Question1:
a) Describe various methods for user authentication for security.
b) What do you mean by the term system call? Describe various kinds of system call.
c) How does the principle of least privilege help in the creation of the protection systems?
Question 2:
a) What do you mean by the term process? Describe different states of a process? Give a list of events which are responsible for process state transitions.
b) Describe Banker’s algorithm to handle the deadlocks.
c) Illustrate a mechanism by which one segment could belong to the address space of the two diverse processes.