IT Computer Security JEOPARDY
RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands Viruses Spyware Web Security Web Security Security Security Threats Prevention Removal ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄
Question A program written with malicious intent. Viruses 100 A: What is a virus?
Question A: What is a worm? A self-replicating program that is harmful to networks Viruses
Question A: What is a Trojan? This is often disguised as useful software. Viruses 300
Question A: What is Consume the Network Bandwidth? Worms are harmful in a network because they do this to network bandwidth. Viruses 400
Question A: What is a Keylogger? A virus that records anything typed into the computer by the keyboard and sends a log to the virus author. Viruses 500
Question A: What is Adware? Displays advertising on the user’s computer. Spyware
Question A: What is Spyware? Monitors activity on the computer. Spyware 200
Question A: What is a Tracking Cookie? A file that may or may not be harmful that tracks user web browsing behaviour Spyware 300
Question A: What is a Shareware/Bundled Software? Installing this type of software is usually how adware is installed on a user’s system. Spyware 400
Question A: What is Grayware or Malware? Unwanted software designed to infiltrate a computer system and send out personal information. Spyware 500
Question A: What are ActiveX, Java, Javascript? Two of the three web tools that attackers use to install a program on a computer Web Security 100
Question A: What are pop-ups? Multiple windows appearing on the screen above your browser window. Web Security 200
Question A: What is spoofing? A form of attack to gain access to resources on devices by pretending to be a trusted computer or website. Web Security 300
Question A: What is the Internet Security Bar? This prompt will appear in IE to prevent unwanted software from being installed by websites. Web Security 400
Question A: What is the Security Tab? This tab found in the Internet Options will allow you to customize your ActiveX, Java and Cookie settings. Web Security 500
Question A: What is a Physical Threat? An event or attack that results in theft or damage of office hardware such as switches, servers, laptops, etc. Security Threats 100
Question A: What is a Data Threat? An event or attack that results in the removal, corruption, or unauthorized access of confidential information. Security Threats 200
Question A: What is an Unstructured Attack? When attackers use available resources such as a passwords or scripts to gain unauthorized access to a network. Security Threats 300
Question A: What is a Structured Attack? When attackers use code to access operating systems and software. Security Threats 400
Question A: What are Internal Threats? Accidental or intentional attacks from company employees. Security Threats 500
Question A: What are No Subject Line, Incomplete return address, Computer general , Return not sent by user? Two common indications of SPAM e- mail that anti-spam software will recognize. Prevention 100
Question A: What is System Restore? This can be disabled to prevent reinfection of your system should you ever decide to ‘roll back’ to a previous saved point. Prevention 200
Question A: What is Spybot’s TeaTimer & SD Helper? When installed, it can monitor your computer system and prevent further infection from unauthorized changes by Spyware programs. Prevention 300
Question A: What are Operating System and Software Updates and Patches? Installing these will ensure your system’s security is up to date and any known vulnerabilities are eliminated. Prevention 400
Question A: What is a Pop-up Blocker? This type of software will prevent websites from displaying annoying and unwanted windows. Prevention 500
Question A: What is the Advanced Startup Menu & Safe Mode? Pressing F8 at the beginning of the computer’s bootup sequence will allow you access to this Windows feature.. Removal 100
Question A: What is normal mode? After scanning for a virus in Safe Mode, an additional scan should be run in this mode Removal 200
Question A: What is Two? The number of different spyware scanners you should utilize when removing spyware. Removal 300
Question A: What is Delete or Move to Vault/Quaruntine? This should be done when a virus is detected on your system by your anti- virus program. Removal 400
Question A: What is a boot-time scan? This type of virus scan should be done if you suspect your computer has a startup or boot sector virus. Removal 500
Question A: What are computer starts acting abnormally, program does not respond to mouse and keystrokes, program starting or shutting down on their own, CPU usage is high, unidentifiable or large number of processes running, computer slows down significantly or crashes, program begins sending out large quantities of ? These are three signs that your computer may be infected. Final Jeopardy