Exam 9: Embedded Operating Systems: the Hidden Threat

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Explain the BIOS-level rootkit SubVirt that was co-developed by Microsoft and the University of Michigan?

(Essay)
4.8/5
(27)

Why is it critical to protect SCADA systems from all types of unauthorized attacks?

(Essay)
4.8/5
(36)

Match each item with a statement below. -In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality

(Multiple Choice)
4.8/5
(36)

What should a password policy include?

(Essay)
4.9/5
(38)

Match each item with a statement below. -Any computer system that is not a general-purpose PC or server

(Multiple Choice)
4.8/5
(41)

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

(Multiple Choice)
4.9/5
(35)

Match each item with a statement below. -A specialized embedded OS used in devices such as programmable thermostats,appliance controls,and even spacecraft

(Multiple Choice)
4.9/5
(36)

Match each item with a statement below. -Systems used for equipment monitoring in large industries,such as public works and utilities,power generators and dams

(Multiple Choice)
4.8/5
(36)

Match each item with a statement below. -Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005

(Multiple Choice)
5.0/5
(29)

Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

(Multiple Choice)
4.8/5
(32)

When using the Common Internet File System (CIFS),which security model does not require a password to be set for the file share?

(Multiple Choice)
4.7/5
(32)

What principle can be used to help reduce insider threats to an organization?

(Essay)
4.9/5
(29)

Match each item with a statement below. -An OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users

(Multiple Choice)
4.8/5
(42)

Match each item with a statement below. -A small program developed specifically for use with embedded systems

(Multiple Choice)
4.8/5
(28)

Match each item with a statement below. -A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network

(Multiple Choice)
4.8/5
(20)

Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack?

(Multiple Choice)
4.9/5
(40)

Match each item with a statement below. -A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP

(Multiple Choice)
4.8/5
(42)

What types of specific systems use VxWorks embedded real-time OS?

(Essay)
4.9/5
(37)

Why do many people dismiss the topic of embedded device security?

(Essay)
4.8/5
(31)

What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?

(Multiple Choice)
4.9/5
(32)
Showing 21 - 40 of 59
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)