Propuneri subiecte examen

AP: Lecture 01 - Booting

How is the keyboard interrupt treated in a PC architecture? a. synchronous by the kernel and the apps b. synchronous by the kernel, async by the apps c. asynchronous

Explain your choice.

AP: Lecture 02 - Fast Userspace Mutex

How is the implementation of Fast Userspace Mutex using the mechanisms provided by the virtual memory system?

AP: Lecture 03 - Read-Copy-Update

What kind of problems does Read-Copy-Update solve and how?

AP: Lecture 04 - Locking vs. Transactional Memory

Describe a method to prevent deadlocking.

AP: Lecture 05 - Exploiting Concurrency Vulnerabilities in System Call Wrappers

Given a System Call Wrapper security mechanism, is it easier to exploit it on a single processor machine or on a dual processor one? Why and how can the exploit be written?

LG: Lecture 06 - User-mode Linux

Explain what happens when executing the following C code in a process inside a UserModeLinux virtual machine: …
fprintf(File, “Operating Systems Practical”); …

R: The tracing thread is intercepting and redirecting the process system call (write) into the virtual kernel.

LG: Lecture 07 - Xen and the Art of Virtualization

What Xen module can be used to prevent attempts to connect to a Xen virtual machine on a specific port?

R: Xen provides a VRF in which each domain has one or more VIFs. Each VIF has 2 I/O rings for transmit and receive. Each direction has a list of associated rules (<pattern>, <action>). Domain0 is responsible for inserting and removing rules.

MB: Lecture 08 - Energy Management for Hypervisor-Based Virtual Machines

For a hypervisor in an energy-managed system, identify one of its features that is relevant for designing a host-level energy manager. Describe how the host-level energy manger can benefit from this feature.

LG: Lecture 09 - TCP & CRC Checksum

Describe a scenario in which an end-host software error in the TCP segment would be generated.

R: ACK-of-FIN, Bad LF in CR/LF, Bad Hosts, or others

MB: Lecture 10 - Pointer Tainting

Which tainting mechanism(s) should be used for tracking down the effects of a malicious change of variable “p” in the following piece of code: int get_destination(int *p) { index = *p; x = locations[index]; return x; }

MB: Lecture 11 - RFS: Network File System for Mobile Devices

For a system with mobile devices accessing the same file-system simultaneously, which consistency model is best and why?

osp/internal/exam-proposal.txt · Last modified: 2015/09/26 12:42 (external edit)
CC Attribution-Share Alike 3.0 Unported Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0