Question
a.
It is used to detect errors which can prevent contamination of system
b.
It is used used to accelerate a process
c.
It is used to optimize system downtime
d.
None of the mentioned
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What are various roles of protection ?
Similar Questions
Discover Related MCQs
Q. Which of the following objects require protection ?
View solution
Q. Which principle states that programs, users and even the systems be given just enough privileges to perform their task?
View solution
Q. _______ is an approach to restricting system access to authorized users.
View solution
Q. For system protection, a process should access
View solution
Q. The protection domain of a process contains
View solution
Q. If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is
View solution
Q. Access matrix model for user authentication contains
View solution
Q. Global table implementation of matrix table contains
View solution
Q. For a domain _______ is a list of objects together with the operation allowed on these objects.
View solution
Q. Which one of the following is capability based protection system?
View solution
Q. In UNIX, domain switch is accomplished via
View solution
Q. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called
View solution
Q. The code segment that misuses its environment is called a
View solution
Q. The internal code of any software that will set of a malicious function when specified conditions are met, is called
View solution
Q. The pattern that can be used to identify a virus is known as
View solution
Q. Which one of the following is a process that uses the spawn mechanism to revage the system performance?
View solution
Q. What is a trap door in a program?
View solution
Q. Which one of the following is not an attack, but a search for vulnerabilities to attack?
View solution
Q. File virus attaches itself to the
View solution
Q. Multipartite viruses attack on
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!