阿摩線上測驗
登入
首頁
>
中山◆資工◆作業系統
>
108年 - 108 國立中山大學_碩士班招生考試_資工系(資安):作業系統#105763
>
題組內容
5. [Security: ]
(1) How to launch an attack of stack and buffer overflow?
其他申論題
(1) Explain how the deadlock prevention scheme works.
#450207
(2) Give three requirements for any solution to the critical-section problem.
#450208
(3) What is the priority inversion problem? How to solve it?
#450209
(4) What is conflict serializable for a non-serial schedule?
#450210
(2) Explain the two major types of symmetric encryption.
#450212
(3) Explain how the RSA algorithm works.
#450213
(4) How does the digital-signature algorithm work?
#450214
(5) What is an interrupt war caused by tunneling viruses?
#450215
(I) Given a prefix expression " *+ + (18)x(17)(16) x+x(15)(14) (13) (12)", convert it to an infix expression and calculate the result.
#450216
(2)What is simpl le uniforn rm hash shing? Given a a hash table with m slots that stores n elements, what is the expected time spent by a failed search if hash collisions a ions are solved by chaining?
#450217