100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Chapter 9 Homework Questions & Answers

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
20-10-2024
Written in
2024/2025

Chapter 9 Homework Questions & Answers Which of the following can be a small program developed specifically for use with embedded systems, or a stripped-down version of an OS commonly used on general-purpose computers? Embedded OS Which of the following best describes software that resides on a chip? Firmware Previous Play Next Rewind 10 seconds Move forward 10 seconds Unmute 0:01 / 0:15 Full screen Brainpower Read More To increase the impact a single vulnerability can have viruses, worms, Trojans, and other attack vectors take advantage of which of the following? Shared code What type of embedded OS is certified to run multiple levels of classification, such as unclassified, secret, and top secret, on the same CPU without leakage between levels? MILS What type of operating system sacrifices flexibility for simplicity and fewer hardware resources? Microkernel If you are concerned about the attack surface a system presents, what type of embedded OS configuration would you NOT use? Multiple embedded Which of the following is usually considered the biggest security threat to an organization? Employees Which of the following is a software flaw that would cause billions of embedded systems to suddenly stop or fail when the clock struck midnight on the eve of the past millennium? Y2K What type of kernel was designed to offer the most flexibility and support for sophisticated features? monolithic When designing sensitive embedded systems that need only a fraction of the features offered by other kernels, there are risks for vulnerabilities that might outweigh the benefits. What type of kernel should be chosen for this system? proprietary Originally, which of the following was used to perform routing and switching before specialized hardware was developed? General purpose computers A device that performs more than one function, such as printing and faxing is called which of the following? MFD Which of the following systems should be used for equipment monitoring and when automation is critical? SCADA Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device? firmware What type of malicious code could survive an OS reinstall to allow an attacker to access the system at a later date? BIOS-based rootkit SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following? air gap What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS? Java Which of the following is often found within an embedded OS that can cause a potential vulnerability to an attack? Web server Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS? Windows CE Which of the following is not a best practice for protecting embedded OS's? Scan

Show more Read less
Institution
Wrt
Course
Wrt








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Wrt
Course
Wrt

Document information

Uploaded on
October 20, 2024
Number of pages
3
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Chapter 9 Homework Questions &
Answers
Which of the following can be a small program developed specifically for use with
embedded systems, or a stripped-down version of an OS commonly used on general-
purpose computers? - answer Embedded OS

Which of the following best describes software that resides on a chip? - answer
Firmware

To increase the impact a single vulnerability can have viruses, worms, Trojans, and
other attack vectors take advantage of which of the following? - answer Shared code

What type of embedded OS is certified to run multiple levels of classification, such as
unclassified, secret, and top secret, on the same CPU without leakage between levels?
- answer MILS

What type of operating system sacrifices flexibility for simplicity and fewer hardware
resources? - answer Microkernel

If you are concerned about the attack surface a system presents, what type of
embedded OS configuration would you NOT use? - answer Multiple embedded

Which of the following is usually considered the biggest security threat to an
organization? - answer Employees

Which of the following is a software flaw that would cause billions of embedded systems
to suddenly stop or fail when the clock struck midnight on the eve of the past
millennium? - answer Y2K

What type of kernel was designed to offer the most flexibility and support for
sophisticated features? - answer monolithic

When designing sensitive embedded systems that need only a fraction of the features
offered by other kernels, there are risks for vulnerabilities that might outweigh the
benefits. What type of kernel should be chosen for this system? - answer proprietary

Originally, which of the following was used to perform routing and switching before
specialized hardware was developed? - answer General purpose computers

A device that performs more than one function, such as printing and faxing is called
which of the following? - answer MFD

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Pogba119 Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
48
Member since
1 year
Number of followers
2
Documents
4870
Last sold
1 month ago
NURSING TEST

BEST EDUCATIONAL RESOURCES FOR STUDENTS

3.9

9 reviews

5
4
4
2
3
2
2
0
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions