• 1. 
    Dynamic RAM stores data in the form of voltage. True or False?

  • True
  • False
  • 2. 
    Which of the following is a very important aspect to always remember when dealing with security of medical devices?

  • They are still relatively new in their usage.
  • They can directly affect human life.
  • Security is not related to safety.
  • They are almost exclusively stand-alone devices, without Internet connectivity.
  • 3. 
    Which of the following statements is true about HVAC and building automation systems?

  • They have not been exploited to any significant degree yet.
  • Interconnecting these systems and using Internet-based central control mechanisms increases the risk profile from outside attacks.
  • Having a “smart building” that reduces the use of building resources in accordance with the number and distribution of people inside has not increased efficiency or reduced costs.
  • The rise of hyper-connectivity has introduced no additional security concerns.
  • 4. 
    EEPROM memory is alterable at the byte level. True or False?

  • True
  • False
  • 5. 
    Which of the following properly defines supervisory control and data acquisition (SCADA)?

  • A scaled-down version of Linux designed for use in an embedded system
  • The standard used for communicating between intelligent car systems
  • The risk created by connecting control systems in buildings
  • A system designed to control automated systems in cyber-physical environments
  • 6. 
    Microprocessor is a/an __________ circuit that functions as the CPU of the computer

  • electronic
  • mechanic
  • integrating
  • processing
  • 7. 
    UART is a serial communication interface. True or False?

  • True
  • False
  • 8. 
    An integer variable with a value of 255 is stored in a memory location at 0x8000. The processor word length is 8 bits and the processor is a big-endian processor. The size of an integer is considered as 4 bytes in the system.What is the value held by the memory location 0x8000?

  • 0xFF
  • 0x00
  • 0x01
  • None of these
  • 9. 
    Which of the following statements is true about smart devices and the Internet of Things (IoT)?

  • The use of a Linux-type kernel as the core engine makes programming more complex.
  • Mass production introduces significant security risks.
  • The scaling of the software development over large numbers of units makes costs scalable, and functionality is paramount.
  • Security or anything that might impact new expanded functionality is considered early and gets the focus and resources necessary.
  • 10. 
    How are microcontrollers classified on the basis of internal bus width?

  • 8,16,32,64 bits
  • 4,8,16,32 bits
  • 8,16 bits
  • 4,16,32 bits
  • 11. 
    How does the microcontroller communicate with the external peripherals / memory?

  • via I/O ports
  • via register arrays
  • via memory
  • all of the above
  • 12. 
    What is the file extension that is loaded in a microcontroller for executing any instruction?

  • .doc
  • .c
  • .txt
  • .hex
  • 13. 
    What is the order decided by a processor or the CPU of a controller to execute an instruction?

  • decode,fetch,execute
  • execute,fetch,decode
  • fetch,execute,decode
  • fetch,decode,execute
  • 14. 
    Which of the following statements is true regarding the risk of next-generation vehicles?

  • There are minimal risks when next-generation automobiles share information.
  • Passing traffic and other information between vehicles does not increase security risks.
  • The sharing of navigation and other inputs between vehicles presents a potential security issue.
  • Time-to-market and cost minimization have minimal impact on potential risks being exploited.
  • 15. 
    Microprocessor is the __________ of the computer and it perform all the computational tasks

  • main
  • heart
  • important
  • brain
  • 16. 
    This can be used to generate a clock pulse

  • Oscillator
  • Timer
  • Real-Time Clock
  • 17. 
    Which of the following statements is true about printers and multifunction devices?

  • They rely on the computer to manage the printing and scanning processes.
  • Because of their long history and widespread use, security is designed into these products.
  • These devices communicate in a bidirectional fashion, accepting print jobs and sending back job status, printer status, and so forth.
  • So far, they have not been shown to be hackable or capable of passing malware to the computer.
  • 18. 
    Which of the following poses a significant potential risk of unmanned aerial vehicles?

  • They have sophisticated autopilot functions.
  • They have cameras, sensors, and payloads.
  • Some models have a low price.
  • Because they are pilotless, their remote-control systems may be networked and therefore vulnerable to potential risks.
  • 19. 
    A microprocessor is a ___________ chip integrating all the functions of a CPU of a computer

  • multiple
  • single
  • double
  • triple
  • 20. 
    Embedded systems are

  • General Purpose
  • Special Purpose
  • 21. 
    What distinguishes real-time operating systems (RTOSs) from general-purpose operating systems?

  • Unlike RTOSs, most general-purpose operating systems handle interrupts within defined time constraints
  • Unlike general-purpose OSs, most RTOSs are capable of multitasking by design.
  • Unlike RTOSs, most general-purpose operating systems are multitasking by design.
  • Unlike general-purpose OSs, RTOSs are designed to handle multiple threads.
  • 22. 
    Which of the following statements is not true about system on a chip?

  • It provides the full functionality of a computing platform on a single chip.
  • It typically has low power consumption and efficient design.
  • Programming of SoC systems can occur at several different levels, and thus potential risks are easily mitigated.
  • Because SoC represents computing platforms with billions of devices worldwide, it has become a significant force in the marketplace.
Report Question
warning
access_time
  Time