|
|
|
Modern Operating Systems by Herbert Bos and Andrew S. Tanenb...
Modern_Operating_Systems_by_Herbert_Bos_and_Andrew_S._Tanenbaum_4th_Ed.pdf
Showing 1010 out of 1137
Modern Operating Systems by Herbert Bos and Andrew...
Modern_Operating_Systems_by_Herbert_Bos_and_Andrew_S._Tanenbaum_4th_Ed.pdf-M ODERN O PERATING S YSTEMS
Modern Operating Systems by Herbert...
Modern_Operating_Systems_by_Herbert_Bos_and_Andrew_S._Tanenbaum_4th_Ed.pdf-M ODERN O PERATING S YSTEMS
Page 1010
CHAP. 11
PROBLEMS
979
Give an example of how Windows might do something similar using
NtCreateProcess
.
(
Hint
: Consider processes that host DLLs to implement functionality provided by a
third party).
31.
A file has the following mapping.
Give the MFT run entries.
Offset
0
1
2
3
4
5
6
7
8
9
10
Disk address
50 51 52 22 24 25 26 53 54
-
60
32.
Consider the MFT record of Fig. 11-41. Suppose that the file grew and a 10th block
was assigned to the end of the file. The number of this block is 66.
What would the
MFT record look like now?
33.
In Fig. 11-44(b), the first two runs are each of length 8 blocks.
Is it just an accident
that they are equal, or does this have to do with the way compression works? Explain
your answer.
34.
Suppose that you wanted to build Windows Lite.
Which of the fields of Fig. 11-45
could be removed without weakening the security of the system?
35.
The mitigation strategy for improving security despite the continuing presence of vul-
nerabilities has been very successful. Modern attacks are very sophisticated, often re-
quiring the presence of multiple vulnerabilities to build a reliable exploit. One of the
vulnerabilities that is usually required is an
information leak
.
Explain how an infor-
mation leak can be used to defeat address-space randomization in order to launch an
attack based on return-oriented programming.
36.
An extension model used by many programs (Web browsers, Office, COM servers)
involves
hosting
DLLs to hook and extend their underlying functionality.
Is this a rea-
sonable model for an RPC-based service to use as long as it is careful to impersonate
clients before loading the DLL?
Why not?
37.
When running on a NUMA machine, whenever the Windows memory manager needs
to allocate a physical page to handle a page fault it attempts to use a page from the
NUMA node for the current thread’s ideal processor.
Why?
What if the thread is cur-
rently running on a different processor?
38.
Give a couple of examples where an application might be able to recover easily from a
backup based on a volume shadow copy rather the state of the disk after a system
crash.
39.
In Sec. 11.10, providing new memory to the process heap was mentioned as one of the
scenarios that require a supply of zeroed pages in order to satisfy security re-
quirements. Give one or more other examples of virtual memory operations that re-
quire zeroed pages.
40.
Windows contains a hypervisor which allows multiple operating systems to run simul-
taneously.
This is available on clients, but is far more important in cloud computing.
When a security update is applied to a guest operating system, it is not much different
than patching a server.
However, when a security update is applied to the root operat-
ing system, this can be a big problem for the users of cloud computing.
What is the
nature of the problem?
What can be done about it?
Ace your assessments! Get Better Grades
Browse thousands of Study Materials & Solutions from your Favorite Schools
Concordia University
Concordia_University
School:
Operating_Systems
Course:
Introducing Study Plan
Using AI Tools to Help you understand and remember your course concepts better and faster than any other resource.
Find the best videos to learn every concept in that course from Youtube and Tiktok without searching.
Save All Relavent Videos & Materials and access anytime and anywhere
Prepare Smart and Guarantee better grades
Students also viewed documents
lab 18.docx
lab_18.docx
Course
Course
3
Module5QuizSTA2023.d...
Module5QuizSTA2023.docx.docx
Course
Course
10
Week 7 Test Math302....
Week_7_Test_Math302.docx.docx
Course
Course
30
Chapter 1 Assigment ...
Chapter_1_Assigment_Questions.docx.docx
Course
Course
5
Week 4 tests.docx.do...
Week_4_tests.docx.docx
Course
Course
23
Week 6 tests.docx.do...
Week_6_tests.docx.docx
Course
Course
106