Exam 9: Embedded Operating Systems: The Hidden Threat

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

MATCHING Match each term with the correct statement below. -newest version of Windows Embedded Standard

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

G

What types of embedded systems are found in a typical corporate building?

Free
(Essay)
5.0/5
(44)
Correct Answer:
Verified

With just a cursory survey of a typical corporate building,you can find many embedded systems,including firewalls,switches,routers,Web-filtering appliances,network attached storage (NAS)devices,networked power switches,printers,scanners,copy machines,video projectors,uninterruptible power supply (UPS)consoles,Voice over IP (VoIP)phone and voicemail systems,thermostats,HVAC systems,fire suppression systems,closed-circuit TV systems,elevator management systems,video teleconferencing workstations and consoles,and intercom systems.

Attackers cannot map an entire network from a single router.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

False

One type of specialized embedded OS is a(n) ____, typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.

(Multiple Choice)
4.9/5
(38)

Windows Embedded Standard is essentially Windows CE on a diet.

(True/False)
4.7/5
(36)

For sensitive embedded systems that need only a fraction of the features offered by other kernels, the risk of vulnerabilities might outweigh the benefits, and a(n) ____ kernel might be most suitable.

(Multiple Choice)
4.9/5
(41)

Why might attackers use social engineering techniques to masquerade as support technicians?

(Essay)
4.8/5
(35)

MATCHING Match each term with the correct statement below. -commercial RTOS used in Cisco's routers and Logitech universal remotes

(Multiple Choice)
4.8/5
(37)

MATCHING Match each term with the correct statement below. -an operating system that runs in an embedded system

(Multiple Choice)
4.7/5
(35)

Many viruses, worms, Trojans, and other attack vectors take advantage of ____code.

(Multiple Choice)
4.8/5
(35)

What principle can be used to help reduce insider threats to an organization?

(Essay)
4.9/5
(40)

What types of systems use VxWorks?

(Essay)
4.9/5
(37)

Disgruntled employees might install a(n) ____ in company computers' flash memory before they leave a company and later use it to gain access to the corporate network.

(Multiple Choice)
4.8/5
(39)

Which of the following is a software flaw that would cause the system to suddenly stop or fail when the clock struck midnight on the eve of the past millennium?

(Multiple Choice)
4.9/5
(35)

The ____ Linux kernel was designed to offer the most flexibility and support for sophisticated features.

(Multiple Choice)
4.8/5
(35)

An embedded OS certified to run multiple levels of classification (such as unclassified, secret, and top secret) on the same CPU without leakage between levels is called ____.

(Multiple Choice)
4.9/5
(27)

MATCHING Match each term with the correct statement below. -widely used embedded OS developed by Wind River Systems

(Multiple Choice)
4.8/5
(32)

Software residing on a chip is commonly referred to as ____.

(Multiple Choice)
4.9/5
(28)

Rootkits that pose the biggest threat to any OS are those that infect a device's ____.

(Multiple Choice)
4.8/5
(34)

A(n) ____ operating system can be a small program developed specifically for use with embedded systems, or it can be a stripped-down version of an OS commonly used on general-purpose computers.

(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)