Waiting processes do consume various system resources. Could someone sabotage a system by repeatedly creating processes and making them wait for events that will never happen?

What will be an ideal response?

This depends on the system architecture. Certainly creating a large number of processes that do almost anything could potentially bring down a system.

Computer Science & Information Technology

You might also like to view...

A ________ can either be a desktop PC, a notebook, a netbook, a workstation, or a terminal.

a. client b. mainframe c. supercomputer d. minicomputer

Computer Science & Information Technology

Which of the following is the description of a land attack?

A. the local host source address occurs in the packet B. source and destination IP address/port are the same C. an illegal TCP flag is found in the segment header D. the attacker uses an undefined protocol number

Computer Science & Information Technology