阿摩線上測驗
登入
首頁
>
中山◆資工◆作業系統
> 110年 - 110 國立中山大學_碩士班招生考試_資工系(資安):作業系統#104266
110年 - 110 國立中山大學_碩士班招生考試_資工系(資安):作業系統#104266
科目:
中山◆資工◆作業系統 |
年份:
110年 |
選擇題數:
0 |
申論題數:
22
試卷資訊
所屬科目:
中山◆資工◆作業系統
選擇題 (0)
申論題 (22)
(1) Except for the process state, what are the six components in a process control block? (6%)
(2) Please define interrupt latency and dispatch latency. (4%)
(3) As compared with processes, will or will not context switching among multiple threads incur less overhead? Why or why not? (4%)
(4) According to POSIX threads, what are the three procedures involved in a mutex and how to use them? (6%)
(1) How do the first-fit, best-fit, and worst-fit methods work for memory allocation? (6%)
(2) Why can virtual memory speed up process creation? (4%)
(3) When using demand paging, what problem will occur in an inverted page table? How to solve that problem? (4%)
(4) In case of a page fault, what are the six steps for the operating system to handle it? (6%)
(1) What are the four major pieces of information associated with an open file? (4%)
(2) Explain the six common types of access for a file. (6%)
(3) What is the difference between physical and logical formatting of a disk? (4%)
(4) What are the four typical registers associated with an I/O port? What are their functions? (4%)
(5) What is a maskable interrupt? (2%)
(1) What are phishing and dumpster diving? (4%)
(2) Please give two OS-based solutions to the stack & buffer overflow problem. (4%)
(3) How do parasitic and memory viruses work? (4%)
(4) What is a worm? Please explain the two components of a worm. (6%)
(5) What is session hijacking? (2%)
(1) How does one-way HMAC (hash-based message authentication code) key chain work? (7%)
(2) Please give the five steps for a server and a client to generate a shared 48-byte master secret in SSL (secure sockets layer). (5%)
(3) What is the difference between signature-based detection and anomaly detection? (4%)
(4) Please give two vulnerabilities of a firewall. (4%)