Questions from Operating Systems


Q: List and briefly define three classes of intruders.

List and briefly define three classes of intruders.

See Answer

Q: In general terms, what are four means of authenticating a user’s

In general terms, what are four means of authenticating a user’s identity?

See Answer

Q: Briefly describe the difference between DAC and RBAC.

Briefly describe the difference between DAC and RBAC.

See Answer

Q: What types of programming languages are vulnerable to buffer overflows?

What types of programming languages are vulnerable to buffer overflows?

See Answer

Q: What are the two broad categories of defenses against buffer overflows?

What are the two broad categories of defenses against buffer overflows?

See Answer

Q: List and briefly describe some of the defenses against buffer overflows that

List and briefly describe some of the defenses against buffer overflows that can be used when compiling new programs.

See Answer

Q: List and briefly describe some of the defenses against buffer overflows that

List and briefly describe some of the defenses against buffer overflows that can be implemented when running existing, vulnerable programs

See Answer

Q: A supplement to the X.25 packet-switching standard is

A supplement to the X.25 packet-switching standard is a set of standards for a packet assembler-disassembler (PAD), defined in standards X.3, X.28, and X.29. A PAD is used to connect asynchronous term...

See Answer

Q: What software comprises the TinyOS operating system?

What software comprises the TinyOS operating system?

See Answer

Q: What is the default scheduling discipline for TinyOS?

What is the default scheduling discipline for TinyOS?

See Answer