Professional Documents
Culture Documents
Multiple Choice
1. A deadlocked state occurs whenever ____.
A) a process is waiting for I/O to a device that does not exist
B) the system has no available free resources
C) every process in a set is waiting for an event that can only be caused by
another process in the set
D) a process is unable to release its request for a resource after use
2. One necessary condition for deadlock is ____, which states that at least one
resource must be held in a nonsharable mode.
A) hold and wait
B) mutual exclusion
C) circular wait
D) no preemption
3. One necessary condition for deadlock is ______, which states that a process
must be holding one resource and waiting to acquire additional resources.
A) hold and wait
B) mutual exclusion
C) circular wait
D) no preemption
4. One necessary condition for deadlock is ______, which states that a resource
can be released only voluntarily by the process holding the resource.
A) hold and wait
B) mutual exclusion
C) circular wait
D) no preemption
5. One necessary condition for deadlock is ______, which states that there is a
chain of waiting processes whereby P0 is waiting for a resource held by P1, P1 is
waiting for a resource held by P2, and Pn is waiting for a resource held by P0.
A) hold and wait
B) mutual exclusion
C) circular wait
D) no preemption
6. The witness software product is a ____.
A) lock-order verifier that uses mutual-exclusion locks to protect critical sections
B) modeler to develop resource allocation graphs
C) driver that can be used to prevent mutual exclusion for nonsharable resources
D) implementation of the banker's algorithm available for most operating
systems
7.
A)
B)
C)
D)
B) Live migration
C) Trap-and-emulate
D) The Java virtual machine
19. Which of the following statements regarding a virtual CPU (VCPU) is
considered false?
A) The VCPU does not execute code.
B) It represents the state of the physical CPU.
C) Each guest shares the VCPU.
D) The VCPU is found in most virtualization options.
20. _________ allows for virtualization on systems that do not have a clean
separation between privileged and non-privileged instructions.
A) Binary translation
B) Trap-and-emulate
C) Application containment
D) Paravirtualization
21. Which of the following statements regarding nested page tables (NPTs) is
false?
A) They are used to represent the guest's page table state.
B) NPTs are used for both trap-and-emulate and binary translation.
C) NPTs reduce the number of TLB misses.
D) Each guest operating system maintains its own NPT.
22. _________ occurs when a virtual machine is configured with more virtual CPUs
than there are physical CPUs.
A) Containment
B) CPU scheduling
C) Overcommitment
D) It is not possible to configure a virtual machine with more processors than exist
in the system.
23. VMM is coded in Firmware in ----------.
A) Hypervisor 1.
B) Hypervisor 2.
C) Hypervisor 0.
D) None of above.
24. A VMM which runs directly on hatdware in most privelaged mode ------.
A) type 0 Hypervisor.
B) type 1 Hypervisor.
C) type 2 Hypervisor.
D) Paravirtualization.
25. Hosted hypervisor which runs on a host Operating System is ---------.
A) type 2 Hypervisor.
B) type 0 Hypervisor.
C) type 1 Hypervisor.
D) Paravirtualization.
26. For more efficiency, the source code of the guest Operating System is modified in ---------.
A) typee 0 Hypervisor.
B) type 1 Hypervisor.
C) Paravirtualization.
D) type 2 Hypervisor.
27. Location of a Multicomputer system generally can be in ----------.
A) Same Rack
B) Same room.
C) Worldwide
D) All of above.
28.
29.
30.
C) control.
D) switch
34. The ____ implementation of an access table consists of sets of ordered triples.
A) global table
B) access list for objects
C) lock-key mechanism
D) capability list
35. In capability lists, each object has a ____ to denote its type.
A) gate
B) tag
C) key
D) lock
36. If an Access Control Matrix or Protection Matrix is sliced by rows and the blank
entries are discarded, we get a list called --------.
A) Protection List.
B) Access Control List.
C) Capability List.
D) None of the above.
37. If an Access Control Matrix or Protection Matrix is sliced by columns and the blank
entries are discarded, we get a list called --------.
A) Protection List.
B) Access Control List.
C) Capability List.
D) None of the above.
38. In practice, actually storing of Access Control Matrix or Protection Matrix is
never done because ---------.
A) It is dense.
B) It is large and sparse.
C) It has not enough cells.
D) None of the above.
39. The most common method used by attackers to breach security is ____.
A) masquerading
B) message modification
C) session hijacking
D) phishing
40. A code segment that misuses its environment is called ____.
A) a backdoor
B) a trap door
C) a worm
D) a Trojan horse
41. Worms ____.
A)
B)
C)
D)