CB3402 Oss
CB3402 Oss
QUESTION BANK
R-2021
Prepared by
Page 1
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
DEPARTMENT OF CSE (CYBER SECURITY)
REGULATION 2021
Prepared by
Page 2
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
INSTITUTE VISION & MISSION
VISION:
MISSION:
VISION:
MISSION:
Prepared by
Page 3
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
PROGRAM EDUCATIONAL OBJECTIVES (PEOs)
Prepared by
Page 4
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
Ethics: Apply ethical principles and commit to professional ethics and
PO8
responsibilities and norms of the engineering practice.
Individual and team work: Function effectively as an individual, and as a
PO9
member or leader in diverse teams, and in multidisciplinary settings.
Communication: Communicate effectively on complex engineering activities
PO10 with the engineering community and with society at large, such as, being able
to comprehend and write effective reports and design documentation, make
effective presentations, and give and receive clear instructions.
Project management and finance: Demonstrate knowledge and
PO11 understanding of the engineering and management principles and apply these
to one’s own work, as a member and leader in a team, to manage projects and
in multidisciplinary environments.
Life-long learning: Recognize the need for, and have the preparation and
PO12 ability to engage in independent and life-long learning in the broadest context
of technological change.
Prepared by
Page 5
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
CB3402 OPERATING SYSTEMS AND SECURITY L T P C
3 0 2 4
COURSE OBJECTIVES:
• To understand the basic concepts of Operating Systems.
• To explore the process management concepts including scheduling, synchronization,
threads and deadlock.
• To understand the memory, file and I/O management activities of OS.
• To understand the requirements of a trust model.
• To learn how security is implemented in various operating systems.
Prepared by
Page 6
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
UNIT – V SECURITY IN OPERATING SYSTEMS 9
UNIX Security – UNIX Protection System – UNIX Authorization – UNIX Security Analysis – UNIX
Vulnerabilities – Windows Security – Windows Protection System – Windows Authorization – Windows
Security Analysis – Windows Vulnerabilities – Address Space Layout Randomizations – Retrofitting
Security into a Commercial Operating System – Introduction to Security Kernels.
TOTAL: 45 PERIODS
COURSE OUTCOMES
On completion of this course, the students expected to be able to:
CO1 To gain understanding on the concepts of Operating Systems.
To acquire knowledge on process management concepts including scheduling,
CO2
synchronization, threads and deadlock.
CO3 To have understanding on memory, file and I/O management activities of OS.
To understand security issues in operating systems and appreciate the need for
CO4
security models
To gain exposure to the operating systems security models of WINDOWS and
CO5
UNIX OS
S 1 2 3 4 5 6 7 8 9 10 11 12 1 2
1 1 3 1 3 2 - - - 1 1 3 1 2 3
2 3 2 2 1 2 - - - 1 2 2 3 3 2
3 3 2 1 3 1 - - - 2 2 1 3 3 3
4 1 1 2 3 3 - - - 3 3 1 1 3 2
5 1 3 2 3 1 - - - 2 1 3 3 1 1
AVG 1.8 2.2 1.6 2.6 1.8 - - - 1.8 1.8 2 2.2 2.4 2.2
Prepared by
Page 7
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
TEXT BOOKS
1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”, John Wiley
& Sons, Inc., 10th Edition, 2021.
2. Trent Jaeger, Operating System Security, Morgan & Claypool Publishers series, 2008.
REFERENCE BOOKS
1. Morrie Gasser, “Building A Secure Computer System”, Van Nostrand Reinhold, New York, 1988.
2. Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, "Security in Computing", Fifth Edition, Prentice
Hall, New Delhi, 2015.
3. William Stallings, “Operating Systems – Internals and Design Principles”, 9th Edition, Pearson, 2017.
4. Michael Palmer, “Guide to Operating Systems Security”, Course Technology – Cengage Learning, New
Delhi, 2008.
5. Introduction to Hardware, Security and Trust, book by Mohammad Tehranipoor, Cliff Wang, Springer,
2012.
6. Gary McGraw, Software Security: Building Security In, Addison Wesley software security series, 2005.
7. Gerardus Blokdyk, Security Focused Operating System A Complete Guide - 2020 Edition,
5STARCooks, ISBN: 9781867373353, 2020.
Prepared by
Page 8
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
UNIT– I
OPERATING SYSTEM OVERVIEW
PART–A
CO
Q. No Questions BT Level Complexity
Mapping
1 What is an operating system? CO1 Understand Low
2 Define the functions of an operating system. CO1 Remember Low
What is the difference between system
3 CO1 Understand Medium
software and application software?
4 What is a kernel? CO1 Understand Low
Prepared by
Page 9
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
PART–B
CO
Q. No Questions BT Level Complexity
Mapping
Explain the organization and architecture of
1 CO1 Understand Medium
a computer system.
2 Explain the types of operating systems. CO1 Understand Medium
Describe the primary operations of an
3 CO1 Understand Medium
operating system.
Discuss the concept of system calls and
4 CO1 Understand Medium
explain with an example.
Explain the kernel data structures in an
5 CO1 Understand Medium
operating system.
Compare different types of operating
6 systems: Batch, Time Sharing, and Real- CO1 Evaluate High
Time.
Describe the services provided by an
7 CO1 Understand Medium
operating system.
Prepared by
Page 10
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
UNIT– II
PROCESS MANAGEMENT
PART–A
CO
Q. No Questions BT Level Complexity
Mapping
1 What is a process? CO2 Understand Low
Prepared by
Page 11
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
PART–B
CO
Q.No Questions BT Level Complexity
Mapping
Describe the various states of a process with
1 CO2 Understand Medium
neat diagram.
2 Explain Process Control Block in detail. CO2 Understand Medium
Explain the difference between preemptive
3 CO2 Understand Medium
and non-preemptive scheduling algorithm.
Analyze the concept of process scheduling and
4 CO2 Analyze High
why it is important in OS management.
Consider the following processes with their
arrival times and burst times (in milliseconds):
Arrival Burst
Process
Time Time
P1 0 5
P2 1 3
P3 2 8
5 CO2 Create High
P4 3 6
Using FCFS scheduling, calculate the
following:
• Turnaround Time for each process
• Waiting Time for each process
• Average Turnaround Time
• Average Waiting Time
Consider the following processes with their
burst times:
Burst
6 Process CO2 Create High
Time
P1 6
P2 8
Prepared by
Page 12
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
P3 7
P4 3
P1 6 2
P2 8 1
P3 7 3
7 CO2 Create High
P4 3 4
Prepared by
Page 13
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
Burst
Process
Time
P1 6
P2 8
P3 7
P4 3
Prepared by
Page 14
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
UNIT – III
PART–A
CO
Q. No Questions BT Level Complexity
Mapping
1 What is memory management? CO3 Understand Low
2 What is contiguous memory allocation? CO3 Understand Low
3 Define paging in memory management. CO3 Remember Low
6 What is virtual memory and how does it work? CO3 Understand Low
What is the difference between physical and
7 CO3 Understand Medium
virtual memory?
8 What is the principle of locality of reference? CO3 Understand Low
Prepared by
Page 15
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
PART–B
CO
Q. No Questions BT Level Complexity
Mapping
Discuss the various memory management
1 CO3 Understand Medium
techniques used in an operating system.
Prepared by
Page 16
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
UNIT – IV
PART–A
CO
Q. No Questions BT Level Complexity
Mapping
1 What are the main security goals in a system? CO4 Understand Low
Prepared by
Page 17
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
PART–B
CO
Q. No Questions BT Level Complexity
Mapping
Discuss the various security goals of a system and
1 explain their importance in the design of secure CO4 Understand Medium
systems.
Prepared by
Page 18
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
UNIT – V
PART–A
CO
Q. No Questions BT Level Complexity
Mapping
What is the importance of encryption in
1 CO5 Understand Low
computer security?
What is the difference between symmetric and
2 CO5 Understand Medium
asymmetric encryption?
What are the basic principles of information
3 CO5 Understand Low
security?
4 Define firewall. CO5 Remember Low
Prepared by
Page 19
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
PART–B
CO
Q. No Questions BT Level Complexity
Mapping
1 Describe the UNIX Security Model. CO5 Understand Medium
Explain the Windows Protection System and how it
2 CO5 Understand Medium
defends against malicious attacks.
3 Explain the role of cryptography in OS security. CO5 Understand Medium
Describe the process of authentication and
4 CO5 Understand Medium
authorization in an operating system.
Explain the concept of Address Space Layout
5 CO5 Understand Medium
Randomization (ASLR).
Evaluate the effectiveness of encryption methods in
6 CO5 Evaluate High
securing data stored on an operating system.
Prepared by
Page 20
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology
THANK YOU
Prepared by
Page 21
Mrs. A . Apoorvavalli
J. J. College of Engineering And Technology