OS Security mid term 2

Create an image of a security-themed quiz interface, featuring symbols of locks, keys, and a computer screen displaying a quiz on Operating System Security, with a modern design and vibrant colors.

OS Security Midterm Quiz

Test your knowledge on Operating System Security with our comprehensive midterm quiz! Dive into various topics, including authentication, access control, security policies, and more.

This quiz covers essential concepts in OS security, such as:

  • Access Control Lists
  • Capability and Delegation
  • Role Hierarchies
  • Memory Management
45 Questions11 MinutesCreated by StudyingGuard412
System knows who the user is Authentication via name and password, other credential.
True
False
Access requests pass through gatekeeper System must allow monitor to be bypassed.
True
False
Access control list Store column of matrix with the resource.
True
False
Capability variations store row of matrix with user, under OS control.
True
False
Access control lists are widely used, often with single user.
True
False
Some aspects of capability concept are used in Kerberos.
True
False
Access control list associate list with each object.
True
False
Access control list relies on authentication: need to know grops.
True
False
Capability is unforgeable ticket random bit sequence, or managed by operating system.
True
False
Capability is unforgeable ticket can be passed from multi process to another.
True
False
Reference monitor checks ticket need to know identity of user/process.
True
False
Delegation cap process can pass capability at run time.
True
False
Delegation less common let other process act under current user.
True
False
Revocation ACL add user or group from list.
True
False
Revocation possible in some systems of appropriate bookkeeping operating system knows what data is capability.
True
False
Role hierarchy each role gets permissions of roles uper.
True
False
Role hierarchy list only new permissions given to each role.
True
False
Permission hierarchies If user has read access to directory, user has read access to only file in directory.
True
False
General problem in access control complex mechanisms require complex output
True
False
General problem in access control difficult to configure and maintain.
True
False
General problem in access control roles, other organizing ideas try to simplify problem.
True
False
Military security policy classification involves sensitivity levels
True
False
Military security policy let classified information leak to unclassified files.
True
False
Group individuals and resources use some form of hierarchy to organize policy.
True
False
Want both confidentiality and integrity contradiction is partly an illusion.
True
False
Segmented, Virtual memory hardware translates virtual address to real address.
True
False
Shared memory multiprocessor single CPUs share same physical memory
True
False
Security designed to be secure from the beginning.
True
False
Segments each data area or procedure is called a segment.
True
False
Multiple segments segments are dynamically linked.
True
False
Authentication figures out who is accessing.
True
False
Access control ensure multi authorized access are allowed.
True
False
Auditing record what is happening, to identify attacks later and recover.
True
False
Types of groups authentication something you know.
True
False
Types of groups authentication something you have.
True
False
Passphrase a sequence of words or other text used for similar purpose as password.
True
False
Vulnerabilities can exist at client side, server side, or communications channel.
True
False
A user needs to remember passwords for tens, if not hundreds of accounts.
True
False
One can use various ways to increase adversary’s capabilities to test password guesses.
True
False
Mechanisms to defend against dictionary and guessing attacks disable accounts with multiple failed attempts.
True
False
Login spoofing attacks write a program showing a login window on screen and record the passwords.
True
False
Spoofing and defenses on the Web defense methods browser filtering of known phishing sites.
True
False
Multiple rings procedure, data segments each in generic ring.
True
False
Capability based system each object resides on server.
True
False
Invoke operation through message to server send message with capability and parameters.
True
False
{"name":"OS Security mid term 2", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on Operating System Security with our comprehensive midterm quiz! Dive into various topics, including authentication, access control, security policies, and more.This quiz covers essential concepts in OS security, such as:Access Control ListsCapability and DelegationRole HierarchiesMemory Management","img":"https:/images/course6.png"}
Powered by: Quiz Maker