انظمة مدمجة.pdf

Full Transcript

Embedded Systems Security Final Exam Question 1: choose the right answer: 1. An embedded system is a combination of a. Software b. Hardware c. Both a and b d. Devices 2.Which of the following are hardware components of an embedded system? a. Computer processor b. Device peripherals c. Computer memo...

Embedded Systems Security Final Exam Question 1: choose the right answer: 1. An embedded system is a combination of a. Software b. Hardware c. Both a and b d. Devices 2.Which of the following are hardware components of an embedded system? a. Computer processor b. Device peripherals c. Computer memory d. All the above 3.Which of the following designed system factors are minimized for an embedded application? a. Cost b. Size c. Performance d. Both a and b 4.Which of the following designed system factors are optimized or enhanced for an embedded application? a. Performance b. Reliability c. Efficiency d. All the above 5. Which of the following are the sources of embedded system? a. Cell phones b. Washing machines c. Smart watches d. All the above 6. Which of the following are medical applications of embedded systems? a. CT b. MRI c. PET d. All the above. 7. In which of the following type of embedded system reaching its dead line to complete a task may vary? a. Microwave oven b. Traffic lights c. Buzzer d. Alarm 8. Which of the following are the examples of networked embedded systems? a. ATM machine b. Smart watch c. Micro-oven d. Both a and b 9. Give some examples for medium scale embedded systems a. Signal tracking systems b. Banking systems c. All the above d. None of the above 10.Which of the following are the examples of networked embedded systems? a. ATM machine b. Smart watch c. Micro-oven d. Both a and b 11.LAN stands for. a. Local Area Network b. Local Avoiding Network c. Location Area Network d. None of the above 12. How Embedded Systems Security is Done? a. End to end security tracker b. Maintain and upgrade security c. All-time Support for cyber-attacks d. All the above 13. Give the steps in embedded system design? a. Requirements b. Specifications c. Architecture d. Components e. System integration f. All the above 14. What are the requirements of embedded system? a. Reliability b. Low power consumption c. Cost effectiveness d. Efficient use of processing power e. All the above Question 2: Put true or false in front of the following sentences: 1.An embedded system is a computer system that is part of a larger system or machine. It is a system with a dedicated function within a larger electrical or mechanical system. True 2.Some disadvantages of embedded systems are: It is reliable and it is inexpensive and small in size. False 3.The embedded system It is a hardware system that software designed to perform a specific specialized function or task. True 4.The embedded system It can be a complete system or belong to a large system. True 5. There are 3 components of an embedded system Hardware, Software, and operating system. True 6.Do not embedded Systems are widely used in identifying the speed of vehicles on a highway. False 7. Automotive Embedded System is a computer system designed for electronic devices that controls the mechanism of data and devices. True 8. The standard components of an embedded system include memory, user interface, power supply, timers and Display. True 9.In Airplane, numerous embedded systems are used for different purposes, such as maintain oxygen level inside the airplane. True 10.Don't other embedded systems applications include Robotics, Security Devices, Access Control, Home Appliances, Automobiles, Manufacturing Industries, Nuclear Power Plants, etc. False 11.The phases of development of embedded systems are: Idea and Repository. False 12. "I think it's better to use embedded systems whenever possible because they're much smaller than the average system, allowing for a longer power supply and quick functioning. True Question 1: State Whether True OR False: 1.Identity anonymity (part of transmission security) is often a desired goal of data-in-motion protocols True 2. Choice of network protection layer can have significant impact on functionality, performance, interoperability, and maintainability. True 3.The developer does not must find a way to distribute a shared key across the group and then multicast packets protected with that key. False 4.The major advantage of implementing storage protection at the file system layer is to provide finer granularity over the choice of information that requires storage confidentiality. True 5. For network-enabled embedded systems, do not a remote management server hold a database of the provisioned data encryption keys. False 6. The system designer must adopt a policy to handle the case in which the network is down when an unlock operation is required. True 7.There are situations in which the system owner may need to extract the data from storage, such as after a system failure. True 8.Do not much of the world's commerce and critical infrastructure control depends on the security of network transactions. False 9.Mobile devices are not increasingly taking part in critical network transactions. False 10. When a transaction is about to be executed, the server sends a verification request to the client. True 11.The guest operating system has direct access to the physical display device. False 12.One approach to raising the level of assurance in data protection within an Android-based device is to employ multiple encryption layers. True 13.The two main purposes of Mobile Device Management are to provide mobile data protection and IT management services. True 14. Network Access Control (NAC) attempts to protect a network from access by clients that fulfill a configurable profile. True Question 2: Choose the right answer: 1.One of the following is a security threats to cars: A. local-physical. B. Internal-electronic. C. Access Control. D. Both A&B 2.Two-factor authentication is beneficial because: A Hackers in possession are unable to access protected account. B. Protecting the keys within the receiver. C. Never A&B. 3.The most common way for a hacker to gain access to critical information: A. Is to hijack the client endpoint. B. Is to hijack the client device. C. The Hacker sends message to the client. 4. Transaction security is defined by: A. The ability of the client to have trust in the messages. B. The server has trust in the messages. C. A&B 5. The world's commerce depends on: A. The security of network transactions. B. Network control. C. Protect a Network. 6.One approach in data protection within an Android-based device is: A.Used multiple encryption layers. B. Strong password. C. Control Data. 7. Modern embedded microprocessors provide the features: A. The power of Android's multimedia. B. Applications deployment infrastructure. C. Both A & B 8.The two main purposes of Mobile Device Management are: A. To provide mobile data protection. B. IT management services. C. Managing the transaction securely. D. A & B 9.Sometimes Hackers may bypass: A. server security controls. B. subvert a comparatively weak client. C. Never nothing. D. A & B 10. A part of transmission security in the embedded system: A. Identity anonymity. B. Creating a good protocol. D. Never nothing. 11. Attacks on transactions may target: A. The transaction data is in situ. B. Data within a browser. C. During transmission or the endpoint computers. D. All the above 12. From the purposes of Mobile Device Management are: A. To provide mobile data protection. B. IT management services. C. All the above.

Use Quizgecko on...
Browser
Browser