Exam 9: Embedded Operating Systems: The Hidden Threat
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
MATCHING
Match each term with the correct statement below.
-newest version of Windows Embedded Standard
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
G
What types of embedded systems are found in a typical corporate building?
Free
(Essay)
5.0/5
(44)
Correct Answer:
With just a cursory survey of a typical corporate building,you can find many embedded systems,including firewalls,switches,routers,Web-filtering appliances,network attached storage (NAS)devices,networked power switches,printers,scanners,copy machines,video projectors,uninterruptible power supply (UPS)consoles,Voice over IP (VoIP)phone and voicemail systems,thermostats,HVAC systems,fire suppression systems,closed-circuit TV systems,elevator management systems,video teleconferencing workstations and consoles,and intercom systems.
Attackers cannot map an entire network from a single router.
Free
(True/False)
4.8/5
(37)
Correct Answer:
False
One type of specialized embedded OS is a(n) ____, typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.
(Multiple Choice)
4.9/5
(38)
For sensitive embedded systems that need only a fraction of the features offered by other kernels, the risk of vulnerabilities might outweigh the benefits, and a(n) ____ kernel might be most suitable.
(Multiple Choice)
4.9/5
(41)
Why might attackers use social engineering techniques to masquerade as support technicians?
(Essay)
4.8/5
(35)
MATCHING
Match each term with the correct statement below.
-commercial RTOS used in Cisco's routers and Logitech universal remotes
(Multiple Choice)
4.8/5
(37)
MATCHING
Match each term with the correct statement below.
-an operating system that runs in an embedded system
(Multiple Choice)
4.7/5
(35)
Many viruses, worms, Trojans, and other attack vectors take advantage of ____code.
(Multiple Choice)
4.8/5
(35)
What principle can be used to help reduce insider threats to an organization?
(Essay)
4.9/5
(40)
Disgruntled employees might install a(n) ____ in company computers' flash memory before they leave a company and later use it to gain access to the corporate network.
(Multiple Choice)
4.8/5
(39)
Which of the following is a software flaw that would cause the system to suddenly stop or fail when the clock struck midnight on the eve of the past millennium?
(Multiple Choice)
4.9/5
(35)
The ____ Linux kernel was designed to offer the most flexibility and support for sophisticated features.
(Multiple Choice)
4.8/5
(35)
An embedded OS certified to run multiple levels of classification (such as unclassified, secret, and top secret) on the same CPU without leakage between levels is called ____.
(Multiple Choice)
4.9/5
(27)
MATCHING
Match each term with the correct statement below.
-widely used embedded OS developed by Wind River Systems
(Multiple Choice)
4.8/5
(32)
Software residing on a chip is commonly referred to as ____.
(Multiple Choice)
4.9/5
(28)
Rootkits that pose the biggest threat to any OS are those that infect a device's ____.
(Multiple Choice)
4.8/5
(34)
A(n) ____ operating system can be a small program developed specifically for use with embedded systems, or it can be a stripped-down version of an OS commonly used on general-purpose computers.
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)