Final Flashcards
(27 cards)
After the threat actor gains access to the network, four types of threats may arise.
Information theft
Data loss and manipulation
Identity theft
Disruption of service
This includes physical damage to servers, routers, switches, cabling plant, and workstations
Hardware threats
This includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
Environmental threats
This includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
Electrical threats
This includes poor handling of key electrical components electrostatic discharge ), lack of critical spare parts, poor cabling, and poor labeling.
Maintenance threats
a type of malware that propagates by inserting a copy of itselt into, and becoming part of another program. It spreads from one computer to another, leaving infections as it travels.
Viruses
similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate .
Worms
a harmful piece of software that looks legitimate. Unlike viruses and worms, Trojan horses do not reproduce by infecting other files. They self-replicate. Trojan horses must spread through user interaction such as opening an email attachment or downloading and running a file from the Internet or
Trojan horses
The discovery and mapping of systems , services, or vulnerabilities.
Reconnaissance attacks
The unauthorized manipulation of data, system access, or user privileges.
Access attacks
The disabling or corruption of networks, systems, or services.
Denial of service
Implemented using brute force, trojan horse, and packet sniffers.
Password attacks
A threat actor unauthorized privileges to gain access to o system, possibly compromising the target.
Trust exploiation
A threat actor uses a compromised system as a base for attacks against other targets. For example, a threat actor using SSH (port 22) to connect to a compromised host A. Host A is trusted by host B and, therefore, the threat actor can use Telnet port 23) access it.
Port redirection
The threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.
Man in the middle
Short circuit evaluation can occur with the AND gate when:
The first operand is FALSE
Generally, how many possible input combinations exist for a gate with n inputs?
2^n
Which of the following determines the output of a combinational circuit?
The input values only
Which of the following is not true for creating groups to simplify an expression using kmaps?
Groups should contain two or more ones.
Line to a combinational device turns the device on or off.
If 0 = output is 0
If 1 = output depends on other inputs
Enable lines
Selects one of several data inputs to be routed to a single data output.
Multiplexer
Takes a binary number as input and sets one of the data output lines to 1 and the rest to 0
Binary decoder
Routes a single input value to one of several output lines
Demultiplexer
Adds the right most two bits of a binary number
Half adder