Chapter 9 Flashcards
Which of the following can be a small program developed specifically for use with embedded systems, or a stripped-down version of an OS commonly used on general-purpose computers?
embedded OS
The lack of a familiar interface, such as CD/DVD-ROM drives, contributes to the difficulty of updating embedded OSs. True or False?
True
A device that performs more than one function, such as printing and faxing is called which of the following?
MFD
What type of embedded OS is certified to run multiple levels of classification; such as unclassified, secret, and top secret, on the same CPU without leakage between levels?
MILS
Most printers now have only TCP/IP enabled and don’t allow default administrator passwords, so they’re inherently more secure. True or False?
False
Multifunction devices (MFDs) are rarely which of the following?
Scanned for vulnerabilities
Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have.
True
Originally, which of the following was used to perform routing and switching before specialized hardware was developed?
general purpose computers
One reason that some vendors of embedded OSs are using open-source software more is that the cost of developing and patching an OS is shared by the entire open-source community. True or False?
True
Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?
router
Why are embedded OSs more likely to have unpatched security vulnerabilities than general-purpose OSs do? (Choose all that apply.)
Manufacturers prefer that you upgrade the system rather than the embedded OS.
Devices with embedded OSs typically can’t have any downtime for installing
patches.
Many security checks are omitted during development to reduce the code size.
SCADA systems controlling critical infrastructure are usually separated from the Internet by which of the following?
air gap
air gap
RTLinux
Some vendors of embedded OSs are using which of the following types of software, so the cost of developing and patching an OS is shared by the entire community?
open-source
Cell phone vulnerabilities make it possible for attackers to do which of the following? (Choose all that apply.)
Clone your phone to make illegal long-distance phone calls.
Listen to your phone conversations.
Use your phone as a microphone to eavesdrop on meetings or private conversations.
A common vulnerability of routers and other network devices with built-in Web management interfaces is which of the following?
authentication vulnerability
*nix embedded OSs are most likely to be found on which of the following devices?
Cisco switches and routers
What open-source embedded OS is found in many space systems because it supports processors designed specifically to operate in space?
RTEMS
Windows 10 IoT provides the full Windows API and can perform many of the same tasks that the desktop version can.
True
If the time and money required to compromise an embedded system exceeds the value of the system’s information, a security tester might recommend not fixing the vulnerability. True or False?
True
SCADA systems are used for which of the following?
Monitoring equipment in large-scale industries
An embedded OS must be developed specifically for use with embedded systems. True or False?
False
Which of the following is a specialized type of embedded OS that is typically used in devices such as programmable thermostats, appliance controls, and even spacecraft?
RTOS
Both general-purpose and embedded OSs use drivers to interface with hardware devices.
True
Which of the following systems should be used when equipment monitoring and automation is critical?
SCADA
Which of the following is an advantage of Windows CE over other Windows embedded OSs?
Its source code is available to the public.
Which of the following is a major challenge of securing embedded OSs?
Patching
VxWorks is a widely used embedded real-time OS developed by Microsoft.
False
What type of malicious code could be installed in a system’s flash memory to allow an attacker to access the system at a later date?
BIOS-based rootkit
Embedded OSs on routers are susceptible to which of the following? (Choose all that apply.)
Authentication bypass attacks
Password-guessing attacks
Buffer overflow attacks