Deck 9: Embedded Operating Systems: The Hidden Threat

Full screen (f)
exit full mode
Question
Embedded Linux is an example of a(n) ____ OS used in a multitude of industrial, medical, and consumer items.

A)monolithic
B)macrolithic
C)microkernel
D)macrokernel
Use Space or
up arrow
down arrow
to flip the card.
Question
A(n) ____ operating system can be a small program developed specifically for use with embedded systems, or it can be a stripped-down version of an OS commonly used on general-purpose computers.

A)multi-threaded
B)embedded
C)GUI
D)SMP
Question
The ____ worm spread by exploiting outdated or poorly configured router OSs that contained easy-to-guess passwords.

A)SQL Slammer
B)psyb0t
C)Melissa
D)Nimda
Question
Embedded OSs are usually designed to be small and efficient, so they don't have some of the functions that general-purpose OSs have.
Question
What is the collective name for embedded versions of Windows Enterprise OSs, such as XP Professional, Windows Vista Business and Ultimate, and Windows 7 Ultimate and Professional?

A)Windows Business Suites
B)Embedded Systems Suite
C)Embedded Windows Servers
D)Windows Embedded Enterprise
Question
One type of specialized embedded OS is a(n) ____, typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.

A)RTOS
B)VoP
C)MILS
D)SCADA
Question
Both general-purpose and embedded OSs use drivers to interface with hardware devices.
Question
Which of the following could be considered the biggest security threat for an organization?

A)spyware
B)employees
C)kernels
D)routers
Question
One reason that some vendors of embedded OSs are using ____ software more is that the cost of developing and patching an OS is shared by the entire community.

A)closed-source
B)shared
C)reused
D)open-source
Question
An embedded OS certified to run multiple levels of classification (such as unclassified, secret, and top secret) on the same CPU without leakage between levels is called ____.

A)MILS
B)RTOS
C)GUI
D)DOS
Question
Many viruses, worms, Trojans, and other attack vectors take advantage of ____code.

A)shortened
B)shared
C)modified
D)cache
Question
For sensitive embedded systems that need only a fraction of the features offered by other kernels, the risk of vulnerabilities might outweigh the benefits, and a(n) ____ kernel might be most suitable.

A)micro
B)proprietary
C)monolithic
D)macro
Question
OSs that use a(n) ____ sacrifice flexibility for simplicity and fewer hardware resources.

A)macrokernel
B)microkernel
C)monolithic kernel
D)bilithic kernel
Question
Which of the following is a software flaw that would cause the system to suddenly stop or fail when the clock struck midnight on the eve of the past millennium?

A)Conficker worm
B)Y2K
C)psyb0t
D)BIOS-based rootkit
Question
Attackers cannot map an entire network from a single router.
Question
Software residing on a chip is commonly referred to as ____.

A)middleware
B)testware
C)firmware
D)microware
Question
Wind River produces an open-source Linux OS for embedded systems and an OS microkernel extension called ____.

A)RTEMS
B)QNX
C)VxWorks
D)RTLinux
Question
Firmware rootkits are hard to detect because the code for firmware often isn't checked for possible corruption.
Question
Windows Embedded Standard is essentially Windows CE on a diet.
Question
The ____ Linux kernel was designed to offer the most flexibility and support for sophisticated features.

A)macrolithic
B)monolithic
C)bilithic
D)proprietary
Question
If a(n) ____ is compromised, attackers might be able to gain complete access to network resources.

A)host
B)router
C)driver
D)rootkit
Question
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
commercial RTOS used in Cisco's routers and Logitech universal remotes
Question
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
designed an embedded OS for the F-35 Joint Strike Fighter
Question
A device that performs more than one function (e.g., printing and faxing) is called a(n) ____.

A)MILS
B)ASA
C)RTOS
D)MFD
Question
Disgruntled employees might install a(n) ____ in company computers' flash memory before they leave a company and later use it to gain access to the corporate network.

A)BIOS-based rootkit
B)embedded browser
C)unclassified kernel
D)patch
Question
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
slimmed down version of Windows XP
Question
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
newest version of Windows Embedded Standard
Question
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
widely used embedded OS developed by Wind River Systems
Question
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
an operating system that runs in an embedded system
Question
Restricting network access to only the ___________________________________ that need to communicate with embedded systems is one way to reduce the potential of vulnerabilities.
Question
Embedded systems include their own operating system, called a(n) "_________________________".
Question
A common vulnerability with routers and other networking devices is the _________________________ vulnerability.
Question
Originally, ____ were used to perform routing and switching.

A)networking devices
B)general purpose computers
C)embedded systems
D)specialized hardware
Question
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
open-source Linux OS for embedded systems and an OS microkernel extensions
Question
A(n) ____ system may be used when automation is critical.

A)CAD
B)GUI
C)SCADA
D)VoIP
Question
The Quebec version of Windows Embedded Standard is based on ____________________.
Question
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
used for equipment monitoring in large industries
Question
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
open-source embedded OS used in space systems
Question
Rootkits that pose the biggest threat to any OS are those that infect a device's ____.

A)firmware
B)testware
C)middleware
D)fireware
Question
QNX, from QNX Software Systems, is a commercial ________________________________________.
Question
Why do many people dismiss the topic of embedded device security?
Question
List at least four best practices for protecting embedded OSs.
Question
Why might attackers use social engineering techniques to masquerade as support technicians?
Question
Explain the BIOS-level rootkit, called SubVirt, developed by Microsoft and the University of Michigan.
Question
What principle can be used to help reduce insider threats to an organization?
Question
What types of systems use VxWorks?
Question
What types of embedded systems are found in a typical corporate building?
Question
What did the botnet worm psyb0t (or the Network Bluepill) target?
Question
Heart rate monitors and MRI machines are systems that run embedded Windows OSs. Why are there problems with patching them?
Question
Many hackers today want more than just notoriety. What are they looking for and how do they accomplish it?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Embedded Operating Systems: The Hidden Threat
1
Embedded Linux is an example of a(n) ____ OS used in a multitude of industrial, medical, and consumer items.

A)monolithic
B)macrolithic
C)microkernel
D)macrokernel
A
2
A(n) ____ operating system can be a small program developed specifically for use with embedded systems, or it can be a stripped-down version of an OS commonly used on general-purpose computers.

A)multi-threaded
B)embedded
C)GUI
D)SMP
B
3
The ____ worm spread by exploiting outdated or poorly configured router OSs that contained easy-to-guess passwords.

A)SQL Slammer
B)psyb0t
C)Melissa
D)Nimda
B
4
Embedded OSs are usually designed to be small and efficient, so they don't have some of the functions that general-purpose OSs have.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What is the collective name for embedded versions of Windows Enterprise OSs, such as XP Professional, Windows Vista Business and Ultimate, and Windows 7 Ultimate and Professional?

A)Windows Business Suites
B)Embedded Systems Suite
C)Embedded Windows Servers
D)Windows Embedded Enterprise
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
One type of specialized embedded OS is a(n) ____, typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.

A)RTOS
B)VoP
C)MILS
D)SCADA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Both general-purpose and embedded OSs use drivers to interface with hardware devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following could be considered the biggest security threat for an organization?

A)spyware
B)employees
C)kernels
D)routers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
One reason that some vendors of embedded OSs are using ____ software more is that the cost of developing and patching an OS is shared by the entire community.

A)closed-source
B)shared
C)reused
D)open-source
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
An embedded OS certified to run multiple levels of classification (such as unclassified, secret, and top secret) on the same CPU without leakage between levels is called ____.

A)MILS
B)RTOS
C)GUI
D)DOS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Many viruses, worms, Trojans, and other attack vectors take advantage of ____code.

A)shortened
B)shared
C)modified
D)cache
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
For sensitive embedded systems that need only a fraction of the features offered by other kernels, the risk of vulnerabilities might outweigh the benefits, and a(n) ____ kernel might be most suitable.

A)micro
B)proprietary
C)monolithic
D)macro
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
OSs that use a(n) ____ sacrifice flexibility for simplicity and fewer hardware resources.

A)macrokernel
B)microkernel
C)monolithic kernel
D)bilithic kernel
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is a software flaw that would cause the system to suddenly stop or fail when the clock struck midnight on the eve of the past millennium?

A)Conficker worm
B)Y2K
C)psyb0t
D)BIOS-based rootkit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Attackers cannot map an entire network from a single router.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Software residing on a chip is commonly referred to as ____.

A)middleware
B)testware
C)firmware
D)microware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Wind River produces an open-source Linux OS for embedded systems and an OS microkernel extension called ____.

A)RTEMS
B)QNX
C)VxWorks
D)RTLinux
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Firmware rootkits are hard to detect because the code for firmware often isn't checked for possible corruption.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Windows Embedded Standard is essentially Windows CE on a diet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ Linux kernel was designed to offer the most flexibility and support for sophisticated features.

A)macrolithic
B)monolithic
C)bilithic
D)proprietary
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
If a(n) ____ is compromised, attackers might be able to gain complete access to network resources.

A)host
B)router
C)driver
D)rootkit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
commercial RTOS used in Cisco's routers and Logitech universal remotes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
designed an embedded OS for the F-35 Joint Strike Fighter
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A device that performs more than one function (e.g., printing and faxing) is called a(n) ____.

A)MILS
B)ASA
C)RTOS
D)MFD
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Disgruntled employees might install a(n) ____ in company computers' flash memory before they leave a company and later use it to gain access to the corporate network.

A)BIOS-based rootkit
B)embedded browser
C)unclassified kernel
D)patch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
slimmed down version of Windows XP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
newest version of Windows Embedded Standard
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
widely used embedded OS developed by Wind River Systems
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
an operating system that runs in an embedded system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Restricting network access to only the ___________________________________ that need to communicate with embedded systems is one way to reduce the potential of vulnerabilities.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Embedded systems include their own operating system, called a(n) "_________________________".
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
A common vulnerability with routers and other networking devices is the _________________________ vulnerability.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Originally, ____ were used to perform routing and switching.

A)networking devices
B)general purpose computers
C)embedded systems
D)specialized hardware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
open-source Linux OS for embedded systems and an OS microkernel extensions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) ____ system may be used when automation is critical.

A)CAD
B)GUI
C)SCADA
D)VoIP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The Quebec version of Windows Embedded Standard is based on ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
used for equipment monitoring in large industries
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
MATCHING
Match each term with the correct statement below.
a.Windows Embedded Standard
f.embedded operating system
b.Green Hill Software
g.Quebec
c.RTLinux
h.QNX
d.VxWorks
i.SCADA
e.RTEMS
open-source embedded OS used in space systems
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Rootkits that pose the biggest threat to any OS are those that infect a device's ____.

A)firmware
B)testware
C)middleware
D)fireware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
QNX, from QNX Software Systems, is a commercial ________________________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Why do many people dismiss the topic of embedded device security?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
List at least four best practices for protecting embedded OSs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Why might attackers use social engineering techniques to masquerade as support technicians?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain the BIOS-level rootkit, called SubVirt, developed by Microsoft and the University of Michigan.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What principle can be used to help reduce insider threats to an organization?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What types of systems use VxWorks?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What types of embedded systems are found in a typical corporate building?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What did the botnet worm psyb0t (or the Network Bluepill) target?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Heart rate monitors and MRI machines are systems that run embedded Windows OSs. Why are there problems with patching them?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Many hackers today want more than just notoriety. What are they looking for and how do they accomplish it?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.