Live Virtual Machine Lab 5.1: Module 05 Cyber Security Vulnerabilities of Embedded Systems
Which of the following types of attacks are possible on the building automation systems - the building's heating, ventilation and air conditioning (HVAC) systems? [Choose all that apply] Authentication bypass Cross-site scripting Buffer overflow Path traversal Hardcoded secrets
Authentication bypass Cross-site scripting Buffer overflow Path traversal Hardcoded secret ALL
Which of the following are examples of embedded systems? [Choose all that apply] Automobiles Printers Digital Cameras Digital Watches Automatic Teller Machine (ATM)
Automatic Teller Machine (ATM) Printers Digital watches Digital cameras Automobiles : ALL
Which of the following digital features are included in vehicles? GPS Near Field Communication Bluetooth USB
Bluetooth USB GPS
Which type of sensors can be included in an Internet of Things (IoT) device? Gyro Accelerometer Temperature Acceleration Humidity
Gyro Accelerometer Temperature Acceleration Humidity :All
Which of the following vulnerabilities can exist in System control and Data Acquisition (SCADA)? Unmonitored system Inadequate input validation Weak passwords Poor update management
Unmonitored system Inadequate input validation Weak passwords Poor update management :All