Test 4 - File Systems and Security

CS 505, Operating Systems Concepts


  1. Which kind of block allocation policy would be most appropriate for a file system to use when magnetic tapes are used to implement the block storage abstraction? Explain.


    Magnetic tapes are strictly sequential access devices; they like to move in one direction only, and they don't like to change state. Any allocation policy, including any index policy, runs counter to those two properties is a poor match to tape drives. That leaves contiguous allocation as the most appropriate access policy for tape drives.


  2. Explain how a file system can be optimized for use as page storage by a virtual-memory manager.



  3. True or false: contiguous block allocation implies sequential access. Explain.


    False. Contiguous block allocation means only that a file's data blocks appear one after the other on the disk. While this makes sequential access very efficient, it doesn't preclude other forms of access, such as indexed or random.


  4. Which is a more appropriate form of protection when dealing with trojan horse programs: authentication or authorization? Explain.


    Trojan horses work by insinuating themselves into programs that are accepted as part of a working system. Once in the system, the trojan can act malevolently from inside the accepted program.

    Although some forms of strong authentication can protect against trojans, authorization provides a more general form of protection by defining exactly what a program can and cannot do, and to which objects the program has legitimate access. Strong authorization restricts a program, and its trojan, to those activities and objects to which it has legitimate need.



This page last modified on 12 December 2001.