Evaluation should include the flaws to an operating system and the current and emerging threats, such as viruses, dynamic-link library (DLL) injection, and zero-day vulnerability.
Process/Skill Questions:
What makes an operating system vulnerable to cyberattacks?
What are some commonly exploited vulnerabilities in an operating system?