Summary questions on operating systems

The operating-systems study module is very broad, and many of its topics concern developers rather than end users. Summary questions can therefore only cover a small subset of the material. One topic missing from the questions is a reminder that operating-system and hypervisor–level design decisions always involve trade-offs between security and performance. This balancing act has often delayed the adoption of security mechanisms, but situations such as Meltdown have forced action. A second related observation is worth highlighting: many security innovations did not originally come from operating-system vendors or open-source teams, but rather from “outside”. Academic researchers have played an important role here as well, and this study module may serve as a starting point for you in that direction. Research-driven advances in security are not in any case limited to areas that appear highly theoretical, such as cryptography.

The questions are randomized per student, and you will receive only correct/incorrect feedback. In Problem 1 there may be one question where multiple options must be selected. In all others there is exactly one correct answer.

In Problem 2, each student is assigned at least one correct option, usually more. Problem 2 is passed when the score is 12 or higher, and the points are shown with a yellow background. Unfortunately, Plussa gives incorrect feedback even for partially correct answers. However, Problem 2 is accepted if the score is 12 or higher. The score itself does not directly indicate whether an individual selection was correct or not. Points begin to accumulate only once more than half of the selections are correct.

When you type dir (Windows) or ls (Linux) at the command prompt, your operating system
When you start your computer, which of the following participates last?
Which of the following is not used to implement inter-process communication on a single machine?
In operating-system threat modeling, several attacks arise from performance-enhancing features in the OS or hardware that systems could function without. Which of the following is not such a feature?
According to the text, there are four main types of operating systems: those with (1) a single security domain, (2) several domains but with the OS core forming only one, (3) separate domains around most components, and (4) application-specific services on top of a minimal kernel. Into how many of these categories do Linux, Windows, macOS, and Minix fall?
In the chapter on operating systems—including advanced sections—buffer overflow is not discussed, even though it is a very common topic in software security. What could be the reason?
Below is a condensed list of fundamental OS security procedures mentioned in the text. Which four (three are sufficient to pass) rely least on hardware support? All of them naturally read from or write to hardware, but select those whose implementation is always software-based and does not require special hardware features.
Access control can be implemented using different models—DAC, RBAC, MAC, etc. Regardless of the model, the overall process ensures that the right and only the right subjects gain access to a data resource for the right purposes, while access control (AC) itself is merely the decision step: allow or deny. Interpreting AC in this way as a small phase, what is the correct order of the overall process? Here, separation mechanisms refer to everything that the OS isolation function has been described to include. Note that before all this, each object must be uniquely named.
According to the 2019 version of the German IT baseline protection standard, a database system must meet the following primary requirements (in addition to standard and possible special requirements). This is also quite a good list for operating systems. Which item does not translate naturally to operating systems? (You do not need to read the advanced database section or the archived standard.)

Basic concepts in operating systems include the security domain, hypervisor, reference monitor, and kernel. Select the correct statements.

Posting submission...