System Administrator 2026
_______ is an approach to restricting system access to authorized users.
  • A. Role-based access control
  • B. Process-based access control
  • C. Job-based access control
  • D. None of the mentioned
For system protection, a process should access _____________
  • A. All the resources
  • B. Only those resources for which it has authorization
  • C. Few resources but authorization is not required
  • D. All of the mentioned
The protection domain of a process contains _____________
  • A. Object name
  • B. Rights-set
  • C. Both object name and rights-set
  • D. None of the mentioned
Access matrix model for user authentication contains _____________
  • A. A list of objects
  • B. A list of domains
  • C. A function which returns an object’s type
  • D. All of the mentioned
Global table implementation of the matrix table contains _____________
  • A. Domain
  • B. Object
  • C. Right-set
  • D. All of the mentioned
For a domain _______ is a list of objects together with the operation allowed on these objects.
  • A. Capability list
  • B. Access list
  • C. Both capability and access list
  • D. None of the mentioned
Which one of the following is capability based protection system?
  • A. Hydra
  • B. Cambridge cap system
  • C. Both hydra and cambridge cap system
  • D. None of the mentioned
In UNIX, domain switch is accomplished via _____________
  • A. File system
  • B. User
  • C. Superuser
  • D. None of the mentioned
In domain structure what is Access-right equal to?
  • A. Access-right = object-name, rights-set
  • B. Access-right = read-name, write-set
  • C. Access-right = read-name, execute-set
  • D. Access-right = object-name, execute-set
What is meaning of right-set?
  • A. It is a subset consist of read and write
  • B. It is a subset of all valid operations that can be performed on the object
  • C. It is a subset consist of read, write and execute
  • D. None of the mentioned