Question 1: Write brief notes on the following:
a) One-time passwords.
b) Biometrics.
Question 2: Describe which of the given systems permit module designers to enforce the need to know principle.
a) The MULTICS ring protection scheme.
b) Hydra’s capabilities.
c) JVM’s inspection scheme.
Question 3: Describe various security threats in detail.
Question 4: How does surveillance programs which are used in the threat monitoring?
Question 5: Explain some checks a surveillance program might make to find out, if a user is attempting to corrupt a critical file.
Question 6: Write in brief about Multiprogramming, Timesharing, CPU Scheduling and Virtual Memory?
Question 7: Describe about Distributed system.
Question 8: Define the term operating system.
Question 9: Describe basic structure of a computer system and as well describe its basic elements.
Question 10: Compare and Contrast the batch systems with multi programming systems.