Deck 9: Embedded Operating Systems: the Hidden Threat

Full screen (f)
exit full mode
Question
What is Samba used for?
Use Space or
up arrow
down arrow
to flip the card.
Question
What programming languages are vulnerable to buffer overflow attacks?

A) C and Python
B) C and C++
C) Assembly and C++
D) Perl and Python
Question
Why should a systems administrator disable unused services and filtering ports?
Question
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users?

A) Mandatory Access Control
B) SE Access Control
C) Access Control
D) Mandatory Control
Question
What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT)file system?

A) no ACL support
B) no SUS support
C) no SMTP support
D) no Linux support
Question
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Amount of code a computer system exposes to unauthenticated outsiders
Question
Why is NetBIOS still used in Windows Operating Systems?
Question
Why should you review logs regularly,and how should you manage this task?
Question
What should a password policy include?
Question
What is Server Message Block (SMB)used for in Windows and can a hacker still damage a network using SMB?
Question
What is the Common Internet File System (CIFS)protocol?
Question
Which of the following is a common Linux rootkit?

A) Back Orifice
B) Kill Trojans
C) Packet Storm Security
D) Linux Rootkit 5
Question
What is the current file system that Windows utilizes that has strong security features?

A) FAT
B) ADS
C) FAT32
D) NTFS
Question
Which of the following is considered to be the most critical SQL vulnerability?

A) null SA hash
B) null SA password
C) SQL password
D) SQL scanning
Question
When using the Common Internet File System (CIFS),which security model will require network users to have a user name and password to access a specific resource?

A) NT level security
B) Share-level security
C) User-level security
D) CIF level security
Question
What is the purpose of a file system?
Question
In Windows Server 2003 and 2008,how does a domain controller locate resources in a domain?
Question
Ubuntu and Debian Linux use what command to update and manage their RPM packages?

A) yum
B) get
C) dir
D) apt-get
Question
When using the Common Internet File System (CIFS),which security model does not require a password to be set for the file share?

A) NT level security
B) Share-level security
C) User-level security
D) CIF level security
Question
What functions do most Trojan programs perform?
Question
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An interprocess communication mechanism that allows a program running on one host to run code on a remote host
Question
What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android,Windows Mobile,and the Apple iPhone OS?

A) Python
B) C++
C) Perl
D) Java-based
Question
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An open-source implementation of CIFS
Question
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users
Question
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A standardized protocol that replaced SMB in Windows 2000 Server and later
Question
List at least four best practices for protecting embedded OSs.
Question
Which one of the following,if compromised might allow attackers the ability to gain complete access to network resources?

A) host
B) router
C) driver
D) rootkit
Question
Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack?

A) Web server
B) USB port
C) RAM
D) PCB
Question
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP
Question
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

A) firmware
B) testware
C) middleware
D) fireware
Question
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005
Question
Which of the following systems should be used when equipment monitoring and automation is critical?

A) CAD
B) GUI
C) SCADA
D) VoIP
Question
Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

A) VxWorks
B) Windows Embedded 8
C) Windows CE
D) Windows 10 IoT
Question
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network
Question
SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

A) firewall
B) air gap
C) router
D) Vlan
Question
Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have.
Question
A device that performs more than one function,such as printing and faxing is called which of the following?

A) MILS
B) ASA
C) RTOS
D) MFD
Question
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Used to share files and usually runs on top of NetBIOS,NetBEUI,or TCP/IP
Question
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality
Question
What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?

A) BIOS-based rootkit
B) embedded browser
C) unclassified kernel
D) patch
Question
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
A cryptographic firmware boot-check processor installed on many new computer systems
Question
What principle can be used to help reduce insider threats to an organization?
Question
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
An OS microkernel extension developed for Linux
Question
Explain the BIOS-level rootkit SubVirt that was co-developed by Microsoft and the University of Michigan?
Question
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
Any computer system that is not a general-purpose PC or server
Question
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
A specialized embedded OS used in devices such as programmable thermostats,appliance controls,and even spacecraft
Question
Why is it critical to protect SCADA systems from all types of unauthorized attacks?
Question
What types of embedded systems are found in a typical corporate building?
Question
Why are there problems with patching electronics such as heart rate monitors and MRI machines that run embedded Windows OSs?
Question
Why might attackers use social engineering techniques to masquerade as support technicians?
Question
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
Systems used for equipment monitoring in large industries,such as public works and utilities,power generators and dams
Question
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
An open-source embedded OS used in space systems because it supports processors designed specifically to operate in space
Question
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
Software residing on a chip
Question
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
An embedded OS certified to run multiple levels of classification on the same CPU without leakage between levels
Question
Why do many people dismiss the topic of embedded device security?
Question
What types of specific systems use VxWorks embedded real-time OS?
Question
What critical consumer product did the botnet worm psyb0t or the Network Bluepill target?
Question
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
Devices on an organization's network performing more than one function,such as printers,scanners,and copiers
Question
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
A small program developed specifically for use with embedded systems
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/59
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Embedded Operating Systems: the Hidden Threat
1
What is Samba used for?
Samba is an open-source implementation of CIFS; with Samba,*nix servers can share resources with Windows clients,and Windows clients can access a *nix resource without realizing that the resource is on a *nix computer.Samba has been ported to non-*nix systems,too,including OpenVMS,NetWare,and AmigaOS.Samba is very useful because many companies have a mixed environment of Windows and *nix systems.
2
What programming languages are vulnerable to buffer overflow attacks?

A) C and Python
B) C and C++
C) Assembly and C++
D) Perl and Python
B
3
Why should a systems administrator disable unused services and filtering ports?
Disabling unneeded services and deleting unnecessary applications or scripts make sense because they give intruders a potential point of entry into a network.If you have a Windows Server 2016 system acting as a file server,you certainly don't need DNS services running on it; doing so leaves port 53 TCP/UDP open and vulnerable to attack.Open only what needs to be open,and close everything else.
4
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users?

A) Mandatory Access Control
B) SE Access Control
C) Access Control
D) Mandatory Control
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
5
What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT)file system?

A) no ACL support
B) no SUS support
C) no SMTP support
D) no Linux support
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
6
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Amount of code a computer system exposes to unauthenticated outsiders
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
7
Why is NetBIOS still used in Windows Operating Systems?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
8
Why should you review logs regularly,and how should you manage this task?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
9
What should a password policy include?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
10
What is Server Message Block (SMB)used for in Windows and can a hacker still damage a network using SMB?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
11
What is the Common Internet File System (CIFS)protocol?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is a common Linux rootkit?

A) Back Orifice
B) Kill Trojans
C) Packet Storm Security
D) Linux Rootkit 5
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
13
What is the current file system that Windows utilizes that has strong security features?

A) FAT
B) ADS
C) FAT32
D) NTFS
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is considered to be the most critical SQL vulnerability?

A) null SA hash
B) null SA password
C) SQL password
D) SQL scanning
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
15
When using the Common Internet File System (CIFS),which security model will require network users to have a user name and password to access a specific resource?

A) NT level security
B) Share-level security
C) User-level security
D) CIF level security
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
16
What is the purpose of a file system?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
17
In Windows Server 2003 and 2008,how does a domain controller locate resources in a domain?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
18
Ubuntu and Debian Linux use what command to update and manage their RPM packages?

A) yum
B) get
C) dir
D) apt-get
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
19
When using the Common Internet File System (CIFS),which security model does not require a password to be set for the file share?

A) NT level security
B) Share-level security
C) User-level security
D) CIF level security
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
20
What functions do most Trojan programs perform?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An interprocess communication mechanism that allows a program running on one host to run code on a remote host
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
22
What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android,Windows Mobile,and the Apple iPhone OS?

A) Python
B) C++
C) Perl
D) Java-based
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An open-source implementation of CIFS
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
25
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A standardized protocol that replaced SMB in Windows 2000 Server and later
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
26
List at least four best practices for protecting embedded OSs.
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
27
Which one of the following,if compromised might allow attackers the ability to gain complete access to network resources?

A) host
B) router
C) driver
D) rootkit
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack?

A) Web server
B) USB port
C) RAM
D) PCB
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
30
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

A) firmware
B) testware
C) middleware
D) fireware
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
31
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following systems should be used when equipment monitoring and automation is critical?

A) CAD
B) GUI
C) SCADA
D) VoIP
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

A) VxWorks
B) Windows Embedded 8
C) Windows CE
D) Windows 10 IoT
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
34
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
35
SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

A) firewall
B) air gap
C) router
D) Vlan
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
36
Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have.
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
37
A device that performs more than one function,such as printing and faxing is called which of the following?

A) MILS
B) ASA
C) RTOS
D) MFD
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
38
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Used to share files and usually runs on top of NetBIOS,NetBEUI,or TCP/IP
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
39
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
40
What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?

A) BIOS-based rootkit
B) embedded browser
C) unclassified kernel
D) patch
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
41
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
A cryptographic firmware boot-check processor installed on many new computer systems
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
42
What principle can be used to help reduce insider threats to an organization?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
43
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
An OS microkernel extension developed for Linux
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
44
Explain the BIOS-level rootkit SubVirt that was co-developed by Microsoft and the University of Michigan?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
45
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
Any computer system that is not a general-purpose PC or server
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
46
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
A specialized embedded OS used in devices such as programmable thermostats,appliance controls,and even spacecraft
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
47
Why is it critical to protect SCADA systems from all types of unauthorized attacks?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
48
What types of embedded systems are found in a typical corporate building?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
49
Why are there problems with patching electronics such as heart rate monitors and MRI machines that run embedded Windows OSs?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
50
Why might attackers use social engineering techniques to masquerade as support technicians?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
51
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
Systems used for equipment monitoring in large industries,such as public works and utilities,power generators and dams
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
52
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
An open-source embedded OS used in space systems because it supports processors designed specifically to operate in space
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
53
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
Software residing on a chip
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
54
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
An embedded OS certified to run multiple levels of classification on the same CPU without leakage between levels
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
55
Why do many people dismiss the topic of embedded device security?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
56
What types of specific systems use VxWorks embedded real-time OS?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
57
What critical consumer product did the botnet worm psyb0t or the Network Bluepill target?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
58
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
Devices on an organization's network performing more than one function,such as printers,scanners,and copiers
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
59
Match each item with a statement below.a.Trusted Platform Module
b.MILS
c.RTLinux
d.RTOS
e.RTEMS
f.embedded system
g.firmware
h.multifunction devices
i.SCADA
j.embedded operating system
A small program developed specifically for use with embedded systems
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 59 flashcards in this deck.