A) Mechanisms determine what will be done, while policies decide when it will be done
B) Mechanisms determine how something will be done, while policies decide what will be done
C) Mechanisms determine how something will be done, while policies decide why something will be done
D) Mechanisms determine what will be done, while policies decide how it will be done
Correct Answer
verified
Essay
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) When a class is loaded, the JVM assigns the class to a protection domain that gives the permissions of that class.
B) It does not support the dynamic loading of untrusted classes over a network.
C) It does not support the execution of mutually distrusting classes within the same JVM.
D) Methods in the calling sequence are not responsible for requests to access a protected resource.
Correct Answer
verified
Multiple Choice
A) a pair <object-name, list-of-users>
B) a pair <object-name, rights-set>
C) a triplet <object-name, user, rights-set>
D) a triplet <object-name, process_id, rights-set>
Correct Answer
verified
Multiple Choice
A) System Integrity Protection
B) Intrusion Prevention
C) System-Call Filtering
D) Sandboxing
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) A right R is copied from domain A to domain B and R is removed from domain A. The right R could be copied from domain B to another domain.
B) A right R is copied from domain A to domain B, but the right R could not be copied from domain A to another domain.
C) A right R is copied from domain A to domain B, but the right R could not be copied from domain B to another domain.
D) none of the above
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) a list of operations together with the list of processes allowed to run the operations on those objects.
B) a list of objects together with the list of processes allowed to access those objects.
C) a list of objects together with the operations allowed on those objects.
D) a list of triplet <object, process, rights>.
Correct Answer
verified
Essay
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) hardware object or software object
B) process or threat
C) software object only
D) process only
Correct Answer
verified
Multiple Choice
A) Protection schemes are programmed as opposed to simply declared.
B) Protection requirements are dependent of the facilities provided by a particular operating system.
C) The means for enforcement needs to be provided by the designer of the subsystem.
D) Access privileges are closely related to the linguistic concept of a data type.
Correct Answer
verified
Multiple Choice
A) permitted
B) mapped
C) effective
D) inherited
Correct Answer
verified
Showing 1 - 20 of 32
Related Exams