X

MCSCB103 Operating System & Security M.Tech Model Question Paper : mgu.ac.in

Name of the College : Mahatma Gandhi University
Department : Computer Science and Engineering
Subject Code/Name : MCSCB 103/Operating System And Security
Sem : I
Website : mgu.ac.in
Document Type : Model Question Paper

Download Model/Sample Question Paper :
I : https://www.pdfquestion.in/uploads/mgu.ac.in/5031-1-MCSCB%20103%20OPS%20-%20I.doc
II : https://www.pdfquestion.in/uploads/mgu.ac.in/5031-2-MCSCB%20103%20OPS%20-%20II.doc

MGU Operating System & Security Question Paper

M.Tech Degree Examination :
Branch: Computer Science and Engineering
Specialization : Cyber Security

Related : MGU MCSSE105-3 Advanced Databases M.Tech Model Question Paper : www.pdfquestion.in/5029.html

Model Question Paper – I

First Semester :
MCSCB 103 : Operating System And Security
(Regular – 2013 Admissions)
Time : Three Hours
Maximum : 100 marks
Answer all questions. :
1. a) Explain different factors in OS design. (12)
b) Explain about process & threads management. (13)
OR
2. a) Explain about basic implementation considerations. (13)
b) Explain about dead lock avoidance and prevention. (12)

3. a) With suitable examples, explain the optimal page replacement and most recently
used page replacement algorithms. (13)
b) Explain FIFO page replacement algorithms (12)
OR
4. a) Explain virtual memory and demand paging. (12)
b) Explain about memory segmentation (13)

5. a) Explain the methods for file system security (12)
b) Discuss the different user authentication mechanisms in detail. (13)
OR
6. a. Describe the operations of Network file system and compare it with Secure file system. (13)
b) What is Server message block, explain it (12)

7. a) Discuss the methods for OS audit. (12)
b) Write note on virtualization technique for security. (13)
OR
8. a) Explain about malware analysis and protection. (8)
b) Discuss the methods for intrusion detection and virus protections (8)
c) Explain Digital right management (9)

Model Question Paper II

MCSCB 103
OPERATING SYSTEM AND SECURITY :
(Regular – 2013 Admissions)
Time : Three Hours
Maximum : 100 marks
Answer all questions. :
1. a) Discuss the OS organization and what are the factors in OS design? (13)
b) Write short note on methods of dead lock avoidance and prevention.(12)
OR
2. a) Write short note on time sharing and multi programming (12)
b) Explain about process & threads management. (13)

3. a) Explain virtual memory and demand paging. (12)
b) Discuss about memory segmentation (13)
OR
4. Describe the following page replacement algorithms with example.
a. Optimal page replacement (8)
b. FIFO page replacement algorithms (8)
c. Most recently used page replacement algorithms (9)

5. Discuss in detail
a. Network file system (8)
b. Server message block (8)
c. Secure file system (9)
OR
6. a) Describe the methods for file system security (12)
b) Discuss the different user authentication mechanisms in detail. (13)

7. a) How to analyse a malware and protect it? (8)
b) Discuss the methods for intrusion detection and virus protections (8)
c) Explain Digital right management
OR
8. a) Discuss the methods for OS audit. (12)
b) Write note on virtualization technique for security. (13)

Syllabus

Module 1 :
Introduction Operating Systems Concepts – System Calls – OS Organization – Factors in OS Design – Basic Implementation Considerations – Time Sharing and Multi Programming – Real Time Systems.

Process Management : Process Concepts, Model – Process Synchronization – Process Scheduling, Threads. Dead Lock: Detection & Recovery, Avoidance, and Prevention- Two Phase Locking Issues.

Module 2 :
Memory Management Basic Memory Management – Swapping – Virtual Memory and demand Paging– Page Replacement Algorithms-Segmentation.

Module 3 :
File System and I/O Management Files – Low Level File Implementations – File system security .Remote file system security.NFS, SMB, SFS, User authentication, Passwords, Biometrics, and Smartcards.

Memory Mapped Files – Directories, Implementation – Principles of I/O Hardware & Software – Device Drivers – Disks Hardware, Formatting & Arm Scheduling Algorithms.

Module 4 :
Security and protection in operating systems Secure Operating Systems – access control, auditing, trusted computing base, buffer overflows.

Malware analysis and protection : rootkits and their defenses, polymorphic malware, malware capture and analysis such as honeypots. Virtualization technique for security. Intrusion Detection and Virus Protection, TCPA and NGSCB, Digital Rights Management.

References

1. Andrew S. Tanenbaum, “Modern Operating Systems”, 2nd edition, Addison Wesley, 2001.
2. Gary Nutt, “Operating Systems a Modern Perspective “, 2nd edition, Pearson Edition, 2001.

3. Trent Jaeger, “Operating System Security”, Volume 1 of Synthesis Lectures on Information Security, Privacy and Trust, Morgan & Claypool Publishers, 2008.
4. Wolfgang Mauerer, “Professional Linux Kernel Architecture”, John Wiley and Sons, New York, 2008

5. Reading: J.H. Saltzer and M.D. Schroeder, the Protection of Information in Computer Systems. Setuid Demystified, by Chen, Wagner.
6. Reading: Kerberos Authentication. Refer Website.

7. Reading: Nachenberg, Computer Virus-Antivirus Coevolution. Comm. ACM, 40(1), pp. 46-51, January 1997.
8. Paxson, Bro: A System for Detecting Network Intruders in Real-Time. Proc. 7th USENIX Security Symposium, San Antonio, TX, January 1998

Categories: Operating System
Tags: mgu.ac.in
Anusha:
www.pdfquestion.in © 2022 Contact Us   Privacy Policy   Site Map