Introduction to Computer Hardware
37 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of malware?

  • To protect users from cyber threats
  • To enhance system performance
  • To secure confidential information
  • To harm, exploit, or compromise devices or data (correct)
  • Which of the following statements best describes a computer virus?

  • It requires no human interaction to spread
  • It attaches to executable files to spread and cause damage (correct)
  • It is designed to protect data from theft
  • It only affects mobile devices
  • What is a common characteristic of computer viruses?

  • They can spread themselves without any user action
  • They are always visible to the user
  • They primarily exist in physical formats such as discs
  • They often result in data loss and system crashes (correct)
  • Which method is NOT typically used by computer viruses to spread?

    <p>Direct virus programming by the user (D)</p> Signup and view all the answers

    Which type of malware can encompass various forms, including file infectors and macro viruses?

    <p>Computer viruses (A)</p> Signup and view all the answers

    What is the primary function of the terminal in command line tools?

    <p>To execute and type commands (B)</p> Signup and view all the answers

    Which command is specifically used to create a new directory?

    <p>mkdir (B)</p> Signup and view all the answers

    What type of cyber attack is designed to gain unauthorized access to sensitive data?

    <p>Phishing (C)</p> Signup and view all the answers

    Why is it advised to avoid using certain commands like 'format' and 'diskpart'?

    <p>They can erase critical data (B)</p> Signup and view all the answers

    Which of the following is NOT a common type of cyber attack?

    <p>Firewall (C)</p> Signup and view all the answers

    What is the primary role of internet service providers (ISPs) in relation to personal data?

    <p>To track and sell user data to advertisers (C)</p> Signup and view all the answers

    What kind of malware specifically disrupts computer operations and damages data?

    <p>Computer Virus (A)</p> Signup and view all the answers

    Which command displays a list of files and subdirectories in a directory?

    <p>ir (D)</p> Signup and view all the answers

    What does the Processing State refer to?

    <p>Data being used to perform an operation (D)</p> Signup and view all the answers

    Which of the following describes the Storage State of data?

    <p>Data that is not currently being accessed (A)</p> Signup and view all the answers

    What does Technology refer to in the context of cybersecurity?

    <p>Software and hardware solutions for protection (A)</p> Signup and view all the answers

    Which level of protection is NOT included among the three levels required in cybersecurity?

    <p>Individual Level (A)</p> Signup and view all the answers

    What is the primary purpose of security measures in data protection?

    <p>To protect data from unauthorized access and threats (B)</p> Signup and view all the answers

    Which of the following best defines a cyber threat?

    <p>A potential risk that could exploit a vulnerability (B)</p> Signup and view all the answers

    How are internal threats distinguished from external threats?

    <p>Internal threats originate from within the organization. (B)</p> Signup and view all the answers

    What role does awareness, training, and education play in cybersecurity?

    <p>They ensure users are knowledgeable about threats and protections. (B)</p> Signup and view all the answers

    What is one of the primary goals of a SecOps team?

    <p>To resolve security incidents quickly (C)</p> Signup and view all the answers

    How does using unified SecOps tools benefit an organization?

    <p>By closing security gaps and improving resiliency (A)</p> Signup and view all the answers

    What does the term GRC stand for?

    <p>Governance, Risk, Compliance (A)</p> Signup and view all the answers

    Which aspect is NOT a focus of governance in a business context?

    <p>Defining strategies for risk management (D)</p> Signup and view all the answers

    Which of the following is a benefit of implementing GRC in an organization?

    <p>Reduction of noncompliance risk (C)</p> Signup and view all the answers

    What type of risks does proper risk management help businesses identify?

    <p>Financial, legal, strategic, and security risks (D)</p> Signup and view all the answers

    What is one key feature of good governance?

    <p>Ethics and accountability (C)</p> Signup and view all the answers

    What does enterprise risk management help with?

    <p>Minimizing losses by predicting issues (A)</p> Signup and view all the answers

    What is spear phishing primarily aimed at?

    <p>A specific person or organization (D)</p> Signup and view all the answers

    What is the main goal of CEO fraud or whaling?

    <p>To impersonate a high-ranking executive for financial gain (C)</p> Signup and view all the answers

    Which method is used in smishing attacks?

    <p>Text messages delivering phishing content (B)</p> Signup and view all the answers

    What is data tampering characterized by?

    <p>Unauthorized modification of data (C)</p> Signup and view all the answers

    What is the primary goal of a Denial of Service (DoS) attack?

    <p>To overload the target system, making it incapable of responding. (A)</p> Signup and view all the answers

    Which of the following statements about Distributed Denial of Service (DDoS) attacks is true?

    <p>DDoS attacks can utilize a botnet of compromised devices. (C)</p> Signup and view all the answers

    Which of the following is NOT a potential goal of cyber attacks mentioned?

    <p>Steal intellectual property. (D)</p> Signup and view all the answers

    How does a DDoS attack typically initiate?

    <p>Through a coordinated effort of multiple devices sending requests. (D)</p> Signup and view all the answers

    Study Notes

    What is a Computer?

    • A computer is an electronic device that accepts data as input.
    • It processes data using a set of instructions.
    • It produces meaningful results as output.
    • Computers store, retrieve, and process data.
    • They employ a combination of hardware and software.

    Computer Hardware

    • This refers to the physical components of a computer system.
    • Components include the processor (CPU), memory, storage, input/output, and peripherals.
    • Hardware provides a platform for running software applications.
    • Consists of various mechanical, electrical, and electronic components.
    • Hardware components can be classified as internal and external.
    • Internal Components: Motherboard, CPU, CPU Heatsink, SMPS, RAM, Graphics Card, Hard Disks/Disk Memory.
    • External Components: Computer Case, Connection Sockets, Computer Display Monitor, Computer Keyboard, Computer Mouse, Printer & Power Supply Cable, External USB Hard Disks.

    Functions of Hardware Components

    • Computer Case/Cabinet: A metal enclosure for organizing and assembling internal hardware components.
    • Motherboard: The largest printed circuit board, acts as a central hub connecting all hardware components. It manages data flow and power allocation.

    CPU (Processor)

    • The CPU is responsible for executing most commands.
    • 'Clock speed' measures the speed at which it does this (in GHz).
    • Key components include ALU (Arithmetic Logic Unit) and the Control Unit (CU).
      • ALU performs arithmetic and logical operations.
      • CU manages data flow and directs CPU operations.
    • Registers are small, fast memory units for temporary data storage.
    • Cache memory stores frequently used data close to the CPU for quicker access.
    • Buses facilitate communication among the CPU and other components (e.g., data bus, address bus, control bus).
    • A Clock synchronizes operations.

    Power Supply Unit (PSU)

    • Supplies stable electrical power.
    • Converts AC to DC electricity.
    • Standard desktop computer's power cord connects to the PSU.

    Memory Unit (RAM)

    • Stores data, instructions, and information.
    • RAM is essential for fast data access for immediate processing.
    • RAM is temporary storage, erased when the computer is turned off.
    • There exist various types of computer memory (e.g., DRAM, SRAM).

    Read-Only Memory (ROM)

    • Stores firmware or software instructions.
    • Non-volatile memory—data remains stored even when power is off.
    • ROM is used during the computer booting or bootstrapping process.

    Types of ROM (ROM chips):

    • PROM: Programmable Read-Only Memory, written to once.
    • EPROM: Erasable Programmable Read-Only Memory, rewritten with UV light.
    • EEPROM: Electrically Erasable Programmable Read-Only Memory, rewritten with an electric charge.
    • Flash Memory: Re-writable; often used in mobile devices and flash drives.

    Secondary Memory (HDD/SSD)

    • Long-term storage for digital content, operating system, and programs.
    • HDD is a traditional hard disk drive that's slower than SSD.
    • SSD is a newer form of long-term storage that uses flash memory and is faster and more reliable than HDD.

    Graphics Card (GPU)

    • Processes images and videos to display on the computer monitor.
    • Processes images for presentation.

    Ports

    • Ports are connection points that extend the functionality of a computer by connecting devices.

    Computer Software

    • A set of instructions that direct the computer's operations.
    • Software is categorized as System and Application Software.
    • System Software: Manages core functions, allows application software to operate, manages hardware resources (e.g., operating systems, utilities, etc.)
    • Application Software: Application software performs tasks for the user (e.g., word processors).

    Utility Software

    • Essential for computer maintenance.
      • Example: antivirus, disk cleanup tools, system optimizers.

    Device Drivers

    • Specialized software allowing an operating system to communicate with hardware.
    • They act as a bridge between the OS and the hardware components or devices.

    BIOS

    • The basic input/output system program that a computer's microprocessor uses to start the computer system.
    • Controls the flow of data between the OS and attached peripheral devices.

    UEFI

    • Unified Extensible Firmware Interface.
    • More modern firmware interface, replacing BIOS.

    Operating System

    • An interface between users and hardware.
    • Manages resources, CPU, file management.
    • Makes the computer system more convenient and efficient.

    Program/Process/Thread

    • Program: A set of instructions.
    • Process: The set of instructions in execution (active program).
    • Thread: A single sequence of control within a program.

    Types of Operating Systems

    • Single-Processor OS: Manages a system with a single CPU.
    • Batch OS: Processes groups of similar jobs without interaction.
    • Multiprogramming OS: Executes multiple programs on a single processor; utilizes the CPU efficiently when one program waits on input/output operations.
    • Multitasking/Time-Sharing OS: Allows multiple tasks to execute concurrently (or on the same processor).
    • Multiprocessing OS: Uses multiple CPUs to improve performance by processing tasks in parallel.
    • Distributed OS: Multiple computer systems communicate through a single communication channel.
    • Real-Time OS: Processes data and tasks within strict time constraints (e.g. Air Traffic Control).

    Kernel Space/User Space

    • Kernel Space: A protected area of memory where the "kernel" works.
    • Kernel: Responsible for everything (e.g., scheduling processes, managing memory, and handling interrupts); has complete control over the system.
    • Kernel provides functions that are essential for the operating system.
    • User Space: User-facing applications and processes operate here.
    • User-mode application cannot directly access hardware resources and must use system calls to access the kernel.

    System Call Interface (SCI)

    • Acts like a receptionist.
    • Facilitates communication between user applications and kernel.

    Interrupts

    • A signal sent to the processor to indicate an event.
    • Can temporarily halt the current task ensuring efficient operation.
    • Interrupt Service Routine (ISR) is executed in response.

    Types of Kernels

    • Monolithic kernel: Combines core OS functionality in a single memory space, and enables faster process execution.
    • Microkernel: Contains only essential services and separates user and kernel services in distinct memory spaces, reduces OS size.
    • Hybrid kernel: Combines characteristics of both monolithic and microkernels.

    IPC (Interprocess Communication)

    • Medium of conversion between user mode and kernel mode.
    • Methods include Message Passing and Shared Memory.

    Malware

    • Any software designed to harm, exploit, or compromise devices, networks, or data.

    Types of Attackers

    • Amateurs: Script kiddies (inexperienced hackers, use pre-made tools).
    • Hackers: White hat (identify and report vulnerabilities, usually have permission), Gray hat, Black hat (take advantage of vulnerabilities for personal gain), Organised Hackers (State-sponsored, Terrorist groups).

    Cyber Warfare

    • Use of technology to attack another nation's computer systems.

    Computer Viruses

    • Malicious software that spreads between computers.
    • Can disrupt operations, cause data loss, crash systems, and security breaches.

    Worms

    • Self-replicating malware, automatically spreads to other computers, causing disruption.

    Denial of Service Attacks (DoS/DDoS)

    • Malicious attempts to overload a network, preventing legitimate access.
    • Types include DoS and DDoS (distribute denial of service).

    Interception

    • Capture of information in transit between computers or devices.
    • Improper encryption leaves information vulnerable to misuse.

    Man-in-the-Middle Attack

    • Attacker secretly intercepts communications between two parties.
    • Modifies messages or data, without the parties' knowledge.

    Phishing

    • Pretending to be someone/something to gain sensitive data like passwords.
    • Example: sending fraudulent emails or messages.
    • Types: Phishing, Spear Phishing, CEO Fraud (or Whaling), Smishing, Vishing.

    Pretexting

    • Making false claims to gain sensitive information from people. (e.g., impersonating a bank worker or social worker)

    Tailgating/Social Engineering

    • Exploits trust and social connections, may include pretending to be someone you know.
      • Example: Following someone into a building or gaining access physically/digitally in person.

    Cryptocurrency

    • A digital currency, using encryption algorithms.
    • Functioning as both a currency and virtual accounting system.

    Security Architecture

    • Strategic design of systems, policies, and technologies to protect IT and business assets from cyber threats.

    Risk Assessment

    • Identifying potential security gaps and cyber threats.
    • Determining how well the organization addresses those threats.

    Threat Intelligence

    • Analysis of data to generate meaningful information about emerging threats.
    • Helping anticipate or mitigate cyber threats.

    Security Operations (SecOps)

    • Integrating security measures and processes for enhanced cyber resiliency within an IT operation.

    GRC (Governance, Risk, and Compliance)

    • Structured way to align IT with business goals, manage risks, and ensure compliance.
    • Unification of the company's governance, risk management, technological innovation, and compliance efforts.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Cybersecurity Notes PDF

    Description

    This quiz covers the basic concepts of what a computer is, including its definition and the functions of its hardware components. You will learn about internal and external hardware, as well as the role each part plays in the computer system. Ideal for beginners looking to understand the fundamentals of computer hardware.

    More Like This

    Computer Hardware Components
    8 questions

    Computer Hardware Components

    FlatteringBronze7707 avatar
    FlatteringBronze7707
    Overview of Computer Hardware
    10 questions

    Overview of Computer Hardware

    VirtuousMoldavite2567 avatar
    VirtuousMoldavite2567
    Use Quizgecko on...
    Browser
    Browser