MCQOPTIONS
 Saved Bookmarks
				This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Protection Revocation of Access Rights knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    What are the characteristics of Cambridge CAP system as compared to Hydra system? | 
                            
| A. | It is simpler and less powerful than hydra system | 
| B. | It is more powerful than hydra system | 
| C. | It is powerful than hydra system | 
| D. | It is not as secure as Hydra system | 
| Answer» B. It is more powerful than hydra system | |
| 2. | 
                                    What is the problem of mutually suspicious subsystem? | 
                            
| A. | Service program can steal users data | 
| B. | Service program can malfunction and retain some rights of data provided by user | 
| C. | Calling program can get access to restricted portion from service program | 
| D. | Calling program gets unrestricted access | 
| Answer» C. Calling program can get access to restricted portion from service program | |
| 3. | 
                                    What are the characteristics of rights amplification in Hydra? | 
                            
| A. | This scheme allows a procedure to be certified as trustworthy | 
| B. | Amplification of rights cannot be stated explicitly in declaration | 
| C. | It includes kernel rights such as read | 
| D. | All of the mentioned | 
| Answer» B. Amplification of rights cannot be stated explicitly in declaration | |
| 4. | 
                                    What are the characteristics of the Hydra system? | 
                            
| A. | It consists of known access rights and interpreted by the system | 
| B. | A user can of protection system can declare other rights | 
| C. | Hydra system is not flexible | 
| D. | Hydra doesn t provide rights amplification | 
| Answer» B. A user can of protection system can declare other rights | |
| 5. | 
                                    How can Keys be defined or replaced? | 
                            
| A. | create [keyname] [bits] | 
| B. | set-key | 
| C. | Key | 
| D. | MAKE [Key Name] | 
| Answer» C. Key | |
| 6. | 
                                    What is true about Indirection to revoke capability? | 
                            
| A. | Capabilities point indirectly to the objects | 
| B. | Each capability will not have a unique entry in global | 
| C. | Table entries cannot be reused for other capabilities | 
| D. | This system was adopted in MULTICS system | 
| Answer» B. Each capability will not have a unique entry in global | |
| 7. | 
                                    What is false regarding Back-Pointers scheme to revoke capability? | 
                            
| A. | List of pointers is maintained with each object | 
| B. | When revocation is required these pointers are followed | 
| C. | This scheme is not adopted in MULTICS system | 
| D. | These point to all capabilities associated with that object | 
| Answer» D. These point to all capabilities associated with that object | |
| 8. | 
                                    What is the reacquisition scheme to revoke capability? | 
                            
| A. | When a process capability is revoked then it won t be able to reacquire it | 
| B. | Pointers are maintained for each object which can be used to revoke | 
| C. | Indirect pointing is done to revoke object s capabilities | 
| D. | Master key can be used compare and revoke. | 
| Answer» B. Pointers are maintained for each object which can be used to revoke | |
| 9. | 
                                    Why is it difficult to revoke capabilities? | 
                            
| A. | They are too many | 
| B. | They are not defined precicely | 
| C. | They are distributed throughout the system | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 10. | 
                                    What are the incorrect methods of revocation of access rights? | 
                            
| A. | Immediate/Delayed | 
| B. | Selective/General | 
| C. | Partial/total | 
| D. | Crucial | 
| Answer» E. | |