Protection Flashcards

1
Q

True or False? Policies determine how something will be done, mechanisms
describe what will be done.

A

False; Mechanisms determine HOW something will be done; Policies decide WHAT will be done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What principle dictates that programs and users be given just enough privileges to perform their tasks?

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False? The need-to-know principle states that a process needs
to know everything in order to perform its task.

A

False; the process should be limited to only those resources necessary to perform its task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False? The user mode/kernel mode paradigm is an example of
domain switching.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False? In the UNIX operating system, a domain is associated with a process, not with a specific user.

A

False; In the UNIX operating system, a domain is associated with the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name of the bit in a UNIX system that associates each file with an owner and domain?

A

setuid bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does each row and column represent in an access matrix?

A

Each row represents a domain, and each column represents an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the problem when using a global table to represent an access matrix?

A

The table is usually large, so much so that it can not fit into main memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the benefit of using role-based access control?

A

The principle of least privilege can be implemented without creating a separate account for each user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is revocation of access rights easy with an access list scheme?

A

It is easy because the access list can be searched for any access rights that need to be revoked, and then those rights can be deleted; immediately revoking access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provide two examples of capability-based systems.

A
  1. Hydra

2. Cambridge CAP System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give an example of a programming language that provides language based
protection.

A

Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly