adplus-dvertising
frame-decoration

Question

What is ‘separation’ in security of Operating systems ?

a.

To have separate login for different users

b.

To have separate Hard disk drive/partition for different users

c.

It means keeping one user’s objects separate from other users

d.

None of the mentioned

Posted under Operating System

Answer: (c).It means keeping one user’s objects separate from other users

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What is ‘separation’ in security of Operating systems ?

Similar Questions

Discover Related MCQs

Q. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical sepration – In which processes conceal their data and computations

Q. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal sepration – In which processes conceal their data and computations

Q. Which of the following statements are correct?
i) logical separation – in which process use different physical objects like separate printers
ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) cryptographic sepration – In which processes conceal their data and computations

Q. What are various roles of protection ?

Q. Which of the following objects require protection ?

Q. Which principle states that programs, users and even the systems be given just enough privileges to perform their task?

Q. _______ is an approach to restricting system access to authorized users.

Q. For system protection, a process should access

Q. The protection domain of a process contains

Q. If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is

Q. Access matrix model for user authentication contains

Q. Global table implementation of matrix table contains

Q. For a domain _______ is a list of objects together with the operation allowed on these objects.

Q. Which one of the following is capability based protection system?

Q. In UNIX, domain switch is accomplished via

Q. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called

Q. The code segment that misuses its environment is called a

Q. The internal code of any software that will set of a malicious function when specified conditions are met, is called

Q. The pattern that can be used to identify a virus is known as

Q. Which one of the following is a process that uses the spawn mechanism to revage the system performance?