adplus-dvertising
frame-decoration

Question

The descriptor that is used to store task gates, interrupt gates and trap gates is

a.

system descriptor table

b.

gate descriptor table

c.

interrupt descriptor table

d.

none of the mentioned

Answer: (c).interrupt descriptor table

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The descriptor that is used to store task gates, interrupt gates and trap gates is

Similar Questions

Discover Related MCQs

Q. The number of interrupt descriptors that the interrupt descriptor table (IDT) handles is

Q. The number of bytes required for an interrupt in an IDT is

Q. By using privilege mechanism the protection from unauthorized accesses is done to

Q. The task privilege level at the instant of execution is called

Q. Once the CPL is selected, it can be changed by

Q. The data segments defined in GDT (global descriptor table) and the LDT (local descriptor table) can be accessed by a task with

Q. A task with privilege level 0, doesn’t refer to all the lower level privilege descriptors in

Q. The selector RPL that uses a less trusted privilege than the current privilege level for further use is known as

Q. The effective privilege level is

Q. The task requesting an access to a descriptor is allowed to access after checking the

Q. A CALL instruction can reference only a code segment descriptor with

Q. The RPL of a selector that referred to the code descriptor must have

Q. The instruction that refers to only code segment descriptors with DPL equal to or less than the task CPL is

Q. When a JUMP instruction references a Task State Segment(TSS) descriptor, then DPL must be

Q. The data segment access refers to

Q. An exception is generated when

Q. The mechanism to provide protection, that is accomplished with the help of read/write privileges is

Q. The Local descriptor table (LDT) and Global descriptor table (GDT) are present in

Q. The mechanism that is accomplished using descriptor usages limitations and rules of privilege check is

Q. The mechanism that is executed at certain privilege levels, determined by CPL (Current Privilege Level) and I/O privilege level (IOPL) is