Exam 9: Embedded Operating Systems: the Hidden Threat
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Match each item with a statement below.
-Amount of code a computer system exposes to unauthenticated outsiders
(Multiple Choice)
4.8/5
(34)
Match each item with a statement below.
-An interprocess communication mechanism that allows a program running on one host to run code on a remote host
(Multiple Choice)
4.8/5
(41)
Match each item with a statement below.
-An OS microkernel extension developed for Linux
(Multiple Choice)
4.9/5
(37)
Which of the following systems should be used when equipment monitoring and automation is critical?
(Multiple Choice)
4.8/5
(33)
A device that performs more than one function,such as printing and faxing is called which of the following?
(Multiple Choice)
4.8/5
(33)
What is the current file system that Windows utilizes that has strong security features?
(Multiple Choice)
4.8/5
(41)
Match each item with a statement below.
-Used to share files and usually runs on top of NetBIOS,NetBEUI,or TCP/IP
(Multiple Choice)
4.8/5
(27)
Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have.
(True/False)
4.9/5
(29)
Why are there problems with patching electronics such as heart rate monitors and MRI machines that run embedded Windows OSs?
(Essay)
4.7/5
(31)
What critical consumer product did the botnet worm psyb0t or the Network Bluepill target?
(Essay)
4.8/5
(27)
Match each item with a statement below.
-An embedded OS certified to run multiple levels of classification on the same CPU without leakage between levels
(Multiple Choice)
4.7/5
(41)
What types of embedded systems are found in a typical corporate building?
(Essay)
4.9/5
(35)
Why might attackers use social engineering techniques to masquerade as support technicians?
(Essay)
4.9/5
(37)
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users?
(Multiple Choice)
4.8/5
(21)
What is Server Message Block (SMB)used for in Windows and can a hacker still damage a network using SMB?
(Essay)
4.7/5
(20)
What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT)file system?
(Multiple Choice)
4.8/5
(38)
What programming languages are vulnerable to buffer overflow attacks?
(Multiple Choice)
4.8/5
(30)
Showing 41 - 59 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)