Exam 9: Embedded Operating Systems: the Hidden Threat

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Why should a systems administrator disable unused services and filtering ports?

Free
(Essay)
4.8/5
(37)
Correct Answer:
Verified

Disabling unneeded services and deleting unnecessary applications or scripts make sense because they give intruders a potential point of entry into a network.If you have a Windows Server 2016 system acting as a file server,you certainly don't need DNS services running on it; doing so leaves port 53 TCP/UDP open and vulnerable to attack.Open only what needs to be open,and close everything else.

What is Samba used for?

Free
(Essay)
4.8/5
(33)
Correct Answer:
Verified

Samba is an open-source implementation of CIFS; with Samba,*nix servers can share resources with Windows clients,and Windows clients can access a *nix resource without realizing that the resource is on a *nix computer.Samba has been ported to non-*nix systems,too,including OpenVMS,NetWare,and AmigaOS.Samba is very useful because many companies have a mixed environment of Windows and *nix systems.

What is the Common Internet File System (CIFS)protocol?

Free
(Essay)
4.7/5
(32)
Correct Answer:
Verified

Common Internet File System (CIFS)is a standardized protocol that replaced SMB in Windows 2000 Server and later,but to allow backward compatibility,the original SMB is still used.CIFS is a remote file system protocol that enables computers to share network resources over the Internet.In other words,files,folders,printers,and other resources can be made available to users throughout a network.For sharing to occur,there must be an infrastructure that allows placing these resources on the network and a method to control access to resources.

What is the purpose of a file system?

(Essay)
4.8/5
(37)

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

(Multiple Choice)
4.9/5
(38)

Match each item with a statement below. -A standardized protocol that replaced SMB in Windows 2000 Server and later

(Multiple Choice)
4.8/5
(32)

Match each item with a statement below. -A cryptographic firmware boot-check processor installed on many new computer systems

(Multiple Choice)
4.8/5
(27)

Match each item with a statement below. -Devices on an organization's network performing more than one function,such as printers,scanners,and copiers

(Multiple Choice)
4.8/5
(25)

What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android,Windows Mobile,and the Apple iPhone OS?

(Multiple Choice)
4.8/5
(34)

Which of the following is a common Linux rootkit?

(Multiple Choice)
4.8/5
(43)

Match each item with a statement below. -An open-source embedded OS used in space systems because it supports processors designed specifically to operate in space

(Multiple Choice)
4.9/5
(38)

When using the Common Internet File System (CIFS),which security model will require network users to have a user name and password to access a specific resource?

(Multiple Choice)
4.7/5
(37)

Which one of the following,if compromised might allow attackers the ability to gain complete access to network resources?

(Multiple Choice)
4.8/5
(38)

List at least four best practices for protecting embedded OSs.

(Essay)
4.9/5
(40)

Which of the following is considered to be the most critical SQL vulnerability?

(Multiple Choice)
4.7/5
(32)

In Windows Server 2003 and 2008,how does a domain controller locate resources in a domain?

(Essay)
4.8/5
(27)

Match each item with a statement below. -An open-source implementation of CIFS

(Multiple Choice)
4.8/5
(43)

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

(Multiple Choice)
4.7/5
(30)

Why should you review logs regularly,and how should you manage this task?

(Essay)
4.8/5
(29)

Match each item with a statement below. -Software residing on a chip

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 59
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)