Unit4 - Subjective Questions

CSE316 • Practice Questions with Detailed Answers

1

Define Deadlock and explain the four necessary conditions that must hold simultaneously for a deadlock to occur.

2

Distinguish between Deadlock Prevention and Deadlock Avoidance.

3

Explain the Banker's Algorithm for deadlock avoidance. How does it determine if a system is in a Safe State?

4

Consider a system with 5 processes ( to ) and 3 resource types ().

Allocation Matrix:
, , , ,

Max Matrix:
, , , ,

Available:

Determine the Need Matrix and check if the system is in a safe state. If yes, provide the safe sequence.

5

Describe Deadlock Detection using a Resource Allocation Graph (RAG). How does it handle single versus multiple instances of resource types?

6

Once a deadlock is detected, what are the strategies for Deadlock Recovery?

7

Compare Deadlock and Starvation.

8

Discuss the Goals of Protection in an Operating System.

9

Explain the concept of Domain of Protection.

10

Describe the Access Matrix model of protection.

11

How is the Access Matrix implemented? Compare Access Control Lists (ACL) and Capability Lists.

12

What are Buffer Overflow attacks? How do they compromise system security?

13

Define Trapdoors, Backdoors, and Cache Poisoning in the context of system threats.

14

Explain Password-based Authentication. What are the security problems with passwords and how does Salting improve security?

15

List and explain the Design Principles for Protection proposed by Saltzer and Schroeder.

16

Classify and explain different types of Program Threats.

17

What is a Virus? Explain the typical phases of a virus lifecycle.

18

Differentiate between a Virus and a Worm.

19

Discuss System and Network Threats including Sniffing, Spoofing, and Denial of Service.

20

Explain the concept of Security Vulnerability. Why is perfect security impossible?