Chapter 9 Flashcards

1
Q

Which of the following can be a small program developed specifically for use with embedded systems, or a stripped-down version of an OS commonly used on general-purpose computers?

A

embedded OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The lack of a familiar interface, such as CD/DVD-ROM drives, contributes to the difficulty of updating embedded OSs. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A device that performs more than one function, such as printing and faxing is called which of the following?

A

MFD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of embedded OS is certified to run multiple levels of classification; such as unclassified, secret, and top secret, on the same CPU without leakage between levels?

A

MILS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most printers now have only TCP/IP enabled and don’t allow default administrator passwords, so they’re inherently more secure. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multifunction devices (MFDs) are rarely which of the following?

A

Scanned for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Originally, which of the following was used to perform routing and switching before specialized hardware was developed?

A

general purpose computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One reason that some vendors of embedded OSs are using open-source software more is that the cost of developing and patching an OS is shared by the entire open-source community. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are embedded OSs more likely to have unpatched security vulnerabilities than general-purpose OSs do? (Choose all that apply.)

A

Manufacturers prefer that you upgrade the system rather than the embedded OS.

Devices with embedded OSs typically can’t have any downtime for installing
patches.

Many security checks are omitted during development to reduce the code size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SCADA systems controlling critical infrastructure are usually separated from the Internet by which of the following?

A

air gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

air gap

A

RTLinux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Some vendors of embedded OSs are using which of the following types of software, so the cost of developing and patching an OS is shared by the entire community?

A

open-source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cell phone vulnerabilities make it possible for attackers to do which of the following? (Choose all that apply.)

A

Clone your phone to make illegal long-distance phone calls.
Listen to your phone conversations.
Use your phone as a microphone to eavesdrop on meetings or private conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A common vulnerability of routers and other network devices with built-in Web management interfaces is which of the following?

A

authentication vulnerability

17
Q

*nix embedded OSs are most likely to be found on which of the following devices?

A

Cisco switches and routers

18
Q

What open-source embedded OS is found in many space systems because it supports processors designed specifically to operate in space?

A

RTEMS

19
Q

Windows 10 IoT provides the full Windows API and can perform many of the same tasks that the desktop version can.

A

True

20
Q

If the time and money required to compromise an embedded system exceeds the value of the system’s information, a security tester might recommend not fixing the vulnerability. True or False?

A

True

21
Q

SCADA systems are used for which of the following?

A

Monitoring equipment in large-scale industries

22
Q

An embedded OS must be developed specifically for use with embedded systems. True or False?

A

False

23
Q

Which of the following is a specialized type of embedded OS that is typically used in devices such as programmable thermostats, appliance controls, and even spacecraft?

A

RTOS

24
Q

Both general-purpose and embedded OSs use drivers to interface with hardware devices.

A

True

25
Q

Which of the following systems should be used when equipment monitoring and automation is critical?

A

SCADA

26
Q

Which of the following is an advantage of Windows CE over other Windows embedded OSs?

A

Its source code is available to the public.

27
Q

Which of the following is a major challenge of securing embedded OSs?

A

Patching

28
Q

VxWorks is a widely used embedded real-time OS developed by Microsoft.

A

False

29
Q

What type of malicious code could be installed in a system’s flash memory to allow an attacker to access the system at a later date?

A

BIOS-based rootkit

30
Q

Embedded OSs on routers are susceptible to which of the following? (Choose all that apply.)

A

Authentication bypass attacks
Password-guessing attacks
Buffer overflow attacks