0
0
Operating Systemsknowledge~20 mins

Capability-based security in Operating Systems - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Capability Security Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
What is the primary purpose of capability-based security?

Capability-based security is a model used in operating systems and software design. What is its main goal?

ATo control access by associating unforgeable tokens with permissions
BTo encrypt all data stored on a device
CTo authenticate users using passwords only
DTo monitor network traffic for suspicious activity
Attempts:
2 left
💡 Hint

Think about how access rights are given and checked in capability systems.

📋 Factual
intermediate
2:00remaining
Which of the following best describes a capability in capability-based security?

Choose the option that correctly defines a capability.

AA password used to log into a system
BA list of all users in a system
CA firewall rule blocking unauthorized access
DA key or token that grants specific access rights to an object
Attempts:
2 left
💡 Hint

Capabilities are related to permissions and access control.

🔍 Analysis
advanced
2:00remaining
How does capability-based security differ from traditional access control lists (ACLs)?

Consider the differences between capability-based security and ACLs. Which statement correctly highlights a key difference?

ACapabilities are stored with the object, while ACLs are stored with the user
BCapabilities are unforgeable tokens held by users, while ACLs list permissions attached to objects
CACLs allow delegation of rights easily, capabilities do not
DACLs require encryption, capabilities do not
Attempts:
2 left
💡 Hint

Think about where permissions are stored and how they are checked.

Reasoning
advanced
2:00remaining
Why are capabilities considered unforgeable in capability-based security systems?

What makes capabilities unforgeable, ensuring security in capability-based systems?

AThey are stored in a public database accessible to all users
BThey are simple strings that users can copy freely
CThey are encrypted with a secret key only the system knows
DThey are printed on paper and physically handed out
Attempts:
2 left
💡 Hint

Consider how the system prevents users from creating fake capabilities.

🚀 Application
expert
2:00remaining
In a capability-based system, if a user wants to delegate access to a file to another user, what must they do?

Given a capability-based security model, how does a user safely delegate access rights to another user?

AThey must copy and securely transfer the capability token to the other user
BThey must add the other user to the file's access control list
CThey must share their password with the other user
DThey must request the system administrator to grant access
Attempts:
2 left
💡 Hint

Think about how capabilities represent access and how they can be passed.