Operating System Questions & Answers – Protection – Access Matrix

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Protection – Access Matrix”.

1. In domain structure what is Access-right equal to?
a) Access-right = object-name, rights-set
b) Access-right = read-name, write-set
c) Access-right = read-name, execute-set
d) Access-right = object-name, execute-set
View Answer

Answer: a
Explanation: None.

2. What is meaning of right-set?
a) It is a subset consist of read and write
b) It is a subset of all valid operations that can be performed on the object
c) It is a subset consist of read, write and execute
d) None of the mentioned
View Answer

Answer: b
Explanation: None.

3. What is Domain?
a) Domain = Set of all objects
b) It is a collection of protection policies
c) Domain= set of access-rights
d) None of the mentioned
View Answer

Answer: c
Explanation: None.
advertisement
advertisement

4. What does the access matrix represent?
a) Rows-Domains, Columns-Objects
b) Rows-Objects, Columns-Domains
c) Rows-Access List, Columns-Domains
d) Rows-Domains, Columns-Access list
View Answer

Answer: a
Explanation: None.

5. What are the three additional operations to change the contents of the access-matrix?
a) copy
b) Owner
c) control
d) all of the mentioned
View Answer

Answer: d
Explanation: None.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. Who can add new rights and remove some rights?
a) copy
b) transfer
c) limited copy
d) owner
View Answer

Answer: d
Explanation: None.

7. What are the three copyrights?
a) copy
b) transfer
c) limited copy
d) all of the mentioned
View Answer

Answer: d
Explanation: None.
advertisement

8. Which two rights allow a process to change the entries in a column?
a) copy and transfer
b) copy and owner
c) owner and transfer
d) deny and copy
View Answer

Answer: a
Explanation: None.

9. Which is an unsolvable problem in access-matrix?
a) Owner override
b) Brute force
c) Access denied
d) Confinement
View Answer

Answer: d
Explanation: None.
advertisement

10. Which of the following objects require protection?
a) CPU
b) Printers
c) Motherboard
d) All of the mentioned
View Answer

Answer: b
Explanation: None.

11. What is ‘separation’ in security of Operating systems?
a) To have separate login for different users
b) To have separate Hard disk drive/partition for different users
c) It means keeping one user’s objects separate from other users
d) None of the mentioned
View Answer

Answer: c
Explanation: None.

12. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical separation – In which processes conceal their data and computations
a) i
b) i and iii
c) ii and iii
d) iii and iv
View Answer

Answer: b
Explanation: None.
 

13. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal separation – In which processes conceal their data and computations
a) i
b) i and ii
c) ii and iii
d) iii and iv
View Answer

Answer: b
Explanation: None.
 
14. Which of the following statements are correct?
i) logical separation – in which process use different physical objects like separate printers
ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) cryptographic separation – In which processes conceal their data and computations
a) i
b) i and ii
c) ii and iii
d) iii and iv
View Answer
Answer: d
Explanation: None.

15. What are the various roles of protection?
a) It is used to detect errors which can prevent contamination of system
b) It is used used to accelerate a process
c) It is used to optimize system downtime
d) None of the mentioned
View Answer

Answer: a
Explanation: None.

16. Which of the following objects require protection?
a) Memory
b) Monitor
c) Power supply unit
d) All of the mentioned
View Answer

Answer: a
Explanation: None.

Sanfoundry Global Education & Learning Series – Operating System.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.