Module 9 Flashcards
SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?
air gap
Which of the following is a common Linux rootkit?
Linux Rootkit 5
Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?
Windows CE
Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have. (True or False)
True
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?
Mandatory Access Control
What type of malicious code could be installed in a system’s flash memory to allow an attacker to access the system at a later date?
BIOS-based rootkit
Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs. (True or Flase)
True
What programming languages are vulnerable to buffer overflow attacks?
C and C++
Which of the following is often found within an embedded OS that can cause a potential vulnerability to an attack?
Web server
What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?
no ACL support
Which of the following is considered to be the most critical SQL vulnerability?
null SA password
When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?
Share-level security
Ubuntu and Debian Linux use what command to update and manage their RPM packages?
apt-get
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?
firmware
Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?
router