Exam 9: Embedded Operating Systems: the Hidden Threat

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Match each item with a statement below. -Amount of code a computer system exposes to unauthenticated outsiders

(Multiple Choice)
4.8/5
(34)

Match each item with a statement below. -An interprocess communication mechanism that allows a program running on one host to run code on a remote host

(Multiple Choice)
4.8/5
(41)

Match each item with a statement below. -An OS microkernel extension developed for Linux

(Multiple Choice)
4.9/5
(37)

Which of the following systems should be used when equipment monitoring and automation is critical?

(Multiple Choice)
4.8/5
(33)

A device that performs more than one function,such as printing and faxing is called which of the following?

(Multiple Choice)
4.8/5
(33)

Why is NetBIOS still used in Windows Operating Systems?

(Essay)
4.7/5
(31)

What is the current file system that Windows utilizes that has strong security features?

(Multiple Choice)
4.8/5
(41)

Match each item with a statement below. -Used to share files and usually runs on top of NetBIOS,NetBEUI,or TCP/IP

(Multiple Choice)
4.8/5
(27)

Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have.

(True/False)
4.9/5
(29)

Why are there problems with patching electronics such as heart rate monitors and MRI machines that run embedded Windows OSs?

(Essay)
4.7/5
(31)

What critical consumer product did the botnet worm psyb0t or the Network Bluepill target?

(Essay)
4.8/5
(27)

Match each item with a statement below. -An embedded OS certified to run multiple levels of classification on the same CPU without leakage between levels

(Multiple Choice)
4.7/5
(41)

What types of embedded systems are found in a typical corporate building?

(Essay)
4.9/5
(35)

Why might attackers use social engineering techniques to masquerade as support technicians?

(Essay)
4.9/5
(37)

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users?

(Multiple Choice)
4.8/5
(21)

What is Server Message Block (SMB)used for in Windows and can a hacker still damage a network using SMB?

(Essay)
4.7/5
(20)

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT)file system?

(Multiple Choice)
4.8/5
(38)

What functions do most Trojan programs perform?

(Essay)
4.9/5
(40)

What programming languages are vulnerable to buffer overflow attacks?

(Multiple Choice)
4.8/5
(30)
Showing 41 - 59 of 59
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)