
||||||||
Answer:
Option (d) |
10. |
Which of the following objects require protection?
|
||||||||
Answer:
Option (a) |