Filters
Question type

What should a password policy include?

Correct Answer

verifed

verified

A comprehensive password policy is criti...

View Answer

Match each item with a statement below. -A small program developed specifically for use with embedded systems


A) Trusted Platform Module
B) MILS
C) RTLinux
D) RTOS
E) RTEMS
F) embedded system
G) firmware
H) multifunction devices
I) SCADA
J) embedded operating system

Correct Answer

verifed

verified

What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?


A) BIOS-based rootkit
B) embedded browser
C) unclassified kernel
D) patch

Correct Answer

verifed

verified

Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?


A) VxWorks
B) Windows Embedded 8
C) Windows CE
D) Windows 10 IoT

Correct Answer

verifed

verified

When using the Common Internet File System (CIFS) ,which security model does not require a password to be set for the file share?


A) NT level security
B) Share-level security
C) User-level security
D) CIF level security

Correct Answer

verifed

verified

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?


A) firewall
B) air gap
C) router
D) Vlan

Correct Answer

verifed

verified

What types of specific systems use VxWorks embedded real-time OS?

Correct Answer

verifed

verified

Systems using VxWorks include: - Clement...

View Answer

Match each item with a statement below. -An OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users


A) attack surface
B) Windows Software Update Services
C) Systems Management Server
D) Server Message Block
E) NetBEUI
F) Mandatory Access Control
G) Common Internet File System
H) System Center Configuration Manager
I) Remote Procedure Call
J) Samba

Correct Answer

verifed

verified

Match each item with a statement below. -Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005


A) attack surface
B) Windows Software Update Services
C) Systems Management Server
D) Server Message Block
E) NetBEUI
F) Mandatory Access Control
G) Common Internet File System
H) System Center Configuration Manager
I) Remote Procedure Call
J) Samba

Correct Answer

verifed

verified

What principle can be used to help reduce insider threats to an organization?

Correct Answer

verifed

verified

System administrators,network managers,a...

View Answer

Why do many people dismiss the topic of embedded device security?

Correct Answer

verifed

verified

Many dismiss the topic of embedded devic...

View Answer

Match each item with a statement below. -Any computer system that is not a general-purpose PC or server


A) Trusted Platform Module
B) MILS
C) RTLinux
D) RTOS
E) RTEMS
F) embedded system
G) firmware
H) multifunction devices
I) SCADA
J) embedded operating system

Correct Answer

verifed

verified

Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack?


A) Web server
B) USB port
C) RAM
D) PCB

Correct Answer

verifed

verified

Match each item with a statement below. -A specialized embedded OS used in devices such as programmable thermostats,appliance controls,and even spacecraft


A) Trusted Platform Module
B) MILS
C) RTLinux
D) RTOS
E) RTEMS
F) embedded system
G) firmware
H) multifunction devices
I) SCADA
J) embedded operating system

Correct Answer

verifed

verified

Why is it critical to protect SCADA systems from all types of unauthorized attacks?

Correct Answer

verifed

verified

Supervisory control and data acquisition...

View Answer

Match each item with a statement below. -In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality


A) attack surface
B) Windows Software Update Services
C) Systems Management Server
D) Server Message Block
E) NetBEUI
F) Mandatory Access Control
G) Common Internet File System
H) System Center Configuration Manager
I) Remote Procedure Call
J) Samba

Correct Answer

verifed

verified

Match each item with a statement below. -A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network


A) attack surface
B) Windows Software Update Services
C) Systems Management Server
D) Server Message Block
E) NetBEUI
F) Mandatory Access Control
G) Common Internet File System
H) System Center Configuration Manager
I) Remote Procedure Call
J) Samba

Correct Answer

verifed

verified

Match each item with a statement below. -A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP


A) attack surface
B) Windows Software Update Services
C) Systems Management Server
D) Server Message Block
E) NetBEUI
F) Mandatory Access Control
G) Common Internet File System
H) System Center Configuration Manager
I) Remote Procedure Call
J) Samba

Correct Answer

verifed

verified

Explain the BIOS-level rootkit SubVirt that was co-developed by Microsoft and the University of Michigan?

Correct Answer

verifed

verified

For demonstration purposes,SubVirt was d...

View Answer

Match each item with a statement below. -Systems used for equipment monitoring in large industries,such as public works and utilities,power generators and dams


A) Trusted Platform Module
B) MILS
C) RTLinux
D) RTOS
E) RTEMS
F) embedded system
G) firmware
H) multifunction devices
I) SCADA
J) embedded operating system

Correct Answer

verifed

verified

Showing 21 - 40 of 59

Related Exams

Show Answer