Unit4 - Subjective Questions

CSE316 • Practice Questions with Detailed Answers

1

Explain the four necessary conditions that must hold simultaneously for a Deadlock to occur.

2

Distinguish between Deadlock Prevention and Deadlock Avoidance.

3

Describe the Banker's Algorithm for deadlock avoidance. Include the data structures used.

4

Explain the concept of Starvation and how it differs from Deadlock.

5

Discuss the Resource Allocation Graph (RAG) and how it is used to characterize deadlocks.

6

Explain the methods for Deadlock Recovery once a deadlock has been detected.

7

What are the Goals of Protection in an Operating System?

8

Discuss the Principles of Protection as proposed by Saltzer and Schroeder.

9

Explain the concept of Domain of Protection.

10

What is an Access Matrix? Describe its implementation methods.

11

Explain Buffer Overflow as a security vulnerability.

12

Define Trapdoors and Backdoors in the context of system security.

13

Discuss Password-based Authentication and methods to secure passwords.

14

Distinguish between Program Threats and System/Network Threats with examples.

15

Describe the lifecycle and types of Viruses.

16

What is Cache Poisoning?

17

Explain the concept of a Safe State in Deadlock Avoidance.

18

How does Deadlock Prevention attack the Hold and Wait condition?

19

Describe Denial of Service (DoS) attacks.

20

Explain the Access Control List (ACL) implementation of the Access Matrix with an example.