Final Exam Operating Systems
Final Exam Operating Systems
Question 2.
5. a) True
7. a) True
8. b) 23.3
9. b) 6.6
14. d) 1 and 2
15. a) Selecting a victim: select the process that has the lowest
cost
b) Rollback: return to some safe state
d) Starvation: same process may always be picked as victim
when using cost factor to
select a victim
16. a) True
21. b) The disk arm starts at one end of the disk, and moves
toward the other end, servicing requests until it gets to the other end
of the disk, where the head movement is reversed, and servicing
continues.
25. b) I will not click on the link because viruses can copy
themselves to my computer. To be sure the email is not real, I can call
my partner to see if she/he sent this email or not.
26. b) False
3.
FCFS SCAN C-SCAN
Scheduling Scheduling Scheduling
Description First-Come-First- SCAN (Elevator) C-SCAN
Serve scheduling scheduling scheduling
algorithm. algorithm. Disk arm algorithm. Like
Requests are starts at one end SCAN but restricts
serviced in the and moves towards the arm movement
order they arrive. the other end, to one direction,
servicing requests servicing requests
along the way. until the end, then
moving to the other
end.
Movement Unidirectional Bidirectional Bidirectional
Head In one direction Alternates Alternates
directions directions
Movement
Handling In order of arrival Prioritizes servicing Strictly services
requests in the requests in the
Requests
direction of arm direction of arm
movement movement, avoids
servicing in the
opposite direction
Efficiency May lead to high Reduces seek time Reduces seek time,
seek time, potential by servicing especially
for the "convoy requests in a more beneficial for
effect." efficient order. systems with high
request rates.
Starvation No starvation but Less likely to result Less likely to result
may lead to the in starvation due to in starvation due to
"convoy effect." the back-and-forth the controlled
movement of the unidirectional
arm. movement.
4.
2. Vulnerability Assessment
Defense Enhancement: Perform vulnerability assessments to identify
weaknesses in systems, networks, and applications. Address the
identified vulnerabilities through patch management, secure
configurations, and regular security updates.
3. Risk Mitigation
Defense Enhancement: Develop and implement cybersecurity risk
mitigation strategies, such as continuous monitoring, security policy
enforcement, and the use of security solutions like firewalls and
antivirus software.
4. Secure IT Environment
Defense Enhancement: Establish and enforce robust security policies
and procedures, implement gateway and endpoint security measures,
and manage identity and access controls to create a secure IT
environment.
5. Vulnerability Management
Defense Enhancement: Leverage vulnerability management tools and
practices to identify, prioritize, and remediate security vulnerabilities.
Use threat intelligence and risk-based prioritization to address the
most critical vulnerabilities.
b) Capabilities:
Description: In the capability-based implementation, each subject is
assigned a list of capabilities or tokens that represent its permissions
on various objects. These capabilities serve as tickets or keys that
grant specific access rights.
Implementation: Subjects are given unique tokens that authorize
specific operations on objects. The access matrix is not explicitly
stored; instead, access decisions are based on possession of valid
capabilities.
Advantages: Provides a more efficient and scalable approach,
especially as the number of subjects or objects increases. Can
simplify revocation of access by revoking specific capabilities.
Challenges: Requires secure management of capabilities to prevent
unauthorized access if a capability is intercepted.
Both methods have their advantages and trade-offs, and the choice
between them depends on factors such as the size of the system, the
complexity of access control requirements, and the desired level of
security. The access matrix is a flexible model that allows for various
implementations based on the specific needs of the system.