Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

What are the two capabilities defined in CAP system?(a) data & software capability(b) address & data capability(c) hardware & software capability(d) software capabilityI had been asked this question by my college professor while I was bunking the class.My doubt stems from Protection in section Protection of Operating System

Answer» CORRECT option is (a) DATA & SOFTWARE capability

Easy EXPLANATION - None.
2.

What are the characteristics of Cambridge CAP system as compared to Hydra system?(a) It is simpler and less powerful than hydra system(b) It is more powerful than hydra system(c) It is powerful than hydra system(d) It is not as secure as Hydra systemThe question was posed to me during an internship interview.My query is from Protection in chapter Protection of Operating System

Answer»

Right CHOICE is (a) It is SIMPLER and LESS powerful than hydra system

Best explanation: NONE.

3.

What is the problem of mutually suspicious subsystem?(a) Service program can steal users data(b) Service program can malfunction and retain some rights of data provided by user(c) Calling program can get access to restricted portion from service program(d) Calling program gets unrestricted accessI had been asked this question in examination.Asked question is from Protection in chapter Protection of Operating System

Answer»

The correct choice is (b) Service program can malfunction and retain some RIGHTS of data provided by user

The explanation is: Both calling program and service program are vulnerable to ACCESS each OTHERS PRIVATE data/rights.

4.

How can Keys be defined or replaced?(a) create [keyname] [bits](b) set-key(c) Key(d) MAKE [Key Name]I have been asked this question during a job interview.This interesting question is from Protection in portion Protection of Operating System

Answer» CORRECT option is (B) set-key

To explain I WOULD SAY: None.
5.

What are the characteristics of the Hydra system?(a) It consists of known access rights and interpreted by the system(b) A user can of protection system can declare other rights(c) Hydra system is not flexible(d) Hydra doesn’t provide rights amplificationThe question was asked during a job interview.I'm obligated to ask this question of Protection in section Protection of Operating System

Answer»

Correct choice is (a) It consists of known access RIGHTS and INTERPRETED by the system

Best EXPLANATION: NONE.

6.

What is true about Indirection to revoke capability?(a) Capabilities point indirectly to the objects(b) Each capability will not have a unique entry in global(c) Table entries cannot be reused for other capabilities(d) This system was adopted in MULTICS systemThis question was posed to me during a job interview.Question is taken from Protection topic in section Protection of Operating System

Answer»

Right option is (a) Capabilities POINT INDIRECTLY to the objects

Easy EXPLANATION - NONE.

7.

What is false regarding Back-Pointers scheme to revoke capability?(a) List of pointers is maintained with each object(b) When revocation is required these pointers are followed(c) This scheme is not adopted in MULTICS system(d) These point to all capabilities associated with that objectI got this question in examination.This question is from Protection topic in portion Protection of Operating System

Answer»

The correct answer is (c) This SCHEME is not ADOPTED in MULTICS system

The EXPLANATION: None.

8.

What are the characteristics of rights amplification in Hydra?(a) This scheme allows a procedure to be certified as trustworthy(b) Amplification of rights cannot be stated explicitly in declaration(c) It includes kernel rights such as read(d) All of the mentionedThe question was asked in an online interview.I'd like to ask this question from Protection in portion Protection of Operating System

Answer»

The correct choice is (a) This SCHEME ALLOWS a PROCEDURE to be CERTIFIED as trustworthy

Easiest explanation - NONE.

9.

What is the reacquisition scheme to revoke capability?(a) When a process capability is revoked then it won’t be able to reacquire it(b) Pointers are maintained for each object which can be used to revoke(c) Indirect pointing is done to revoke object’s capabilities(d) Master key can be used compare and revoke.The question was posed to me by my college professor while I was bunking the class.My question is from Protection in section Protection of Operating System

Answer» CORRECT OPTION is (a) When a process CAPABILITY is revoked then it won’t be able to REACQUIRE it

The BEST explanation: None.
10.

Why is it difficult to revoke capabilities?(a) They are too many(b) They are not defined precicely(c) They are distributed throughout the system(d) None of the mentionedThe question was posed to me during an internship interview.I need to ask this question from Protection in portion Protection of Operating System

Answer»

Correct choice is (c) They are DISTRIBUTED THROUGHOUT the system

The best I can EXPLAIN: None.

11.

What are the incorrect methods of revocation of access rights?(a) Immediate/Delayed(b) Selective/General(c) Partial/total(d) CrucialThis question was posed to me during an online exam.My question is based upon Protection topic in section Protection of Operating System

Answer» RIGHT CHOICE is (d) Crucial

To EXPLAIN: NONE.
12.

What is the need of protection?(a) Prevent mischievous violation(b) Prevent and intentional(c) Ensure that each program component uses resources allotted to it only(d) All of the mentionedThis question was posed to me during an interview.This interesting question is from Protection topic in division Protection of Operating System

Answer» RIGHT CHOICE is (d) All of the mentioned

For EXPLANATION: NONE.
13.

What is the main objective of protection?(a) Ensure all objects are protected individually(b) Objects have different priority and thus different levels of protection(c) Ensure that each object is accessed correctly and only by allowed processes(d) None of the mentionedThe question was posed to me during an interview.My doubt stems from Protection in division Protection of Operating System

Answer» RIGHT answer is (C) Ensure that each OBJECT is accessed correctly and only by ALLOWED processes

The explanation: NONE.
14.

What is the principle of least privilege?(a) Less privileges provide difficulty in executing admin tasks(b) Users can get temporary high privilege access(c) Users should be given just enough privileges to perform their tasks(d) None of the mentionedThe question was asked during an interview.This interesting question is from Protection in portion Protection of Operating System

Answer» RIGHT option is (c) Users should be GIVEN just ENOUGH privileges to perform their tasks

The EXPLANATION is: NONE.
15.

What is the correct way the segmentation program address is stored?(a) name, offset(b) start, stop(c) access, rights(d) offset, rightsI have been asked this question by my school teacher while I was bunking the class.The query is from Protection in division Protection of Operating System

Answer»

Right option is (a) name, offset

To explain: OS can RETRIEVE the REAL address via looking for the table then making a SIMPLE calculation: address of the name + offset.

16.

What is a major feature of segmentation?(a) Program is divided in data memory and program memory(b) Program is executed in segments(c) Program is divided into pieces having different access rights(d) It has effect of an unbounded architectureI got this question in unit test.I would like to ask this question from Protection topic in portion Protection of Operating System

Answer»

Right OPTION is (C) Program is divided into pieces having DIFFERENT ACCESS rights

The BEST explanation: None.

17.

What is best solution to have effect of unbounded number if base/bound registers?(a) Tagged architecture(b) Segmentation(c) Fence method(d) None of the mentionedThis question was posed to me in an interview for internship.My enquiry is from Protection topic in portion Protection of Operating System

Answer» RIGHT OPTION is (B) Segmentation

To EXPLAIN: NONE.
18.

What is true regarding tagged architecture?(a) Every word of machine memory has one or more extra bits(b) Extra bits are used to do padding(c) Extra bits are not used to identify rights to that word(d) It is very compatible to code upgradesI had been asked this question by my college director while I was bunking the class.I'm obligated to ask this question of Protection topic in chapter Protection of Operating System

Answer»

Correct answer is (a) Every WORD of MACHINE memory has ONE or more EXTRA bits

Best explanation: None.

19.

How is disadvantage of all-or-nothing approach overcome?(a) Base/Bound(b) Relocation technique(c) Fence method(d) Tagged architectureThis question was posed to me in unit test.I want to ask this question from Protection topic in portion Protection of Operating System

Answer» RIGHT ANSWER is (d) TAGGED architecture

The EXPLANATION is: NONE.
20.

What is all-or-nothing situation for sharing in memory?(a) Program makes all its data available to be accessed(b) It prohibits access to some(c) It creates rules who can access program memory(d) It separates program memory and data memoryThis question was addressed to me in an interview for job.The question is from Protection topic in division Protection of Operating System

Answer» RIGHT ANSWER is (a) Program MAKES all its data available to be accessed

Easiest explanation - None.
21.

What is the role of base/bound registers?(a) They give starting address to a program(b) Program’s addresses are neatly confined to space between the base and the bound registers(c) They provide encrypted environment(d) This technique doesn’t protects a program’s address from modification by another userI got this question in homework.My doubt stems from Protection in chapter Protection of Operating System

Answer» RIGHT OPTION is (b) Program’s addresses are neatly confined to space between the base and the BOUND registers

Easy EXPLANATION - None.
22.

What is the basic need in protecting memory in multi-user environment?(a) We need two registers one ‘start’ and other ‘end’(b) We need a variable register(c) A fence register has to be used known as base register.(d) None of the mentionedI have been asked this question in an online quiz.I need to ask this question from Protection in division Protection of Operating System

Answer»

The correct CHOICE is (c) A fence register has to be USED KNOWN as BASE register.

Easiest explanation - NONE.

23.

How can fence and relocation be used together?(a) To each program address, the contents of fence register are added(b) To contents of fence register is subtracted from actual address of program(c) To each program address, the contents of fence register are not added(d) None of the mentionedI got this question by my school principal while I was bunking the class.I need to ask this question from Protection in division Protection of Operating System

Answer»

Right answer is (a) To each program ADDRESS, the contents of FENCE REGISTER are added

Easiest explanation - This both relocates the address and guarantees that no one can access a LOCATION lower than a fence address.

24.

What is not true regarding ‘Fence’?(a) It is implemented via hardware register(b) It doesn’t protect users from each other(c) It good to protect OS from abusive users(d) Its implementation is unrestricted and can take any amount of space in Operating system.The question was posed to me during an interview for a job.My enquiry is from Protection in section Protection of Operating System

Answer» CORRECT answer is (d) Its implementation is unrestricted and can TAKE any AMOUNT of SPACE in OPERATING system.

Explanation: None.
25.

What is correct regarding ‘relocation’ w.r.t protecting memory?(a) It is a process of taking a program as if it began at address 0(b) It is a process of taking a program as if it began at address 0A(c) Fence cannot be used within relocation process(d) All of the mentionedI had been asked this question in class test.The doubt is from Protection in portion Protection of Operating System

Answer»

Right choice is (a) It is a process of taking a PROGRAM as if it began at ADDRESS 0

The best I can EXPLAIN: NONE.

26.

In asymmetric encryption _____________(a) same key is used for encryption and decryption(b) different keys are used encryption and decryption(c) no key is required for encryption and decryption(d) none of the mentionedThe question was posed to me in an interview for job.My query is from Security in division Protection of Operating System

Answer» CORRECT option is (b) DIFFERENT KEYS are used encryption and decryption

The best EXPLANATION: None.
27.

What is true regarding ‘Fence’?(a) Its a method to confine users to one side of a boundary(b) It can protect Operating system from one user(c) It cannot protect users from each other(d) All of the mentionedThis question was posed to me during an online interview.I want to ask this question from Protection in chapter Protection of Operating System

Answer»

The CORRECT OPTION is (d) All of the mentioned

Explanation: NONE.

28.

Multipartite viruses attack on _____________(a) files(b) boot sector(c) memory(d) all of the mentionedThe question was asked by my school principal while I was bunking the class.I'm obligated to ask this question of Security in division Protection of Operating System

Answer» CORRECT CHOICE is (d) all of the mentioned

The EXPLANATION is: NONE.
29.

Which one of the following is not an attack, but a search for vulnerabilities to attack?(a) denial of service(b) port scanning(c) memory access violation(d) dumpster divingThe question was posed to me during an online exam.My question is taken from Security topic in division Protection of Operating System

Answer»

The CORRECT ANSWER is (B) PORT scanning

Explanation: NONE.

30.

File virus attaches itself to the _____________(a) source file(b) object file(c) executable file(d) all of the mentionedThis question was posed to me in an interview.The above asked question is from Security topic in section Protection of Operating System

Answer»

Correct choice is (C) executable file

Best EXPLANATION: NONE.

31.

What is a trap door in a program?(a) a security hole, inserted at programming time in the system for later use(b) a type of antivirus(c) security hole in a network(d) none of the mentionedI got this question in semester exam.The query is from Security in section Protection of Operating System

Answer»

Correct option is (a) a SECURITY HOLE, INSERTED at programming TIME in the system for later use

The explanation is: NONE.

32.

Which one of the following is a process that uses the spawn mechanism to revage the system performance?(a) worm(b) trojan(c) threat(d) virusThis question was addressed to me in an interview for job.The query is from Security in section Protection of Operating System

Answer» CORRECT OPTION is (a) worm

To EXPLAIN: NONE.
33.

The pattern that can be used to identify a virus is known as _____________(a) stealth(b) virus signature(c) armoured(d) multipartiteI got this question in quiz.I'm obligated to ask this question of Security topic in portion Protection of Operating System

Answer»

The CORRECT answer is (B) VIRUS signature

To explain: NONE.

34.

The internal code of any software that will set of a malicious function when specified conditions are met, is called _____________(a) logic bomb(b) trap door(c) code stacker(d) none of the mentionedI got this question by my college director while I was bunking the class.My question comes from Security in section Protection of Operating System

Answer»

The CORRECT answer is (a) LOGIC bomb

To explain: NONE.

35.

When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________(a) denial-of-service attack(b) slow read attack(c) spoofed attack(d) starvation attackThis question was addressed to me during a job interview.Query is from Security topic in section Protection of Operating System

Answer» CORRECT ANSWER is (a) denial-of-service attack

Easy EXPLANATION - NONE.
36.

The code segment that misuses its environment is called a _____________(a) internal thief(b) trojan horse(c) code stacker(d) none of the mentionedThe question was posed to me in class test.My doubt stems from Security in chapter Protection of Operating System

Answer»

The correct OPTION is (b) TROJAN horse

The EXPLANATION: NONE.

37.

For a domain _______ is a list of objects together with the operation allowed on these objects.(a) capability list(b) access list(c) both capability and access list(d) none of the mentionedThe question was posed to me in an interview for internship.This is a very interesting question from Protection Concepts topic in portion Protection of Operating System

Answer» RIGHT OPTION is (a) CAPABILITY list

Easiest EXPLANATION - NONE.
38.

In UNIX, domain switch is accomplished via _____________(a) file system(b) user(c) superuser(d) none of the mentionedI have been asked this question in semester exam.My question is from Protection Concepts in division Protection of Operating System

Answer» RIGHT CHOICE is (a) FILE system

Best EXPLANATION: NONE.
39.

Which one of the following is capability based protection system?(a) hydra(b) cambridge CAP system(c) both hydra and cambridge CAP system(d) none of the mentionedThis question was addressed to me in quiz.The question is from Protection Concepts topic in portion Protection of Operating System

Answer»

The CORRECT choice is (c) both HYDRA and cambridge CAP system

Best EXPLANATION: None.

40.

Global table implementation of the matrix table contains _____________(a) domain(b) object(c) right-set(d) all of the mentionedThe question was asked in semester exam.My question comes from Protection Concepts in portion Protection of Operating System

Answer» CORRECT OPTION is (d) all of the mentioned

Easy EXPLANATION - NONE.
41.

Access matrix model for user authentication contains _____________(a) a list of objects(b) a list of domains(c) a function which returns an object’s type(d) all of the mentionedThis question was addressed to me during an online exam.The query is from Protection Concepts topic in division Protection of Operating System

Answer» RIGHT CHOICE is (d) all of the mentioned

The EXPLANATION: NONE.
42.

If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is _____________(a) static(b) dynamic(c) neither static nor dynamic(d) none of the mentionedI have been asked this question by my school principal while I was bunking the class.Query is from Protection Concepts in section Protection of Operating System

Answer»

The CORRECT ANSWER is (a) static

Easiest EXPLANATION - NONE.

43.

The protection domain of a process contains _____________(a) object name(b) rights-set(c) both object name and rights-set(d) none of the mentionedThe question was asked in an online interview.Question is from Protection Concepts topic in chapter Protection of Operating System

Answer» RIGHT OPTION is (c) both object NAME and rights-set

The EXPLANATION: None.
44.

For system protection, a process should access _____________(a) all the resources(b) only those resources for which it has authorization(c) few resources but authorization is not required(d) all of the mentionedI had been asked this question in an online interview.This intriguing question originated from Protection Concepts in section Protection of Operating System

Answer» CORRECT ANSWER is (b) only those RESOURCES for which it has authorization

The BEST explanation: None.
45.

Which principle states that programs, users and even the systems be given just enough privileges to perform their task?(a) principle of operating system(b) principle of least privilege(c) principle of process scheduling(d) none of the mentionedI have been asked this question during an interview.The question is from Protection Concepts topic in chapter Protection of Operating System

Answer»

Right ANSWER is (B) principle of least privilege

To EXPLAIN I WOULD SAY: None.

46.

_______ is an approach to restricting system access to authorized users.(a) Role-based access control(b) Process-based access control(c) Job-based access control(d) None of the mentionedI have been asked this question in a national level competition.Question is from Protection Concepts in division Protection of Operating System

Answer» CORRECT OPTION is (a) Role-based ACCESS control

Explanation: NONE.
47.

What are the various roles of protection?(a) It is used to detect errors which can prevent contamination of system(b) It is used used to accelerate a process(c) It is used to optimize system downtime(d) None of the mentionedThis question was posed to me in an international level competition.This interesting question is from Protection topic in section Protection of Operating System

Answer»

Correct OPTION is (a) It is used to DETECT ERRORS which can prevent contamination of system

Easy explanation - NONE.

48.

Which of the following objects require protection?(a) Memory(b) Monitor(c) Power supply unit(d) All of the mentionedThe question was posed to me during an interview.My question is taken from Protection in section Protection of Operating System

Answer» RIGHT OPTION is (a) Memory

For EXPLANATION: NONE.
49.

What is ‘separation’ in security of Operating systems?(a) To have separate login for different users(b) To have separate Hard disk drive/partition for different users(c) It means keeping one user’s objects separate from other users(d) None of the mentionedI have been asked this question during an interview.My enquiry is from Protection topic in division Protection of Operating System

Answer»

Correct ANSWER is (C) It means KEEPING ONE user’s objects separate from other users

Easy explanation - None.

50.

Which of the following objects require protection?(a) CPU(b) Printers(c) Motherboard(d) All of the mentionedI have been asked this question in homework.My enquiry is from Protection in chapter Protection of Operating System

Answer» RIGHT CHOICE is (B) Printers

Best EXPLANATION: NONE.