Hardware Flashcards

0
Q

Briefly describe what is meant by ‘mainframes’…

A

Very large machines with their own computer rooms and support systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

List six main types of hardware

A
Mainframe
Servers
UPS
Desktop
Portable
Digital Mobile Phones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

— are often as powerful as a mainframe, but do not require a dedicated computer room

A

Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Groups of servers supporting applications are known as — —

A

Server farms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Servers may form part of an outsourcing contract, now usually known as the —

A

Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UPS stands for…

A

Uninterruptible power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If a desktop is dependent on a server for its software, it is known as a — —

A

Thin client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If a desktop contains all the software it needs, it is known as a — —

A

Fat client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If a desktop is entirely dependent on an internet-based server for its operation, it is known as a — computer

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If a desktop is not connected to a network, it is known as a — — machine

A

Stand-alone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three main types of portable devices?

A

Laptops
Tablets
PDAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three types of mobile workers?

A

Road warriors
Telecommuters
Hotdeskers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe ‘road warriors’…

A

They work away from the office but cannot connect back to office systems as required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the chief characteristic of telecommuters?

A

They have a dedicated working environment at home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main risk where telecommuters are concerned, and how should they handle it.

A

The main risk is security. The company should ensure there is appropriate protection on the network as well as the home machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Briefly describe ‘hotdesking’…

A

Where staff have no dedicated desk and use whatever facilities are available when in the office.

16
Q

What is a firewall?

A

A specially configurable device providing a controllable means of connecting one or more networks

17
Q

What are the two basic configurations of a firewall?

A

Deny all

Accept all

18
Q

What does it mean if a firewall is configured to deny all?

A

Nothing is allowed through unless configured to specifically allow

19
Q

What does it mean when a firewall if configured to accept all?

A

Everything is allowed through unless configured to specifically deny.

20
Q

Premises for the use of a firewall should be properly —

A

Documented

21
Q

List a few example premises of a firewall that should be documented…

A

Network traffic to and from outside networks must travel through firewall to allow only authorised packets.
No services may be run on the firewall except those specifically required to provide firewall services.
Firewall must not be used for general purpose file storage or to run programs, except those required by the firewall.
Under no circumstances should any passwords or internal addresses cross the firewall onto the internet.
All public services should be placed on outside of firewall.
Maintain adequate backups to enable restoration of systems in event of attack.

22
Q

What is a Demilitarised Zone (DMZ)?

A

A network containing all the tools needed to ensure the internal network is only used for authorised purposes.

23
Q

What four types of tools might you expect to find in the DMZ?

A

Virus scanner
Hostile applet scanner
Net nanny
Remote authentication software

24
Q

What does a virus scanner do?

A

Scans incoming files an email for viruses

25
Q

What does a hostile applet scanner do?

A

Prevents Active-X or Java applets from damaging internal systems

26
Q

What does a net nanny do?

A

Controls access to undesirable sites

27
Q

What does Remote Authentication Software do?

A

Validates users accessing the internal network from a remote location or across the internet.

28
Q

What is the overriding risk where hardware is concerned?

A

Hostile access to the hardware

29
Q

What are the two types of hostile access someone could gain to hardware?

A

Physical contact

Logical contact

30
Q

What eight kinds of damage can be done through physical contact with hardware?

A
Hardware theft
Taking apart and removal of components
Adjusting the setup
Destroying the equipment
Accessing computer programs
Changing software settings or defaults
Inserting malicious code
Attaching devices such as keystroke loggers
31
Q

What damage to hardware can be done via logical contact?

A

Programs can be run that damage the hardware.

32
Q

List seven access points for hostile access to hardware…

A
Modem
Backup devices
Network connection equipment
Servers
Keyboard
Internet
Removable media