Module 9 Flashcards
SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?
air gap
Which of the following is a common Linux rootkit?
Linux Rootkit 5
Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?
Windows CE
Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have. (True or False)
True
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?
Mandatory Access Control
What type of malicious code could be installed in a system’s flash memory to allow an attacker to access the system at a later date?
BIOS-based rootkit
Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs. (True or Flase)
True
What programming languages are vulnerable to buffer overflow attacks?
C and C++
Which of the following is often found within an embedded OS that can cause a potential vulnerability to an attack?
Web server
What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?
no ACL support
Which of the following is considered to be the most critical SQL vulnerability?
null SA password
When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?
Share-level security
Ubuntu and Debian Linux use what command to update and manage their RPM packages?
apt-get
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?
firmware
Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?
router
Which of the following systems should be used when equipment monitoring and automation is critical?
SCADA
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?
User-level security
What is the current file system that Windows utilizes that has strong security features?
NTFS
What type of viruses and code has been created by security researchers and attackers that could infect phones running Google’s Android, Windows Mobile, and the Apple iPhone OS?
Java-based
Which of the following is an advantage of Windows CE over other Windows embedded OSs?
Its source code is available to the public.
Which of the following describes an RTOS?
An embedded OS capable of multitasking and responding predictably
Which of the following is a major challenge of securing embedded OSs?
Patching
The lack of a familiar interface, such as CD/DVD-ROM drives, contributes to the difficulty of updating embedded OSs. True or False?
True
SCADA systems are used for which of the following?
Monitoring equipment in large-scale industries
Multifunction devices (MFDs) are rarely which of the following?
Scanned for vulnerabilities
A common vulnerability of routers and other network devices with built-in Web management interfaces is which of the following?
authentication vulnerability
Which of the following can modify part of the OS or install themselves as kernel modules, drivers, libraries, and even applications?
rootkit
Which of the following doesn’t use an embedded OS?
A workstation running Windows Vista Business
If the time and money required to compromise an embedded system exceeds the value of the system’s information, a security tester might recommend not fixing the vulnerability. True or False?
True
One reason that some vendors of embedded OSs are using open-source software more is that the cost of developing and patching an OS is shared by the entire open-source community. True or False?
True
Which of the following is considered a good defense against low-level rootkits?
Trusted Platform Module (TPM)
An embedded OS must be developed specifically for use with embedded systems. True or False?
False
*nix embedded OSs are most likely to be found on which of the following devices?
Cisco switches and routers
Most printers now have only TCP/IP enabled and don’t allow default administrator passwords, so they’re inherently more secure. True or False?
False
VxWorks is which of the following?
A proprietary embedded OS