A tape holds _______ data than optical or magnetic disk cartridge.
1.lesser
2.more
3.much lesser
4.None of the mentioned
For a domain _______ is a list of objects together with the operation allowed on these objects.
1.capability list
2. access list
3.both capability and access list
4.None of the mentioned
When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called __________
1.denial-of-service attack
2.slow read attack
3.spoofed attack
4. starvation attack
A single parity bit can be used for _________
1. detection
2.multiple error corrections
3.few error corrections
4.All of the mentioned
A typical tape drive is ________ a typical disk drive.
1.more expensive than
2.cheaper than
3.of the same cost as
4.None of the mentioned
Access matrix model for user authentication contains ______
1.a list of objects
2.a list of domains
3.a function which returns an object’s type
4.All of the Mentioned
Floppy disks are examples of _______
1.primary storage
2. secondary storage
3. tertiary storage
4.None of the mentioned
For system protection, a process should access _______
1.all the resources
2.only those resources for which it has authorization
3.few resources but authorization is not required
4. All of the mentioned
Global table implementation of the matrix table contains _______
1.domain
2.object
3.right-set
4.All of the Mentioned
If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is _______
1.static
2.dynamic
3.neither static nor dynamic
4.None of the mentioned
In domain structure what is Access-right equal to?
1.Access-right = object-name, rights-set
2.Access-right = read-name, write-set
3. Access-right = read-name, execute-set
4.Access-right = object-name, execute-set
In UNIX, domain switch is accomplished via ________
1.file system
2.user
3.superuser
4.None of the mentioned
Optical disks ______ magnetism.
1.use
2.do not use
3.may use
4.None of the mentioned
RAID level 3 does not have _________ as in RAID level 1.
1.efficiency
2.enough storage space for data
3.storage overhead
4.time consumption overhead
RAID level ______ is also known as bit interleaved parity organisation.
1.0
2.1
3.2
4.3
RAID level ______ is also known as memory style error correcting code(ECC) organization.
1.1
2.2
3.3
4.4
RAID level _______ refers to disk mirroring.
1.0
2.1
3.2
4.3
RAID level ________ refers to disk arrays with striping at the level of blocks, but without any redundancy.
1.0
2.1
3.2
4.3
Random access to tape is _______ a disk seek.
1.much slower than
2.much faster than
3.comparable to
4.None of the mentioned
s use different physical objects like separate printers ii) cryptographic separation – in which process having different security requirement at different times iii) Logical separation – In which users operate under illusion that no other processes exist iv) cryptographic separation – In which processes conceal their data and computations
1. i
2.i and ii
3. ii and iii
4. iii and iv
Tertiary storage is built with _____
1. a lot of money
2.unremovable media
3. removable media
4.secondary storage
The code segment that misuses its environment is called a _______
1. internal thief
2.trojan horse
3. code stacker
4.None of the mentioned
The internal code of any software that will set of a malicious function when specified conditions are met, is called ________
1. logic bomb
2.trap door
3.code stacker
4.None of the mentioned
The magneto-optic head flies ___________ the disk surface than a magnetic disk head does.
1.much farther from
2.much closer to
3. at the same distance as
4.None of the mentioned
The mean time to failure of a mirrored disk depends on ____________ I) the mean time to failure of individual disks II) the mean time to repair
1.Only I
2.Only II
3.Both I and II
4. Neither I nor II
The pattern that can be used to identify a virus is known as ______
1.stealth
2.virus signature
3.armoured
4.multipartite
The phase change disk is coated with a material that can freeze into either _______ or ________ state.
1.crystalline, solid
2.ice, amorphous
3.crystalline, liquid
4.crystalline, amorphous
The protection domain of a process contains ______
1.object name
2.rights-set
3.both object name and rights-set
4.None of the mentioned
The surface area of tape is ________ the surface area of a disk.
1.much lesser than
2.much larger than
3.equal to
4.None of the mentioned
What are the three additional operations to change the contents of the access-matrix?
1.copy
2.Owner
3. control
4.All of the Mentioned
What are the three copyrights?
1. copy
2.transfer
3.limited copy
4.All of the Mentioned
What are the various roles of protection?
1.It is used to detect errors which can prevent contami
2.It is used used to accelerate a process
3.It is used used to accelerate a process
4.None of the mentioned
What does the access matrix represent?
1.Rows-Domains, Columns-Objects
2. Rows-Objects, Columns-Domains
3.Rows-Access List, Columns-Domains
4.Rows-Domains, Columns-Access list
What is a magneto-optic disk?
1.primary storage
2.secondary storage
3.removable disk
4.None of the mentioned
What is a trap door in a program?
1.a security hole, inserted at programming time in the system for later use
2.a type of antivirus
3.security hole in a network
4. none of the mentioned
What is ‘separation’ in security of Operating systems?
1.To have separate login for different users
2. To have separate Hard disk drive/partition for different users
3.It means keeping one user’s objects separate from other users
4. none of the mentioned
What is Domain?
1.Domain = Set of all objects
2.It is a collection of protection policies
3. Domain= set of access-rights
4.None of the mentioned
What is meaning of right-set?
1. It is a subset consist of read and write
2.It is a subset of all valid operations that can be performed on the object
3. It is a subset consist of read, write and execute
4. none of the mentioned
Which is an unsolvable problem in access-matrix?
1.Owner override
2.Brute force
3.Access denied
4.Confinement
Which of the following objects require protection?
1. CPU
2.Printers
3.Motherboard
4.All of the Mentioned
Which of the following objects require protection?
1.Memory
2. Monitor
3.Power supply unit
4.All of the Mentioned
Which of the following statements are correct? i) Physical separation – in which process use different physical objects like separate printers ii) Physical separation – in which process having different security requirement at different times iii) Logical separation – In which users operate under illusion that no other processes exist iv) Logical separation – In which processes conceal their data and computations
1.i
2.i and iii
3. ii and iii
4.iii and iv
Which of the following statements are correct? i) Physical separation – in which process use different physical objects like separate printers ii) Temporal separation – in which process having different security requirement at different times iii) Physical separation – In which users operate under illusion that no other processes exist iv) Temporal separation – In which processes conceal their data and computations
1. i
2.i and ii
3.ii and iii
4.iii and iv
Which one of the following is a process that uses the spawn mechanism to revage the system performance?
1.worm
2.trojan
3.threat
4.virus
Which one of the following is capability based protection system?
1. hydra
2.cambridge CAP system
3.both hydra and cambridge CAP system
4.None of the mentioned
Which principle states that programs, users and even the systems be given just enough privileges to perform their task?
1. principle of operating system
2.principle of least privilege
3.principle of process scheduling
4. none of the mentioned
Which two rights allow a process to change the entries in a column?
1.copy and transfer
2.copy and owner
3.owner and transfer
4.deny and copy
Who can add new rights and remove some rights?
1. copy
2.transfer
3.limited copy
4.owner
WORM stands for ______
1.write only, read mandatory
2.write once, read many times
3.write only once, read multiple
4.None of the mentioned
_____ is an approach to restricting system access to authorized users.
1.Role-based access control
2.Process-based access control
3. Job-based access control
4.None of the mentioned