System Administrator 2026
What is the need of protection?
  • A. Prevent mischievous violation
  • B. Prevent and intentional
  • C. Ensure that each program component uses resources allotted to it only
  • D. All of the mentioned
What are the incorrect methods of revocation of access rights?
  • A. Immediate/delayed
  • B. Selective/general
  • C. Partial/total
  • D. Crucial
Why is it difficult to revoke capabilities?
  • A. They are too many
  • B. They are not defined precicely
  • C. They are distributed throughout the system
  • D. None of the mentioned
What is the reacquisition scheme to revoke capability?
  • A. When a process capability is revoked then it won’t be able to reacquire it
  • B. Pointers are maintained for each object which can be used to revoke
  • C. Indirect pointing is done to revoke object’s capabilities
  • D. Master key can be used compare and revoke.
What is true about Indirection to revoke capability?
  • A. Capabilities point indirectly to the objects
  • B. Each capability will not have a unique entry in global
  • C. Table entries cannot be reused for other capabilities
  • D. This system was adopted in multics system
How can Keys be defined or replaced?
  • A. Create [keyname] [bits]
  • B. Set-key
  • C. Key
  • D. Make [key name]
What are the characteristics of the Hydra system?
  • A. It consists of known access rights and interpreted by the system
  • B. A user can of protection system can declare other rights
  • C. Hydra system is not flexible
  • D. Hydra doesn’t provide rights amplification
What are the characteristics of rights amplification in Hydra?
  • A. This scheme allows a procedure to be certified as trustworthy
  • B. Amplification of rights cannot be stated explicitly in declaration
  • C. It includes kernel rights such as read
  • D. All of the mentioned
What is the problem of mutually suspicious subsystem?
  • A. Service program can steal users data
  • B. Service program can malfunction and retain some rights of data provided by user
  • C. Calling program can get access to restricted portion from service program
  • D. Calling program gets unrestricted access
What are the characteristics of Cambridge CAP system as compared to Hydra system?
  • A. It is simpler and less powerful than hydra system
  • B. It is more powerful than hydra system
  • C. It is powerful than hydra system
  • D. It is not as secure as hydra system