Filters
Question type

Study Flashcards

Why might attackers use social engineering techniques to masquerade as support technicians?

Correct Answer

verifed

verified

Attackers might use social-engineering t...

View Answer

Which of the following is a software flaw that would cause the system to suddenly stop or fail when the clock struck midnight on the eve of the past millennium?


A) Conficker worm
B) Y2K
C) psyb0t
D) BIOS-based rootkit

Correct Answer

verifed

verified

Rootkits that pose the biggest threat to any OS are those that infect a device's ____.


A) firmware
B) testware
C) middleware
D) fireware

Correct Answer

verifed

verified

Disgruntled employees might install a(n) ____ in company computers' flash memory before they leave a company and later use it to gain access to the corporate network.


A) BIOS-based rootkit
B) embedded browser
C) unclassified kernel
D) patch

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -commercial RTOS used in Cisco's routers and Logitech universal remotes


A) Windows Embedded Standard
B) Green Hill Software
C) RTLinux
D) VxWorks
E) RTEMS
F) embedded operating system
G) Quebec
H) QNX
I) SCADA

Correct Answer

verifed

verified

The ____ Linux kernel was designed to offer the most flexibility and support for sophisticated features.


A) macrolithic
B) monolithic
C) bilithic
D) proprietary

Correct Answer

verifed

verified

One type of specialized embedded OS is a(n) ____, typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.


A) RTOS
B) VoP
C) MILS
D) SCADA

Correct Answer

verifed

verified

A(n) ____ operating system can be a small program developed specifically for use with embedded systems, or it can be a stripped-down version of an OS commonly used on general-purpose computers.


A) multi-threaded
B) embedded
C) GUI
D) SMP

Correct Answer

verifed

verified

What types of systems use VxWorks?

Correct Answer

verifed

verified

Systems using VxWorks include:
-Clementi...

View Answer

An embedded OS certified to run multiple levels of classification (such as unclassified, secret, and top secret) on the same CPU without leakage between levels is called ____.


A) MILS
B) RTOS
C) GUI
D) DOS

Correct Answer

verifed

verified

Attackers cannot map an entire network from a single router.

Correct Answer

verifed

verified

False

What principle can be used to help reduce insider threats to an organization?

Correct Answer

verifed

verified

System administrators,network managers,a...

View Answer

What types of embedded systems are found in a typical corporate building?

Correct Answer

verifed

verified

With just a cursory survey of a typical corporate building,you can find many embedded systems,including firewalls,switches,routers,Web-filtering appliances,network attached storage (NAS)devices,networked power switches,printers,scanners,copy machines,video projectors,uninterruptible power supply (UPS)consoles,Voice over IP (VoIP)phone and voicemail systems,thermostats,HVAC systems,fire suppression systems,closed-circuit TV systems,elevator management systems,video teleconferencing workstations and consoles,and intercom systems.

MATCHING Match each term with the correct statement below. -newest version of Windows Embedded Standard


A) Windows Embedded Standard
B) Green Hill Software
C) RTLinux
D) VxWorks
E) RTEMS
F) embedded operating system
G) Quebec
H) QNX
I) SCADA

Correct Answer

verifed

verified

G

Windows Embedded Standard is essentially Windows CE on a diet.

Correct Answer

verifed

verified

Software residing on a chip is commonly referred to as ____.


A) middleware
B) testware
C) firmware
D) microware

Correct Answer

verifed

verified

Many viruses, worms, Trojans, and other attack vectors take advantage of ____code.


A) shortened
B) shared
C) modified
D) cache

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -widely used embedded OS developed by Wind River Systems


A) Windows Embedded Standard
B) Green Hill Software
C) RTLinux
D) VxWorks
E) RTEMS
F) embedded operating system
G) Quebec
H) QNX
I) SCADA

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -an operating system that runs in an embedded system


A) Windows Embedded Standard
B) Green Hill Software
C) RTLinux
D) VxWorks
E) RTEMS
F) embedded operating system
G) Quebec
H) QNX
I) SCADA

Correct Answer

verifed

verified

For sensitive embedded systems that need only a fraction of the features offered by other kernels, the risk of vulnerabilities might outweigh the benefits, and a(n) ____ kernel might be most suitable.


A) micro
B) proprietary
C) monolithic
D) macro

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer