Вы находитесь на странице: 1из 7

IT600FinalExamTestBank

MultipleChoice
1.Adeadlockedstateoccurswhenever____.ANS:C
A)aprocessiswaitingforI/Otoadevicethatdoesnotexist
B)thesystemhasnoavailablefreeresources
C)everyprocessinasetiswaitingforaneventthatcanonlybecausedbyanotherprocessin
theset
D)aprocessisunabletoreleaseitsrequestforaresourceafteruse
2.Onenecessaryconditionfordeadlockis____,whichstatesthatatleastoneresourcemustbe
heldinanonsharablemode.
A)holdandwaitANS:B
B)mutualexclusion
C)circularwait
D)nopreemption
3.Onenecessaryconditionfordeadlockis______,whichstatesthataprocessmustbeholding
oneresourceandwaitingtoacquireadditionalresources.
A)holdandwaitANS:A
B)mutualexclusion
C)circularwait
D)nopreemption
4.Onenecessaryconditionfordeadlockis______,whichstatesthataresourcecanbereleased
onlyvoluntarilybytheprocessholdingtheresource.
A)holdandwait
B)mutualexclusionANS:D
C)circularwait
D)nopreemption
5.Onenecessaryconditionfordeadlockis______,whichstatesthatthereisachainofwaiting
processeswherebyP0iswaitingforaresourceheldbyP1,P1iswaitingforaresourceheldby
P2,andPniswaitingforaresourceheldbyP0.
A)holdandwait
B)mutualexclusionANS:C
C)circularwait
D)nopreemption
6.Thewitnesssoftwareproductisa____.
A)lockorderverifierthatusesmutualexclusionlockstoprotectcriticalsectionsANS:C
B)modelertodevelopresourceallocationgraphs
C)driverthatcanbeusedtopreventmutualexclusionfornonsharableresources
D)implementationofthebanker'salgorithmavailableformostoperatingsystems

7.Inasystemresourceallocationgraph,____.
A)adirectededgefromaprocesstoaresourceiscalledanassignmentedgeANS:C
B)adirectededgefromaresourcetoaprocessiscalledarequestedge
C)adirectededgefromaprocesstoaresourceiscalledarequestedge
D)Noneoftheabove
8.Acycleinaresourceallocationgraphis____.
A)anecessaryandsufficientconditionfordeadlockinthecasethateachresourcehasmorethan
oneinstance
B)anecessaryandsufficientconditionforadeadlockinthecasethateachresourcehasexactly
oneinstanceANS:B
C)asufficientconditionforadeadlockinthecasethateachresourcehasmorethanonce
instance
D)isneithernecessarynorsufficientforindicatingdeadlockinthecasethateachresourcehas
exactlyoneinstance
9.Tohandledeadlocks,operatingsystemsmostoften_____.
A)pretendthatdeadlocksneveroccur
B)useprotocolstopreventoravoiddeadlocksANS:A
C)detectandrecoverfromdeadlocks
D)Noneoftheabove
10.Whichofthefollowingstatementsistrue?
A)Asafestateisadeadlockedstate.ANS:D
B)Asafestatemayleadtoadeadlockedstate.
C)Anunsafestateisnecessarily,andbydefinition,alwaysadeadlockedstate.
D)Anunsafestatemayleadtoadeadlockedstate.
11.Supposethattherearetenresourcesavailabletothreeprocesses.Attime0,thefollowing
dataiscollected.Thetableindicatestheprocess,themaximumnumberofresourcesneededby
theprocess,andthenumberofresourcescurrentlyownedbyeachprocess.Whichofthe
followingcorrectlycharacterizesthisstate?ANS:B
Process

MaximumNeeds

CurrentlyOwned
P0
10
4
P1
3
1
P2
6
4
A)Itissafe.
B)Itisnotsafe.
C)Thestatecannotbedetermined.
D)Itisanimpossiblestate.
12.Supposethatthereare12resourcesavailabletothreeprocesses.Attime0,thefollowing
dataiscollected.Thetableindicatestheprocess,themaximumnumberofresourcesneededby
theprocess,andthenumberofresourcescurrentlyownedbyeachprocess.Whichofthe
followingcorrectlycharacterizesthisstate?ANS:A
Process

MaximumNeeds

CurrentlyOwned
P0
10
4

P1
3
P2
7
A)Itissafe.
B)Itisnotsafe.
C)Thestatecannotbedetermined.
D)Itisanimpossiblestate.

2
4

13.Whichofthefollowingdatastructuresinthebanker'salgorithmisavectoroflengthm,
wheremisthenumberofresourcetypes?
A)Need
ANS:D
B)Allocation
C)Max
D)Available
14.Assumetherearethreeresources,R1,R2,andR3,thatareeachassigneduniqueinteger
values15,10,and25,respectively.Whatisaresourceorderingwhichpreventsacircularwait?
A)R1,R2,R3
ANS:D
B)R3,R2,R1
C)R3,R1,R2
D)R2,R1,R3
15.A_____couldbepreemptedfromaprocess.
ANS:B
A)mutexlock
B)CPU
C)semaphore
D)filelock
16.Inavirtualmachine,eachprogrambelievesthatithas____.
ANS:B
A)multipleprocessors
B)itsownmemory
C)another"virtual"computertoassistinitsoperations
D)morememorythanisphysicallyavailableonthemachine
17._____isnotanexampleofabenefitofvirtualmachines.
A)Theabilitytorunseveraldifferentoperatingsystemsthatallsharethesamehardware
ANS:C
B)Theabilitytoconcurrentlyrunseveraldifferentoperatingsystems
C)Useslessphysicalmemorythananactualoperatingsystem
D)Protectsthehostsystemfromguestoperatingsystems
18._________allowsavirtualmachinetobehaveasifitisactinginkernelmode.
ANS:C
A)Paravirtualization
B)Livemigration
C)Trapandemulate

D)TheJavavirtualmachine
19.WhichofthefollowingstatementsregardingavirtualCPU(VCPU)isconsideredfalse?
ANS:C
A)TheVCPUdoesnotexecutecode.
B)ItrepresentsthestateofthephysicalCPU.
C)EachguestsharestheVCPU.
D)TheVCPUisfoundinmostvirtualizationoptions.
20._________allowsforvirtualizationonsystemsthatdonothaveacleanseparationbetween
privilegedandnonprivilegedinstructions.
ANS:A
A)Binarytranslation
B)Trapandemulate
C)Applicationcontainment
D)Paravirtualization
21.Whichofthefollowingstatementsregardingnestedpagetables(NPTs)isfalse?
ANS:C
A)Theyareusedtorepresenttheguest'spagetablestate.
B)NPTsareusedforbothtrapandemulateandbinarytranslation.
C)NPTsreducethenumberofTLBmisses.
D)EachguestoperatingsystemmaintainsitsownNPT.
22._________occurswhenavirtualmachineisconfiguredwithmorevirtualCPUsthanthere
arephysicalCPUs.
A)Containment
B)CPUscheduling
ANS:C
C)Overcommitment
D)Itisnotpossibletoconfigureavirtualmachinewithmoreprocessorsthanexistinthesystem.

23.VMMiscodedinFirmwarein.
A)Hypervisor1.
B)Hypervisor2.
C)Hypervisor0.
D)Noneofabove.
24.AVMMwhichrunsdirectlyonhatdwareinmostprivelagedmode.
A)type0Hypervisor.
B)type1Hypervisor.
C)type2Hypervisor.
D)Paravirtualization.

25.HostedhypervisorwhichrunsonahostOperatingSystemis.
A)type2Hypervisor.
B)type0Hypervisor.
C)type1Hypervisor.

D)Paravirtualization.

26.Formoreefficiency,thesourcecodeoftheguestOperatingSystemismodifiedin.
A)typee0Hypervisor.
B)type1Hypervisor.
C)Paravirtualization.
D)type2Hypervisor.

27.LocationofaMulticomputersystemgenerallycanbein.
A)SameRack
B)Sameroom.
C)Worldwide
D)Allofabove.

28.InaDistributedsystemsaregenerally.
A)Possiblydifferent.
B)Same.
C)Shared
D)Alloftheabove.

29.InaMultiprocessorsysteminternodecommunicationisgenerally.
A)Dedicatedinterconnect
B)Traditionalnetwork
C)SharedRAM.
D)Allofabove.

30.InaDistributedsystem,nodeperipheralsaregenerally.
A)Sharedexec.
B)Allshared.
C)Fullsetpernode.
D)Alloftheabove.

31.WhichisnotaproblemofaRemoteProcedureCall.
A)Passingpointerparameters.
B)MessagePassing.
C)Weeklytypedlanguages.
D)UseofGlobalvariables.

32.NoSwitchisusedinwhichofnodesinterconnectiontopologies.
A)Star.
B)Grid.
C)Cube.
D)Ring.

33.Inanaccessmatrix,the____rightallowsaprocesstochangetheentriesinarow.
ANS:C
A)owner
B)copy
C)control.

D)switch

34.The____implementationofanaccesstableconsistsofsetsoforderedtriples.
ANS:A
A)globaltable
B)accesslistforobjects
C)lockkeymechanism
D)capabilitylist
35.Incapabilitylists,eachobjecthasa____todenoteitstype.
ANS:B
A)gate
B)tag
C)key
D)lock

36.IfanAccessControlMatrixorProtectionMatrixisslicedbyrowsandtheblank
entriesarediscarded,wegetalistcalled.
A)ProtectionList.
B)AccessControlList.
C)CapabilityList.
D)Noneoftheabove.

37.IfanAccessControlMatrixorProtectionMatrixisslicedbycolumnsandtheblank
entriesarediscarded,wegetalistcalled.
A)ProtectionList.
B)AccessControlList.
C)CapabilityList.
D)Noneoftheabove.

38.Inpractice,actuallystoringofAccessControlMatrixorProtectionMatrixis
neverdonebecause.
A)Itisdense.
B)Itislargeandsparse.
C)Ithasnotenoughcells.
D)Noneoftheabove.

39.Themostcommonmethodusedbyattackerstobreachsecurityis____.
ANS:A
A)masquerading
B)messagemodification
C)sessionhijacking
D)phishing
40.Acodesegmentthatmisusesitsenvironmentiscalled____.
ANS:D
A)abackdoor
B)atrapdoor
C)aworm

D)aTrojanhorse
41.Worms____.
ANS:D
A)usethespawnmechanismtoravagesystemperformance
B)canshutdownanentirenetwork
C)continuetogrowastheInternetexpands
D)Alloftheabove
42.Adenialofserviceattackis____.
ANS:C
A)aimedatgaininginformation
B)aimedatstealingresources
C)aimedatdisruptinglegitimateuseofasystem
D)generallynotnetworkbased
43.Inapairedpasswordsystem,____.
ANS:B
A)theuserspecifiestwopasswords
B)thecomputersuppliesonepartofapasswordandtheuserenterstheotherpart
C)passwordsmustcontainequalamountsofnumbersanddigitspairedtogether
D)twousersmustentertheirownseparatepasswordtogainaccesstothesystem
44.A____viruschangeseachtimeitisinstalledtoavoiddetectionbyantivirussoftware.
ANS:A
A)polymorphic
B)tunneling
C)multipartite
D)stealth

45.A____isapublickeydigitallysignedbyatrustedparty.
ANS:B
A)keyring
B)digitalcertificate
C)messagedigest
D)digitalkey

Вам также может понравиться