OS Assignment Complete Solutions
OS Assignment Complete Solutions
ASSIGNMENT-8
1. Which are the ways for the user authentication? Explain each in brief.
Answer:
User authentication is a crucial part of system security that ensures only legitimate users can access system
resources.
There are several methods of user authentication, each with varying degrees of security and usability:
1. Password-based Authentication:
- Simple and common, but vulnerable to brute-force attacks and phishing if not managed properly.
2. Biometric Authentication:
- Uses biological traits such as fingerprints, facial recognition, iris scans, or voice recognition.
- Offers a high level of security but may raise privacy concerns and require specialized hardware.
3. Token-based Authentication:
- Involves physical or software-based tokens that generate temporary codes (e.g., RSA SecurID, OTP
apps).
Each method can be selected based on the level of security needed and the usability expectations of the
system.
Answer:
Domain protection is a method of defining and enforcing boundaries within which a process or user can
operate.
Each domain contains a set of resources (files, devices, etc.) and a set of access rights. The system ensures
that a process only accesses resources according to the domain's policies. This mechanism prevents
unauthorized access and supports the principle of least privilege by allowing minimal rights required to
perform a task.
Answer:
An Access Control List (ACL) is a security mechanism that associates each system object (like a file or
directory) with a list of users and their permitted access types (read, write, execute, etc.).
It helps in specifying and controlling what type of operations a particular user or process can perform on that
Answer:
Trojan Horse:
- It performs hidden actions like stealing data or damaging the system when executed by the user.
- A hidden entry point in a program left intentionally (or maliciously) for bypassing normal authentication.
Access matrix is a model used to define and manage access control. It is a table with subjects (users,
processes) as rows and objects (files, devices) as columns. Each cell defines the operations permitted (read,
Answer:
Generic security attacks include common techniques used by attackers to compromise systems:
Such attacks highlight the importance of layered defense and proactive security measures.
Answer:
Answer:
A Virtual Machine (VM) is a software emulation of a physical computer. It allows multiple operating systems
Benefits include:
Answer:
System VMs support entire OS environments, while process VMs support isolated application execution.
3. Explain building block of virtulization, including hypervisiors, Virtual machine monitor and virtulization
layers. Discuss the functions and operations.
Answer:
- Hypervisor:
- Type 1 (bare-metal) runs directly on hardware; Type 2 (hosted) runs over an OS.
- Virtualization Layers:
Functions:
- Resource scheduling
4. Analyze the impact of virtualization on system performance, resource utilization, and management
efficiency.
Answer:
- System Performance:
- Resource Utilization:
- Management Efficiency: