System Administrator 2026
What is the need of protection?
- A. Prevent mischievous violation
- B. Prevent and intentional
- C. Ensure that each program component uses resources allotted to it only
- D. All of the mentioned
What is the reacquisition scheme to revoke capability?
- A. When a process capability is revoked then it won’t be able to reacquire it
- B. Pointers are maintained for each object which can be used to revoke
- C. Indirect pointing is done to revoke object’s capabilities
- D. Master key can be used compare and revoke.
What is true about Indirection to revoke capability?
- A. Capabilities point indirectly to the objects
- B. Each capability will not have a unique entry in global
- C. Table entries cannot be reused for other capabilities
- D. This system was adopted in multics system
What are the characteristics of the Hydra system?
- A. It consists of known access rights and interpreted by the system
- B. A user can of protection system can declare other rights
- C. Hydra system is not flexible
- D. Hydra doesn’t provide rights amplification
What is the problem of mutually suspicious subsystem?
- A. Service program can steal users data
- B. Service program can malfunction and retain some rights of data provided by user
- C. Calling program can get access to restricted portion from service program
- D. Calling program gets unrestricted access