adplus-dvertising

Welcome to the Protection and Security MCQs Page

Dive deep into the fascinating world of Protection and Security with our comprehensive set of Multiple-Choice Questions (MCQs). This page is dedicated to exploring the fundamental concepts and intricacies of Protection and Security, a crucial aspect of Operating System. In this section, you will encounter a diverse range of MCQs that cover various aspects of Protection and Security, from the basic principles to advanced topics. Each question is thoughtfully crafted to challenge your knowledge and deepen your understanding of this critical subcategory within Operating System.

frame-decoration

Check out the MCQs below to embark on an enriching journey through Protection and Security. Test your knowledge, expand your horizons, and solidify your grasp on this vital area of Operating System.

Note: Each MCQ comes with multiple answer choices. Select the most appropriate option and test your understanding of Protection and Security. You can click on an option to test your knowledge before viewing the solution for a MCQ. Happy learning!

Protection and Security MCQs | Page 9 of 14

Explore more Topics under Operating System

Q81.
Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical sepration – In which processes conceal their data and computations
Discuss
Answer: (b).i and iii
Q82.
Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal sepration – In which processes conceal their data and computations
Discuss
Answer: (b).i and ii
Q83.
Which of the following statements are correct?
i) logical separation – in which process use different physical objects like separate printers
ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) cryptographic sepration – In which processes conceal their data and computations
Discuss
Answer: (d).iii and iv
Discuss
Answer: (a).It is used to detect errors which can prevent contamination of system
Q85.
Which of the following objects require protection ?
Discuss
Answer: (a).Memory
Q86.
Which principle states that programs, users and even the systems be given just enough privileges to perform their task?
Discuss
Answer: (b).principle of least privilege
Q87.
_______ is an approach to restricting system access to authorized users.
Discuss
Answer: (a).Role-based access control
Discuss
Answer: (b).only those resources for which it has authorization
Q89.
The protection domain of a process contains
Discuss
Answer: (c).both object name and rights-set
Q90.
If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is
Discuss
Answer: (a).static

Suggested Topics

Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.

Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!