Exam 9: Embedded Operating Systems: The Hidden Threat

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

MATCHING Match each term with the correct statement below. -open-source Linux OS for embedded systems and an OS microkernel extensions

(Multiple Choice)
4.9/5
(42)

Originally, ____ were used to perform routing and switching.

(Multiple Choice)
4.9/5
(27)

What did the botnet worm psyb0t (or the Network Bluepill) target?

(Essay)
4.8/5
(34)

Wind River produces an open-source Linux OS for embedded systems and an OS microkernel extension called ____.

(Multiple Choice)
4.9/5
(30)

Embedded systems include their own operating system, called a(n) "_________________________".

(Short Answer)
4.9/5
(29)

If a(n) ____ is compromised, attackers might be able to gain complete access to network resources.

(Multiple Choice)
4.8/5
(28)

MATCHING Match each term with the correct statement below. -slimmed down version of Windows XP

(Multiple Choice)
5.0/5
(37)

Both general-purpose and embedded OSs use drivers to interface with hardware devices.

(True/False)
4.8/5
(35)

OSs that use a(n) ____ sacrifice flexibility for simplicity and fewer hardware resources.

(Multiple Choice)
4.8/5
(40)

Why do many people dismiss the topic of embedded device security?

(Essay)
4.8/5
(35)

Embedded Linux is an example of a(n) ____ OS used in a multitude of industrial, medical, and consumer items.

(Multiple Choice)
4.8/5
(46)

A common vulnerability with routers and other networking devices is the _________________________ vulnerability.

(Short Answer)
4.8/5
(35)

A device that performs more than one function (e.g., printing and faxing) is called a(n) ____.

(Multiple Choice)
4.8/5
(35)

Explain the BIOS-level rootkit, called SubVirt, developed by Microsoft and the University of Michigan.

(Essay)
4.8/5
(36)

List at least four best practices for protecting embedded OSs.

(Essay)
4.8/5
(29)

MATCHING Match each term with the correct statement below. -used for equipment monitoring in large industries

(Multiple Choice)
5.0/5
(36)

A(n) ____ system may be used when automation is critical.

(Multiple Choice)
4.8/5
(30)

Firmware rootkits are hard to detect because the code for firmware often isn't checked for possible corruption.

(True/False)
4.9/5
(35)

The ____ worm spread by exploiting outdated or poorly configured router OSs that contained easy-to-guess passwords.

(Multiple Choice)
4.8/5
(33)

One reason that some vendors of embedded OSs are using ____ software more is that the cost of developing and patching an OS is shared by the entire community.

(Multiple Choice)
5.0/5
(40)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)