1.
Operating system functions can be categorized as :
Correct Answer(s)
A. Access control
B. Identity & credential management
C. Information flow
D. Audit & integrity protection
Explanation
The operating system functions can be categorized into four main categories: access control, identity and credential management, information flow, and audit and integrity protection. Access control refers to the mechanisms that determine what resources a user or process can access. Identity and credential management involves managing user identities and their associated credentials, such as passwords or digital certificates. Information flow ensures that data is properly transmitted and protected within the system. Audit and integrity protection involve monitoring and recording system activities to detect and prevent unauthorized changes or breaches.
2.
As the operating system becomes more complex, the security considerations increases.
Correct Answer
A. True
Explanation
As the operating system becomes more complex, it requires more features and functionalities to support various applications and hardware. This complexity also introduces more potential vulnerabilities and attack vectors, increasing the security considerations. With more complex code, there is a higher likelihood of bugs, loopholes, and weaknesses that can be exploited by attackers. Therefore, it is true that the security considerations increase as the operating system becomes more complex.
3.
In ____________ separation, the processes having different security requirements are executed at different times.
Correct Answer
B. Temporal
Explanation
Temporal separation refers to the practice of executing processes with different security requirements at different times. This ensures that processes with higher security requirements are executed separately from processes with lower security requirements, reducing the risk of unauthorized access or compromise. By scheduling these processes at different times, the potential for security breaches or conflicts is minimized, enhancing overall system security.
4.
________ is a method to confine users to one side of a boundary of memory.
Correct Answer
A. Fence
Explanation
A fence is a method used to confine users to one side of a boundary of memory. It acts as a barrier or boundary that prevents users from accessing memory outside of a specific range. This can be useful in ensuring the security and integrity of memory by preventing unauthorized access or modification. By implementing a fence, the system can control and restrict user access to specific memory regions, improving overall system stability and security.
5.
In _________ memory management, a program is divided into separate pieces where each piece has a logical unity exhibiting a relation among all of its codes or data values.
Correct Answer
D. Segmented
Explanation
Segmented memory management is a technique where a program is divided into separate pieces called segments. Each segment represents a logical unit that contains related codes or data values. This division allows for efficient memory allocation and management, as each segment can be independently loaded into memory and accessed. The use of segmented memory management helps to organize and optimize the memory usage in a program, improving overall performance and flexibility.
6.
ACL stands for
Correct Answer
C. Access Control List
Explanation
ACL stands for Access Control List. An Access Control List is a set of permissions that determines what actions a user or group can perform on a resource. It is used to control access to files, folders, networks, or other system resources. By defining specific rules and restrictions, ACL helps in enforcing security policies and ensuring that only authorized users can access certain resources.
7.
_______ is an unforgeable token that gives the possessor certain right to an object.
Correct Answer
C. Capability
Explanation
A capability is an unforgeable token that gives the possessor certain rights to an object. It is a security mechanism used in access control systems to ensure that only authorized entities can access and manipulate objects. Capabilities are typically associated with specific permissions or privileges, allowing the possessor to perform certain actions on the object. Unlike access control lists or matrices, which rely on predefined rules and permissions, capabilities provide a more flexible and dynamic approach to access control by granting specific rights to individual entities.
8.
The quality to confirm a user identity using something the user is called as __________
Correct Answer
biometrics
Explanation
Biometrics refers to the quality or method of confirming a user's identity by using something that is unique to them, such as their fingerprints, facial features, or iris patterns. This technology relies on the fact that these biological characteristics are difficult to replicate, making it a reliable and secure way to authenticate a user's identity.
9.
Exhaustive attack on passwords is also called as ____________
Correct Answer
brute force attack
Explanation
An exhaustive attack on passwords, also known as a brute force attack, is a method where an attacker systematically tries all possible combinations of characters until the correct password is found. This approach is time-consuming and requires significant computational power, but it can be effective in cracking passwords that are weak or easily guessable.
10.
The system that provides an argument to the function and the user computes and returns the function values are called as ____________
Correct Answer
challenge response systems
Explanation
The term "challenge response systems" refers to a system where an argument is provided to a function and the user computes and returns the function values. This type of system involves a challenge or request for information, and the user responds with the appropriate response or computation. It is a method commonly used in authentication or verification processes, where the user must provide a correct response to a challenge in order to gain access or prove their identity.