What are the characteristics of rights amplification in Hydra?
(a) This scheme allows a procedure to be certified as trustworthy
(b) Amplification of rights cannot be stated explicitly in declaration
(c) It includes kernel rights such as read
(d) All of the mentioned
The question was asked in an online interview.
I'd like to ask this question from Protection in portion Protection of Operating System