Page 288 - DCAP103_Principle of operating system
P. 288
Unit 8: System Protection
Self Assessment Notes
Multiple choice questions:
4. What is the use of Chinese Wall?
( a) To address conflict-of-interest issues related to consulting activities within banking
and other financial disciplines.
( b) To address conflict-of-interest issues related to consulting activities within college
and other Institutional disciplines.
( c) To address conflict of-interest issues related to consulting activities within government
offices.
( d) All of the above.
5. What is Access Control List?
( a) A list associated with an object that specifies all the objects that can access the subject,
along with their rights to the object.
( b) A list associated with an object that specifies all the subjects that can access the object,
along with their rights to the object.
( c) A list associated with a subject that specifies all the subjects that can access the object,
along with their rights to the object.
( d) None of the above.
6. What is Discretionary Access Control (DAC)?
( a) DAC leaves a certain amount of access control to the discretion of the object’s owner
or anyone else who is not authorized to control the object’s access.
( b) DAC leaves a certain amount of access matrix to the discretion of the object’s owner
or anyone else who is authorized to control the object’s access.
( c) DAC leaves a certain amount of access control to the discretion of the object’s owner
or anyone else who is authorized to control the object’s access.
( d) All of the above.
Fill in the blanks:
7. ...................... control is concerned with determining the allowed activities of legitimate
uses.
8. ...................... is an entity that contains or receives information in the access control research
community.
8.6 Summary
• The processes in an operating system must be protected from one another’s activities.
• Implementation of protection in an OS generally involves three factors.
• Access matrices are widely used to hold a symbolic representation of the set of rights
available to the subjects for access to objects.
• Access control is concerned with determining the allowed activities of legitimate users,
mediating every attempt by a user to access a resource in the system.
• Capability systems were first described in the literature in the mid-1960’s.
LOVELY PROFESSIONAL UNIVERSITY 281