MCQOPTIONS
 Saved Bookmarks
				This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Protection Memory Protection knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    What is the principle of least privilege? | 
                            
| A. | Less privileges provide difficulty in executing admin tasks | 
| B. | Users can get temporary high privilege access | 
| C. | Users should be given just enough privileges to perform their tasks | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 2. | 
                                    What is the main objective of protection? | 
                            
| A. | Ensure all objects are protected individually | 
| B. | Objects have different priority and thus different levels of protection | 
| C. | Ensure that each object is accessed correctly and only by allowed processes | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 3. | 
                                    What is the correct way the segmentation program address is stored? | 
                            
| A. | name, offset | 
| B. | start, stop | 
| C. | access, rights | 
| D. | offset, rights | 
| Answer» B. start, stop | |
| 4. | 
                                    What is a major feature of segmentation? | 
                            
| A. | Program is divided in data memory and program memory | 
| B. | Program is executed in segments | 
| C. | Program is divided into pieces having different access rights | 
| D. | It has effect of an unbounded architecture | 
| Answer» D. It has effect of an unbounded architecture | |
| 5. | 
                                    What is true regarding tagged architecture? | 
                            
| A. | Every word of machine memory has one or more extra bits | 
| B. | Extra bits are used to do padding | 
| C. | Extra bits are not used to identify rights to that word | 
| D. | It is very compatible to code upgrades | 
| Answer» B. Extra bits are used to do padding | |
| 6. | 
                                    How is disadvantage of all-or-nothing approach overcome? | 
                            
| A. | Base/Bound | 
| B. | Relocation technique | 
| C. | Fence method | 
| D. | Tagged architecture | 
| Answer» E. | |
| 7. | 
                                    What is all-or-nothing situation for sharing in memory? | 
                            
| A. | Program makes all its data available to be accessed | 
| B. | It prohibits access to some | 
| C. | It creates rules who can access program memory | 
| D. | It separates program memory and data memory | 
| Answer» B. It prohibits access to some | |
| 8. | 
                                    What is the role of base/bound registers? | 
                            
| A. | They give starting address to a program | 
| B. | Program s addresses are neatly confined to space between the base and the bound registers | 
| C. | They provide encrypted environment | 
| D. | This technique doesn t protects a program s address from modification by another user | 
| Answer» C. They provide encrypted environment | |
| 9. | 
                                    What is the basic need in protecting memory in multi-user environment? | 
                            
| A. | We need two registers one start and other end | 
| B. | We need a variable register | 
| C. | A fence register has to be used known as base register. | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 10. | 
                                    How can fence and relocation be used together? | 
                            
| A. | To each program address, the contents of fence register are added | 
| B. | To contents of fence register is subtracted from actual address of program | 
| C. | To each program address, the contents of fence register are not added | 
| D. | None of the mentioned | 
| Answer» B. To contents of fence register is subtracted from actual address of program | |
| 11. | 
                                    What is correct regarding relocation w.r.t protecting memory? | 
                            
| A. | It is a process of taking a program as if it began at address 0 | 
| B. | It is a process of taking a program as if it began at address 0A | 
| C. | Fence cannot be used within relocation process | 
| D. | All of the mentioned | 
| Answer» B. It is a process of taking a program as if it began at address 0A | |
| 12. | 
                                    What is not true regarding Fence ? | 
                            
| A. | It is implemented via hardware register | 
| B. | It doesn t protect users from each other | 
| C. | It good to protect OS from abusive users | 
| D. | Its implementation is unrestricted and can take any amount of space in Operating system. | 
| Answer» E. | |
| 13. | 
                                    What is true regarding Fence ? | 
                            
| A. | Its a method to confine users to one side of a boundary | 
| B. | It can protect Operating system from one user | 
| C. | It cannot protect users from each other | 
| D. | All of the mentioned | 
| Answer» E. | |