Exam 9: Embedded Operating Systems: The Hidden Threat
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
MATCHING
Match each term with the correct statement below.
-open-source Linux OS for embedded systems and an OS microkernel extensions
(Multiple Choice)
4.9/5
(42)
Originally, ____ were used to perform routing and switching.
(Multiple Choice)
4.9/5
(27)
Wind River produces an open-source Linux OS for embedded systems and an OS microkernel extension called ____.
(Multiple Choice)
4.9/5
(30)
Embedded systems include their own operating system, called a(n) "_________________________".
(Short Answer)
4.9/5
(29)
If a(n) ____ is compromised, attackers might be able to gain complete access to network resources.
(Multiple Choice)
4.8/5
(28)
MATCHING
Match each term with the correct statement below.
-slimmed down version of Windows XP
(Multiple Choice)
5.0/5
(37)
Both general-purpose and embedded OSs use drivers to interface with hardware devices.
(True/False)
4.8/5
(35)
OSs that use a(n) ____ sacrifice flexibility for simplicity and fewer hardware resources.
(Multiple Choice)
4.8/5
(40)
Embedded Linux is an example of a(n) ____ OS used in a multitude of industrial, medical, and consumer items.
(Multiple Choice)
4.8/5
(46)
A common vulnerability with routers and other networking devices is the _________________________ vulnerability.
(Short Answer)
4.8/5
(35)
A device that performs more than one function (e.g., printing and faxing) is called a(n) ____.
(Multiple Choice)
4.8/5
(35)
Explain the BIOS-level rootkit, called SubVirt, developed by Microsoft and the University of Michigan.
(Essay)
4.8/5
(36)
MATCHING
Match each term with the correct statement below.
-used for equipment monitoring in large industries
(Multiple Choice)
5.0/5
(36)
Firmware rootkits are hard to detect because the code for firmware often isn't checked for possible corruption.
(True/False)
4.9/5
(35)
The ____ worm spread by exploiting outdated or poorly configured router OSs that contained easy-to-guess passwords.
(Multiple Choice)
4.8/5
(33)
One reason that some vendors of embedded OSs are using ____ software more is that the cost of developing and patching an OS is shared by the entire community.
(Multiple Choice)
5.0/5
(40)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)