Filters
Question type

What is the difference between mechanisms and policies?


A) Mechanisms determine what will be done, while policies decide when it will be done
B) Mechanisms determine how something will be done, while policies decide what will be done
C) Mechanisms determine how something will be done, while policies decide why something will be done
D) Mechanisms determine what will be done, while policies decide how it will be done

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

How does Linux use system-call filtering?

Correct Answer

verifed

verified

A code can be added to the kernel to perform an inspection at the system-call gate, restricting a caller to a subset of system calls deemed safe or required for that caller's function. Specific system-call profiles can be constructed for individual processes. The Linux mechanism SECCOMP-BPF uses the Berkeley Packet Filter language to load a custom profile through Linux's proprietary prctl system call. This filtering can be effectively enforced if called from within a run-time library when it initializes or from within the loader itself before it transfers control to the program's entry point.

Rings of protection separate functions into domains and order them hierarchically.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is true of the Java programming language in relation to protection?


A) When a class is loaded, the JVM assigns the class to a protection domain that gives the permissions of that class.
B) It does not support the dynamic loading of untrusted classes over a network.
C) It does not support the execution of mutually distrusting classes within the same JVM.
D) Methods in the calling sequence are not responsible for requests to access a protected resource.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A protection domain is a collection of access rights, each of which is ___________________


A) a pair <object-name, list-of-users>
B) a pair <object-name, rights-set>
C) a triplet <object-name, user, rights-set>
D) a triplet <object-name, process_id, rights-set>

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

________________ is not a protection mechanism.


A) System Integrity Protection
B) Intrusion Prevention
C) System-Call Filtering
D) Sandboxing

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Describe domain switching.

Correct Answer

verifed

verified

The association between proces...

View Answer

root user can modify mandatory access control (MAC)

A) True
B) False

Correct Answer

verifed

verified

The default set of access rights are used if no entry in the access list is found.

A) True
B) False

Correct Answer

verifed

verified

Describe the idea of the sandboxing.

Correct Answer

verifed

verified

Sandboxing involves running processes in...

View Answer

Explain a confinement problem.

Correct Answer

verifed

verified

The confinement problem is a problem of ...

View Answer

What protection mechanism is used to ensure that operating-system distributions and patches have not be changed?

Correct Answer

verifed

verified

It is code signing, which is the digital...

View Answer

The ability to copy an access right from one domain to another may be realized as follows


A) A right R is copied from domain A to domain B and R is removed from domain A. The right R could be copied from domain B to another domain.
B) A right R is copied from domain A to domain B, but the right R could not be copied from domain A to another domain.
C) A right R is copied from domain A to domain B, but the right R could not be copied from domain B to another domain.
D) none of the above

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Describe the idea of SIP (System Integrity Protection).

Correct Answer

verifed

verified

SIP restricts access to system files and...

View Answer

A capability list for a domain is ____________________


A) a list of operations together with the list of processes allowed to run the operations on those objects.
B) a list of objects together with the list of processes allowed to access those objects.
C) a list of objects together with the operations allowed on those objects.
D) a list of triplet <object, process, rights>.

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

C

Explain the need-to-known principle.

Correct Answer

verifed

verified

The need-to-know principle means that at any time, a process should be able to access only those objects that it currently requires to complete its task. This rule is useful in limiting the amount of damage a faulty process or an attacker can cause in the system.

What does compartmentalization mean?

Correct Answer

verifed

verified

Compartmentalization is the pr...

View Answer

Object means __________


A) hardware object or software object
B) process or threat
C) software object only
D) process only

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following is an advantage of compiler-based enforcement of access control?


A) Protection schemes are programmed as opposed to simply declared.
B) Protection requirements are dependent of the facilities provided by a particular operating system.
C) The means for enforcement needs to be provided by the designer of the subsystem.
D) Access privileges are closely related to the linguistic concept of a data type.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What capability is not used by Linux?


A) permitted
B) mapped
C) effective
D) inherited

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 32

Related Exams

Show Answer