Chapter 9 Flashcards
Which of the following can be a small program developed specifically for use with embedded systems, or a stripped-down version of an OS commonly used on general-purpose computers?
embedded OS
The lack of a familiar interface, such as CD/DVD-ROM drives, contributes to the difficulty of updating embedded OSs. True or False?
True
A device that performs more than one function, such as printing and faxing is called which of the following?
MFD
What type of embedded OS is certified to run multiple levels of classification; such as unclassified, secret, and top secret, on the same CPU without leakage between levels?
MILS
Most printers now have only TCP/IP enabled and don’t allow default administrator passwords, so they’re inherently more secure. True or False?
False
Multifunction devices (MFDs) are rarely which of the following?
Scanned for vulnerabilities
Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have.
True
Originally, which of the following was used to perform routing and switching before specialized hardware was developed?
general purpose computers
One reason that some vendors of embedded OSs are using open-source software more is that the cost of developing and patching an OS is shared by the entire open-source community. True or False?
True
Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?
router
Why are embedded OSs more likely to have unpatched security vulnerabilities than general-purpose OSs do? (Choose all that apply.)
Manufacturers prefer that you upgrade the system rather than the embedded OS.
Devices with embedded OSs typically can’t have any downtime for installing
patches.
Many security checks are omitted during development to reduce the code size.
SCADA systems controlling critical infrastructure are usually separated from the Internet by which of the following?
air gap
air gap
RTLinux
Some vendors of embedded OSs are using which of the following types of software, so the cost of developing and patching an OS is shared by the entire community?
open-source
Cell phone vulnerabilities make it possible for attackers to do which of the following? (Choose all that apply.)
Clone your phone to make illegal long-distance phone calls.
Listen to your phone conversations.
Use your phone as a microphone to eavesdrop on meetings or private conversations.