adplus-dvertising
frame-decoration

Question

The instruction that loads a selector which refers to a local descriptor table, containing the base address and limit for LDT is

a.

LGT

b.

GDT

c.

LGDT

d.

LLDT

Answer: (d).LLDT

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The instruction that loads a selector which refers to a local descriptor table, containing the base address and limit for LDT is

Similar Questions

Discover Related MCQs

Q. The descriptor that is used to store task gates, interrupt gates and trap gates is

Q. The number of interrupt descriptors that the interrupt descriptor table (IDT) handles is

Q. The number of bytes required for an interrupt in an IDT is

Q. By using privilege mechanism the protection from unauthorized accesses is done to

Q. The task privilege level at the instant of execution is called

Q. Once the CPL is selected, it can be changed by

Q. The data segments defined in GDT (global descriptor table) and the LDT (local descriptor table) can be accessed by a task with

Q. A task with privilege level 0, doesn’t refer to all the lower level privilege descriptors in

Q. The selector RPL that uses a less trusted privilege than the current privilege level for further use is known as

Q. The effective privilege level is

Q. The task requesting an access to a descriptor is allowed to access after checking the

Q. A CALL instruction can reference only a code segment descriptor with

Q. The RPL of a selector that referred to the code descriptor must have

Q. The instruction that refers to only code segment descriptors with DPL equal to or less than the task CPL is

Q. When a JUMP instruction references a Task State Segment(TSS) descriptor, then DPL must be

Q. The data segment access refers to

Q. An exception is generated when

Q. The mechanism to provide protection, that is accomplished with the help of read/write privileges is

Q. The Local descriptor table (LDT) and Global descriptor table (GDT) are present in

Q. The mechanism that is accomplished using descriptor usages limitations and rules of privilege check is