Hardware Vulnerabilities Flashcards

1
Q

What are legacy Systems?

A

outdated computing software, hardware, or technologies that while they’re still in use, have been largely superseded by newer or more efficient alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Hardware Vulnerabilities?

A

Security flaws or weaknesses in a devices physical components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Firmware?

A

specialized form of software that’s stored on a hardware device like a router or a smart thermostat that’s going to provide low level control for the devices specific hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are End-of-Life Systems?

A

refer to hardware or software products that have reached the end of their lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Unsupported Systems?

A

hardware or software products that no longer receive official technical support, security updates or patches from their respective vendors or developers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Unpatched Systems?

A

a device, application or piece of software that has not been updated with the latest security patches, so it now remains vulnerable to known exploits and attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Hardware Misconfiguration?

A

occurs when a device’s settings, parameters or options are not optimally set up, and this can cause vulnerabilities to exist, a decrease in performance or unintended behavior of your devices or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Hardening?

A

Tightening the security of your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Patching?

A

regular updating of your software, firmware and applications with the latest security patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Configuration Enforcement?

A

used to ensure that all devices and systems adhere to a standard secure configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Decommissioning?

A

system is going to be retired and removed from your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Isolation?

A

limit the potential damage that could occur from a potential security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Segmentation?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly