Final Flashcards

(27 cards)

1
Q

After the threat actor gains access to the network, four types of threats may arise.

A

Information theft

Data loss and manipulation

Identity theft

Disruption of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This includes physical damage to servers, routers, switches, cabling plant, and workstations

A

Hardware threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).

A

Environmental threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.

A

Electrical threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This includes poor handling of key electrical components electrostatic discharge ), lack of critical spare parts, poor cabling, and poor labeling.

A

Maintenance threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a type of malware that propagates by inserting a copy of itselt into, and becoming part of another program. It spreads from one computer to another, leaving infections as it travels.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate .

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a harmful piece of software that looks legitimate. Unlike viruses and worms, Trojan horses do not reproduce by infecting other files. They self-replicate. Trojan horses must spread through user interaction such as opening an email attachment or downloading and running a file from the Internet or

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The discovery and mapping of systems , services, or vulnerabilities.

A

Reconnaissance attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The unauthorized manipulation of data, system access, or user privileges.

A

Access attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The disabling or corruption of networks, systems, or services.

A

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Implemented using brute force, trojan horse, and packet sniffers.

A

Password attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A threat actor unauthorized privileges to gain access to o system, possibly compromising the target.

A

Trust exploiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A threat actor uses a compromised system as a base for attacks against other targets. For example, a threat actor using SSH (port 22) to connect to a compromised host A. Host A is trusted by host B and, therefore, the threat actor can use Telnet port 23) access it.

A

Port redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.

A

Man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Short circuit evaluation can occur with the AND gate when:

A

The first operand is FALSE

17
Q

Generally, how many possible input combinations exist for a gate with n inputs?

18
Q

Which of the following determines the output of a combinational circuit?

A

The input values only

19
Q

Which of the following is not true for creating groups to simplify an expression using kmaps?

A

Groups should contain two or more ones.

20
Q

Line to a combinational device turns the device on or off.

If 0 = output is 0
If 1 = output depends on other inputs

21
Q

Selects one of several data inputs to be routed to a single data output.

22
Q

Takes a binary number as input and sets one of the data output lines to 1 and the rest to 0

A

Binary decoder

23
Q

Routes a single input value to one of several output lines

A

Demultiplexer

24
Q

Adds the right most two bits of a binary number

25
Adds one column of a binary number
Full adder
26
Adds two n-bit binary numbers
Ripple carry adder
27
When computing the V bit you can only get overflow in one of two cases:
A and B are positive and the result is negative A and B are both negative and the result is positive