023 Device and Storage Security - 023.1 Hardware Security (weight: 2)
31 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which component stores data permanently so that it remains available even when a computer is turned off?

  • Mass storage (correct)
  • Network adapter
  • Central Processing Unit (CPU)
  • Random Access Memory (RAM)
  • What is a key difference between Solid State Disks (SSDs) and traditional hard drives?

  • SSDs are slower but cheaper.
  • SSDs provide faster data access and have no mechanical components. (correct)
  • SSDs cannot be organized into blocks.
  • SSDs have moving mechanical parts.
  • What is the primary function of a processor (CPU) in a computer?

  • Storing data permanently
  • Executing calculations (correct)
  • Providing fast access to temporary data
  • Managing network connections
  • Which statement about Random Access Memory (RAM) is accurate?

    <p>RAM has a higher cost per unit of storage compared to mass storage.</p> Signup and view all the answers

    Which of the following is NOT a type of computer mentioned?

    <p>Gaming console</p> Signup and view all the answers

    What is a characteristic of multiple processors or multicore processors?

    <p>They can handle several tasks simultaneously.</p> Signup and view all the answers

    Why is the capacity of RAM typically lower than that of mass storage?

    <p>RAM is more expensive to manufacture.</p> Signup and view all the answers

    Which of the following devices is an example of a network device?

    <p>Router</p> Signup and view all the answers

    What is the term used for connecting two devices via Bluetooth?

    <p>Pairing</p> Signup and view all the answers

    Which action must a device perform to become discoverable for Bluetooth pairing?

    <p>Broadcast its existence and name</p> Signup and view all the answers

    What must the receiving device do to complete the Bluetooth pairing process?

    <p>Accept the pairing invitation</p> Signup and view all the answers

    Which of the following is a recommended practice to enhance Bluetooth security?

    <p>Perform pairings in restricted areas</p> Signup and view all the answers

    What is a key characteristic of RFID technology?

    <p>Employs a static information transfer method</p> Signup and view all the answers

    What type of device is typically used to read information from RFID tags?

    <p>RFID reader</p> Signup and view all the answers

    What is one of the primary uses of RFID tags in industries?

    <p>Object tracking</p> Signup and view all the answers

    What is the typical operational range of NFC technology?

    <p>Around 4 centimeters</p> Signup and view all the answers

    How do passive NFC devices typically communicate?

    <p>Transmitting fixed information as a tag</p> Signup and view all the answers

    What potential security concern exists with RFID technology?

    <p>Unauthorized reading of tags</p> Signup and view all the answers

    What function do sensors in IoT devices primarily serve?

    <p>To collect information such as temperature</p> Signup and view all the answers

    What potential issue arises from non-encrypted data on a computer?

    <p>Access by anyone with physical access to the computer</p> Signup and view all the answers

    Which of the following statements about USB devices is true?

    <p>USB can connect various types of devices, including storage and input devices.</p> Signup and view all the answers

    What is a key security concern with smart home IoT devices?

    <p>They can be exploited if manufacturers do not provide updates.</p> Signup and view all the answers

    What is the role of actuators in an IoT system?

    <p>To switch devices on or off</p> Signup and view all the answers

    Which technology allows devices to connect wirelessly over short distances?

    <p>Bluetooth</p> Signup and view all the answers

    What should be done before connecting an unknown USB device to a computer?

    <p>Use protective measures to avoid potential threats.</p> Signup and view all the answers

    What is true about the network adapters in devices?

    <p>They can automatically configure themselves with new networks.</p> Signup and view all the answers

    What describes the primary purpose of Trusted Computing?

    <p>To limit the software that can run on a computer</p> Signup and view all the answers

    What can be a consequence of physical access to a computer?

    <p>Manipulation of hardware components</p> Signup and view all the answers

    What is a common advantage of using an IoT platform?

    <p>It centralizes control of connected devices.</p> Signup and view all the answers

    Which of the following best describes mobile networks?

    <p>They enable devices to connect wirelessly wherever there is coverage.</p> Signup and view all the answers

    What challenge do manufacturers face with IoT devices?

    <p>Keeping older devices maintained and updated.</p> Signup and view all the answers

    Study Notes

    Computer Types

    • Computers come in various forms including laptops, desktops, servers, control computers in devices, mobile devices like smartphones and tablets, networking devices like routers, and consumer electronics such as TVs.

    Basic Computer Components

    • Essential components of all computers are processors, memory (RAM), mass storage, and network adapters.

    Processors (CPU)

    • Processors execute calculations and can be single or multi-core to perform multiple tasks in parallel.
    • There are general-purpose processors and those optimized for specific functions.

    Memory (RAM)

    • RAM holds temporarily needed data for ongoing calculations and offers quick access.
    • RAM capacity is less than permanent storage, and it is volatile, meaning data is lost when power is off.
    • RAM costs per unit of storage are higher than that of mass storage.

    Mass Storage

    • Stores data permanently, allowing retention even when the computer is powered down.
    • Traditional hard drives use rotating disks and magnetic heads, while SSDs use memory chips without moving parts.
    • SSDs are faster but generally more expensive and with lower capacities than traditional HDDs, organized into data blocks for efficient storage.

    Network Adapters

    • Connect devices to networks using various technologies, such as wired Ethernet or wireless protocols like Wi-Fi and cellular.
    • Devices can have multiple network adapters and often auto-configure when connecting to new networks.
    • Security precautions are essential due to vulnerability to network-based attacks.

    Physical Access and Security

    • Physical access to computers poses security risks, allowing for potential tampering or data breaches.
    • Trusted Computing limits executable software and detects hardware/software changes to enhance security.

    Internet of Things (IoT)

    • IoT refers to the increasing connectivity of devices that are not traditional computers, including smart home appliances.
    • Smart Home automation uses devices categorized as sensors (to obtain info) and actuators (to perform actions).
    • IoT devices are interconnected to enable centralized control and automation through platforms that can execute rules based on data.

    Security Concerns in IoT

    • IoT platforms typically require cloud connectivity, which poses security risks if vulnerabilities arise.
    • Compatibility issues can arise between devices from different manufacturers, affecting functionality.
    • Older IoT devices might not receive updates from manufacturers, risking exposure to known vulnerabilities.

    Connections and Interfaces

    • USB is a standard for connecting devices to computers with various forms like USB-A and USB-C, commonly used for data transfer and charging.

    USB Device Types

    • USB devices include storage devices, input devices (keyboards, mice), chargers, printers, and network adapters.

    USB Security

    • USB devices can masquerade as other device types for malicious intent. Unknown devices should not be connected without precaution.
    • Specialized adapters can allow only power transfer without data exchange to enhance security.

    Bluetooth Technology

    • Bluetooth connects devices over short distances, typically for audio accessories like headsets and speakers, with a standard range of a few meters.
    • Bluetooth connections are encrypted and require a pairing process between devices.

    Bluetooth Pairing Process

    • Pairing requires one device to broadcast its presence, which the other device can detect and connect to, allowing shared functionalities.

    Bluetooth Security Measures

    • Bluetooth devices should not remain in discoverable mode indefinitely; pairing should take place in secure environments to avoid unauthorized access.
    • Authorization and permissions of devices during pairing must be carefully monitored.

    Radio Frequency Identification (RFID)

    • RFID transmits static information via tags that emit unique identifiers when close to a reader, typically used within a range of half a meter.
    • Widely used in retail and logistics; however, RFID tags can be read without consent, raising privacy concerns.

    Near-field Communication (NFC)

    • NFC is a subset of RFID for communication between devices at very short distances of up to four centimeters.
    • It is commonly used in payment systems and involves both passive (static information) and active (interactive communication) devices.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of various computer types and hardware components with this quiz. It covers laptops, desktops, servers, mobile devices, and network devices. Challenge yourself and see how well you understand the different functionalities and applications of these technologies.

    More Like This

    Network Hardware Devices Quiz
    12 questions
    Basic Components of a Network
    10 questions
    Networking Chapter 7: Connecting Devices
    29 questions
    Use Quizgecko on...
    Browser
    Browser