System Administrator 2026
What is the basic need in protecting memory in multi-user environment?
  • A. We need two registers one €?start’ and other €?end’
  • B. We need a variable register
  • C. A fence register has to be used known as base register.
  • D. None of the mentioned
What is the role of base/bound registers?
  • A. They give starting address to a program
  • B. Program’s addresses are neatly confined to space between the base and the bound registers
  • C. They provide encrypted environment
  • D. This technique doesn’t protects a program’s address from modification by another user
What is all-or-nothing situation for sharing in memory?
  • A. Program makes all its data available to be accessed
  • B. It prohibits access to some
  • C. It creates rules who can access program memory
  • D. It separates program memory and data memory
How is disadvantage of all-or-nothing approach overcome?
  • A. Base/bound
  • B. Relocation technique
  • C. Fence method
  • D. Tagged architecture
What is true regarding tagged architecture?
  • A. Every word of machine memory has one or more extra bits
  • B. Extra bits are used to do padding
  • C. Extra bits are not used to identify rights to that word
  • D. It is very compatible to code upgrades
What is best solution to have effect of unbounded number if base/bound registers?
  • A. Tagged architecture
  • B. Segmentation
  • C. Fence method
  • D. None of the mentioned
What is a major feature of segmentation?
  • A. Program is divided in data memory and program memory
  • B. Program is executed in segments
  • C. Program is divided into pieces having different access rights
  • D. It has effect of an unbounded architecture
What is the correct way the segmentation program address is stored?
  • A. Name, offset
  • B. Start, stop
  • C. Access, rights
  • D. Offset, rights
What is the main objective of protection?
  • A. Ensure all objects are protected individually
  • B. Objects have different priority and thus different levels of protection
  • C. Ensure that each object is accessed correctly and only by allowed processes
  • D. None of the mentioned
What is the principle of least privilege?
  • A. Less privileges provide difficulty in executing admin tasks
  • B. Users can get temporary high privilege access
  • C. Users should be given just enough privileges to perform their tasks
  • D. None of the mentioned