Waiting processes do consume various system resources. Could someone sabotage a system by repeatedly creating processes and making them wait for events that will never happen?
What will be an ideal response?
This depends on the system architecture. Certainly creating a large number of processes that do almost anything could potentially bring down a system.
Computer Science & Information Technology
You might also like to view...
A ________ can either be a desktop PC, a notebook, a netbook, a workstation, or a terminal.
a. client b. mainframe c. supercomputer d. minicomputer
Computer Science & Information Technology
Which of the following is the description of a land attack?
A. the local host source address occurs in the packet B. source and destination IP address/port are the same C. an illegal TCP flag is found in the segment header D. the attacker uses an undefined protocol number
Computer Science & Information Technology