CompTIA Security+ Chapter 13

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is true about home automation devices? A. They have been used in botnet exploitations with significant impacts. B. They don't impose significant potential risks as they are isolated on the home network. C. Because home automation systems are exploding in use, they have been designed with security in mind from the beginning. D. Their network connection is usually wireless, which is not easily exploited.

A

Which of the following is a very important aspect to always remember when dealing with security of medical devices? A. They are still relatively new in their usage. B. They can directly affect human life. C. Security is not related to safety. D. They are almost exclusively stand alone devices, without Internet connectivity.

B

Which of the following is true about HVAC and building automation systems? A. They have not been exploited to any significant degree yet. B. Interconnecting these systems and using Internet-based central control mechanisms increases the risk profile from outside attacks. C. Having a "smart building" that reduces building resources in accordance with the numbers and distribution of people inside has not increased efficiency or reduced costs. D. The rise of hyperconnectivity has introduced no additional security concerns.

B

Which of the following is true about static environments? A. They are often designed to be fully integrated into a company's network security strategy. B. They are deigned to remain unaltered through their lifestyle. C. Because they perform a very specific function, they have no need for security updates. D. They cannot be exploited because hackers can't find them on a network.

B

Which of the following statements is not true? A. Embedded systems are designed with a single control purpose in mind and typically have no additional functionality. B. Embedded systems are free of risk or security concerns. C. Embedded is the name given to a computer that is included as an integral part of a larger system. D. Embedded systems can be as complex as the tens of interconnected embedded systems in a modern automobile.

B

What distinguishes real-time operating systems (RTOSs) from general-purpose operating systems? A. Unlike RTOSs, most general-purpose operating systems handle interrupts within defined time constraints. B. Unlike general-purpose OSs, most RTOSs are capable of multitasking by design. C. Unlike RTOSs, most general-purpose operating systems are multitasking by design. D. Unlike general-purpose OSs, RTOSs are designed to handle multiple threats.

C

Which of the following is not true about systems on a chip? A. They provide the full functionality of a computing platform on a single chip. B. They typically have low power consumption and efficient design. C. Programming of SoC systems can occur at several different levels and thus potential risks are easily mitigated. D. Because these devices represent computing platforms with billions of devices worldwide, they have become a significant force in the marketplace.

C

Which of the following is true about building-automation systems, climate control systems, HVAC systems, elevator control systems, and alarm systems? A. They are independent and stand-alone systems that offer little integration value B. Interconnecting these systems and adding Internet-based central control mechanisms doesn't increase the risk profile from outside attacks. C. These systems are being integrated to increase efficiency and reduce costs. D. Integrating these systems into building management systems introduces minimal risks.

C

Which of the following is true about printers and multifunction devices? A. They rely on the computer to manage the printing and scanning process. B. Because of their long history and widespread use, security is designed into these products. C. These devices communicate in a bidirectional fashion, accepting print jobs and sending back job status, printer status, and so forth. D. So far, they have not been shown to be hackable or capable of passing malware from the printer to the computer.

C

Which of the following is true about smart devices and the Internet of Things (IoT): A. The use of Linux-type kernel as the core engine makes programming more complex. B. Mass production introduces significant security risks. C. The scaling of the software development over large numbers of units makes costs scalable, and functionality is paramount. D. Security or anything that might impact new expanded functionality is considered early and gets the focus and resources necessary.

C

Which of the following is true regarding risk of next-generation vehicles? A. There are minimal risks when next-generation automobiles share information. B. Passing traffic and other information between vehicles present a potential security issue. C. The sharing of navigation and other inputs between vehicles presents a potential security issue. D. Time-to-market and cost minimization have minimal impact on potential risks being exploited.

C

Which of the following is true about Scada systems? A. SCADA systems continue to be air-gapped form other systems. B. The ongoing integration of SCADA environments has reduced potential risks. C. The introduction of human machine interfaces to manage SCADA systems has eliminated potential risks D. The historical isolation of SCADA systems from other systems is decreasing as SCADA systems are being connected across traditional networks to improve business functionality.

D

Which of the following is true about in-flight networks? A. Wi-Fi, in-flight entertainment, and cockpit digital flight control networks are segregated. B. The integration of Wi-Fi, in-flight entertainment, and cockpit digital flight control networks does not introduce potential security risks. C. Wi-Fi and cockpit digital flight control networks can be integrated without increasing potential security risks. D. Wi-Fi, in-flight entertainment, and cockpit digital flight control networks can present potential security risks.

D

Which of the following poses a significant potential risks of unmanned aerial vehicles? A. They have sophisticated autopilot functions. B. They have cameras, sensors, and payloads. C. Low prices for some models. D. Because they are pilotless, their remote-control systems may be networked and vulnerable to potential risks.

D

Which of the following properly defines supervisory control and data acquisition (SCADA)? A. A scaled-down version of Linux designed for use in an embedded system B. The standard used for communicating between intelligent car systems C. The risk created by connecting control systems in buildings D. A system designed to control automated systems in cyber-physical environments

D


Ensembles d'études connexes

Chapter 18 Review Questions Ovaries and Fallopian Tubes

View Set

Chapter 1: The First Civilizations

View Set

PNLE II for Community Health Nursing and Care of the Mother and Child

View Set

CH 58 Drugs for Substance Use Disorders

View Set

SDSU ART 157 (2.1-4.2) Inquizitive

View Set