Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 ) Modern computer systems can run multiple processes at the same time by 6 sharing physical resources such as CPU and memory among processes.

1)Modern computer systems can run multiple processes at the same time by 6sharing physical resources such as CPU and memory among processes. In such a system, not considering performance, user A can assume that the execution of his/her processes will not be affected by the execution of unrelated processes of user B because the operating system a.removes all data and code of one process from memory when another process runs. b.does not switch CPU from a process of user A to another user's process until A's processes complete their execution. c.limits a process's access to memory that only stores its code and data. d.allows a process access to all memory that stores non-operating system code but only when the access is read 2.The following is an example of an activity in a computer system that can be performed without making a system call. a. access a protected resource b.make a function call c.perform an I/O operation that requires access to a device d. access OS data that it could not access before making the system call 3.An operating system has direct access to and control over all physical resources in a computer system. However, when user code is executed, most memory accesses (LOAD and STORE requests) are completed without operating system intervention. This can be done because of the following reason a.Main memory is not a protected resource b.Main memory is a reusable resource and does not need to be protected c.Shared data could reside in memory and hence all processes must have access to all main memory d. The user code in a process can only access memory after it is allocated to the process by the operating system 4.The boundary between untrusted user code and trusted system code is also called the security perimeter or protection boundary. Such a perimeter separates the following a.Interrupt handling and page fault handling code b.local and global variables used by user code c.User computations and code that implements system calls d.All of the above 5.An attacker is able to exploit a buffer overflow vulnerability in the code of an operating system to turn off file access checks. As a result of this change in the TCB, any user can access any file in the system.The reason for this uncontrolled access to files on this system is that, prior to the exploitation of the operating system or TCB, it did not meet the following requirement a.Complete mediation b.Tamper-proof c.Correctness d.All of these 6.Most widely used operating systems provide considerable support for auditing but do not implement mandatory access control.What is the highest TCSEC class in which this system can be placed? a.C1 b. B1 c.D d.C2 Q7 SELinux is a security enhanced Linux system.It can be placed in the B1 TCSEC class because it enhances standard Unix with the following a.discretionary access control b.logging/auditing c.mandatory access control d. formal correctness

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Seven Databases In Seven Weeks A Guide To Modern Databases And The NoSQL Movement

Authors: Luc Perkins, Eric Redmond, Jim Wilson

2nd Edition

1680502530, 978-1680502534

More Books

Students also viewed these Databases questions

Question

What is the typical process of friendship development?

Answered: 1 week ago