System_Protection_and_Security_Interview_Questions (1)
System_Protection_and_Security_Interview_Questions (1)
System Protection
1. Goals of Protection
Q: What are the primary goals of system protection?
A: Authentication verifies the identity of users before granting access, ensuring that only
authorized users can access protected resources.
A: The principle of least privilege states that users and programs should be given only the
minimum level of access required to perform their tasks. It reduces the risk of accidental or
malicious damage.
3. Access Matrix
Q: What is an access matrix? How is it used for system protection?
A: An access matrix is a security model that defines the access rights of subjects
(users/processes) to objects (files/devices). It provides a structured way to control
permissions.
4. Access Control
Q: Explain the difference between DAC, MAC, and RBAC.
A:
- Discretionary Access Control (DAC): Users can control their own permissions (e.g., file
permissions in Windows).
- Mandatory Access Control (MAC): System-enforced security based on labels (e.g.,
military security levels).
- Role-Based Access Control (RBAC): Permissions are assigned based on user roles (e.g.,
admin, user, guest).
A:
System Security
2. Program Threats
Q: What is a buffer overflow attack? How can it be prevented?
A: A buffer overflow occurs when a program writes more data into a buffer than it can hold,
leading to memory corruption and potential exploits. Prevention methods include:
A: A DoS attack floods a system with excessive requests, making it unavailable to legitimate
users. Prevention:
A:
- Symmetric encryption: Uses the same key for encryption and decryption (e.g., AES,
DES).
- Asymmetric encryption: Uses a public key for encryption and a private key for
decryption (e.g., RSA, ECC).
5. User Authentication
Q: What are different authentication methods used in security?
A: