IT Essentials 1 Chapter 9 JEOPADY
RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands Viruses Security Threats TCP/IP Attacks Security Security Procedures Preventative Maintenance Trouble- shooting ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄
Question A program written with malicious intent. Viruses 100 A: What is a virus?
Question A: What is a worm? A self-replicating program that is harmful to networks Viruses
Question A: What is a Trojan? Often disguised as useful software. Viruses 300
Question A: What is Consume Bandwidth? Worms are harmful in a network because they_____________. Viruses 400
Question A: What is a Stealth Virus. Type of virus that lays dormant until summoned by the attacker Viruses 500
Question A: What is Adware? Displays advertising on the user’s computer. Security Threats
Question A: What is Spyware? Monitors activity on the computer. Security Threats 200
Question A: What is Phishing? Attacker pretends to represent a legitimate outside organization. Security Threats 300
Question A: What is a Social Engineer? A person that is able to gain access to private information through tricks. Security Threats 400
Question A: What is ActiveX, Java, or JavaScript Two of the three web tools that attackers use to install a program on a computer Security Threats 500
Question A: What is zombies? These infected computers make tracing the origin of the DoS attack difficult to locate. TCP/IP Attacks 100
Question A: What is usernames and passwords? Information extracted from a replay attack. TCP/IP Attacks 200
Question A: What is spoofing? A form of attack to gain access to resources on devices by pretending to be a trusted computer TCP/IP Attacks 300
Question A: What is SYN flood? A specific type of DoS attack via random TCP/IP ports TCP/IP Attacks 400
Question A: What is DNS Poisoning? A technique to redirect to false servers containing malicious content TCP/IP Attacks 500
Question A: What is NTFS? A file system with increased security and compatibility. Security Procedures 100
Question A: What is a Security Policy? A list of definitions to describe how a company addresses security issues. Security Procedures 200
Question A: What is BIOS and Login? Two levels of password protection. Security Procedures 300
Question A: What is Cable Locks, RFID tags, Berg Connectors, Biometric Sensors, Security Guards and Security Cages? List two methods of physical security. Security Procedures 400
Question A: What is a WPA2? An encryption format covering the entire i standard. Security Procedures 500
Question A: What is a signature? Patterns in the programming code of the software in a computer – used by antivirus programs to identify threats. Preventative Maintenance 100
Question A: What is a patch? Code update provided by manufacturers of operating systems and software applications. Preventative Maintenance 200
Question A: What is a Service Pack? A comprehensive update application which combines patches and upgrades. Preventative Maintenance 300
Question A: What is 3 AM? Default time for Windows Update to install updates and patches. Preventative Maintenance 400
Question A: What is Create a Restore Point? The first step when installing service packs and security patches. Preventative Maintenance 500
Question A: What is slow computer operation OR slow Internet connection? A common sign that a computer may have a virus Troubleshooting 100
Question A: What is That the problem has been solved? In Closing with the customer, you should have them verify _____________. Troubleshooting 200
Question A: What is Other Techs, Internet Search, News Groups, Manufacturer FAQs, Manuals, Online Forums, Technical Websites Two resources that could be used to Evaluate the Problem. Troubleshooting 300
Question A: What is 128-bit WEP, WAP, or EAP-Cisco ? One type of security that is better than 64-bit WEP. Troubleshooting 400
Question A: What is Scan the Computer, Reboot, Login as different user, Check for OS updates/patches, update anti-virus signatures, change password? Two Quick Solutions for virus problems Troubleshooting 500
Question A: What is a Biometric sensor? Identifies physical characteristics of the user, such as fingerprints or retinas Final Jeopardy