Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Hands On Ethical Hacking
Quiz 9: Embedded Operating Systems: The Hidden Threat
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Embedded Linux is an example of a(n) ____ OS used in a multitude of industrial, medical, and consumer items.
Question 2
Multiple Choice
A(n) ____ operating system can be a small program developed specifically for use with embedded systems, or it can be a stripped-down version of an OS commonly used on general-purpose computers.
Question 3
Multiple Choice
The ____ worm spread by exploiting outdated or poorly configured router OSs that contained easy-to-guess passwords.
Question 4
True/False
Embedded OSs are usually designed to be small and efficient, so they don't have some of the functions that general-purpose OSs have.
Question 5
Multiple Choice
What is the collective name for embedded versions of Windows Enterprise OSs, such as XP Professional, Windows Vista Business and Ultimate, and Windows 7 Ultimate and Professional?
Question 6
Multiple Choice
One type of specialized embedded OS is a(n) ____, typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.
Question 7
True/False
Both general-purpose and embedded OSs use drivers to interface with hardware devices.
Question 8
Multiple Choice
Which of the following could be considered the biggest security threat for an organization?
Question 9
Multiple Choice
One reason that some vendors of embedded OSs are using ____ software more is that the cost of developing and patching an OS is shared by the entire community.
Question 10
Multiple Choice
An embedded OS certified to run multiple levels of classification (such as unclassified, secret, and top secret) on the same CPU without leakage between levels is called ____.
Question 11
Multiple Choice
Many viruses, worms, Trojans, and other attack vectors take advantage of ____code.
Question 12
Multiple Choice
For sensitive embedded systems that need only a fraction of the features offered by other kernels, the risk of vulnerabilities might outweigh the benefits, and a(n) ____ kernel might be most suitable.