For system protection, a process should access _____________
(a) all the resources
(b) only those resources for which it has authorization
(c) few resources but authorization is not required
(d) all of the mentioned
I had been asked this question in an online interview.
This intriguing question originated from Protection Concepts in section Protection of Operating System