Question
a.
A list of users who are allowed to manipulate a particular object in the Windows NT system.
b.
A list of files that are encrypted by the Windows NT File System (NTFS).
c.
A list of CPU-intensive applications that are supported by the Windows NT kernel.
d.
A list of 16-bit relics that are removed from the Windows NT architecture.
Posted under Reverse Engineering
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What is an Access Control List (ACL)?
Similar Questions
Discover Related MCQs
Q. What is the purpose of running old applications in a special isolated virtual machine in Windows NT?
View solution
Q. What processor architectures was the original Windows NT released for?
View solution
Q. Which 32-bit platform is currently supported by recent versions of Windows NT?
View solution
Q. Which 64-bit architectures are supported by recent versions of Windows NT?
View solution
Q. How does Windows NT memory manager handle virtual memory?
View solution
Q. What is the purpose of the Hardware Abstraction Layer (HAL) in Windows NT?
View solution
Q. What is the purpose of the page table?
View solution
Q. What are pages in virtual memory?
View solution
Q. What is the default page size used in Windows on IA-32 processors?
View solution
Q. Do all processor architectures support the same page sizes?
View solution
Q. What is virtual memory in operating systems?
View solution
Q. What is a page table?
View solution
Q. What is the most important benefit of using a page table?
View solution
Q. What is the concept of multiple address spaces?
View solution
Q. What is kernel mode in operating systems?
View solution
Q. What is paging?
View solution
Q. Why is paging used in virtual memory systems?
View solution
Q. What is the benefit of paging for applications?
View solution
Q. How does the operating system know when to access the paging file?
View solution
Q. What can happen if an application actively uses more memory than is physically available?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Reverse Engineering? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!