《操作系统概念》

作者:【美】西尔伯查茨 等  出版社:高等教育出版社

题目 题型
Buffer-overflow attacks can be avoided by adopting a better programming methodology or by using special hardware support.Discu 问答
A password may become known to other users in a variety of ways.Is there a simple method for detecting that such an event has 问答
The list of all passwords is kept within the operating system.Thus, if a user manages to read this list,password protection is 问答
What is the purpose of using a"salt" along with the user-provided password? Where should the"salt" be stor 问答
An experimental addition to UNIX allows a user to connect a watch-dog program to a file.The watchdog is invoked whenever a pro 问答
The UNIX program COPS scans a given system for possible security holes and alerts the user to possible problems.What are two p 问答
Discuss a means by w hich managers of systems connected to the Internet could have designed their systems to limit or eliminat 问答
Argue for or against the judical sentenc handed down against Robert Morris,Jr,for his creation and execution of the Intemet wo 问答
Make a list of six security concerns for a bank's computer system.For each item on your list,state whether this concern relate 问答
what are two advantages of encrypting data stored in the computer system ? 问答
What commonly used computer programs are prone to man-in-the-middle attacks? Discuss solutions for preventing this form of att 问答
Compare symmetric and asymmetric encryption schemes,and discuss under what circumstances a distributed system would use one or 问答
Why doesn't D(kₐ,N)(E (kₑ,N)(m)) provide authentication of the sender? To what uses can such an encryption be put? 问答
Discuss how the asymmetric encryption algorithm can be used to achieve the following goals. a.Authentication: receiver k 问答
Consider a system that generates 10 million audit records per day.Also assume that there are on average 10 attacks per day on 问答