Exam 9: Embedded Operating Systems: the Hidden Threat
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Explain the BIOS-level rootkit SubVirt that was co-developed by Microsoft and the University of Michigan?
(Essay)
4.8/5
(27)
Why is it critical to protect SCADA systems from all types of unauthorized attacks?
(Essay)
4.8/5
(36)
Match each item with a statement below.
-In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality
(Multiple Choice)
4.8/5
(36)
Match each item with a statement below.
-Any computer system that is not a general-purpose PC or server
(Multiple Choice)
4.8/5
(41)
SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?
(Multiple Choice)
4.9/5
(35)
Match each item with a statement below.
-A specialized embedded OS used in devices such as programmable thermostats,appliance controls,and even spacecraft
(Multiple Choice)
4.9/5
(36)
Match each item with a statement below.
-Systems used for equipment monitoring in large industries,such as public works and utilities,power generators and dams
(Multiple Choice)
4.8/5
(36)
Match each item with a statement below.
-Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005
(Multiple Choice)
5.0/5
(29)
Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?
(Multiple Choice)
4.8/5
(32)
When using the Common Internet File System (CIFS),which security model does not require a password to be set for the file share?
(Multiple Choice)
4.7/5
(32)
What principle can be used to help reduce insider threats to an organization?
(Essay)
4.9/5
(29)
Match each item with a statement below.
-An OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users
(Multiple Choice)
4.8/5
(42)
Match each item with a statement below.
-A small program developed specifically for use with embedded systems
(Multiple Choice)
4.8/5
(28)
Match each item with a statement below.
-A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network
(Multiple Choice)
4.8/5
(20)
Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack?
(Multiple Choice)
4.9/5
(40)
Match each item with a statement below.
-A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP
(Multiple Choice)
4.8/5
(42)
What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?
(Multiple Choice)
4.9/5
(32)
Showing 21 - 40 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)