Download presentation
Presentation is loading. Please wait.
1
© 2015 Air Force Association
2
Instructions Before playing:
Identify and mark a 3-point and 4-point line away from a garbage can or another receptacle Wad up a piece of paper or have a ball handy Split into teams. Each team will start with ten Xs. Teams will take turns answering questions. If your team answers its question correctly, you can choose to take a shot from the 3-point or 4-point line. If you make your shot, you can erase a total of three or four Xs from other teams. If you miss, you can still take a total of two Xs from other teams. The last team with Xs win.
3
What directs traffic within a network?
ANSWER: Switch
4
How does anti-virus software work?
ANSWER: It scans your files/software for matches in a regularly updated database of known malware
5
What is ROM short for? ANSWER: Read-Only Memory
6
What do you call social engineering attempts sent by text message?
ANSWER: Smishing
7
Confidentiality, Integrity, Availability
The three main goals of info security are to maintain information C______ I______ A______ ANSWER: Confidentiality, Integrity, Availability
8
What do you call a password cracking attempt that tests all possible combinations of letters, numbers, and characters? ANSWER: Brute Force Cracking
9
What maximum password age do we recommend for standard user accounts?
ANSWER: 90 days
10
Host [operating system]
When working with virtual machines, what do you call the OS on the physical computer? ANSWER: Host [operating system]
11
Name at least two cybersecurity tools displayed in Action Center
POSSIBLE ANSWERS: Firewall, Anti-Virus, Windows Updates
12
Password Policies and Account Lockout Policies
What two types of security settings can you find in the Local Security Policy menu? ANSWER: Password Policies and Account Lockout Policies
13
What is one benefit of working with virtual machines?
POSSIBLE ANSWERS: Can run multiple OSs on one computer, can use to test software in a safe environment, saves money/real estate, portable
14
What do we recommend for minimum password length?
ANSWER: At least ten characters
15
How long should an account stay locked out before a user can try to log in again?
ANSWER: 30 minutes
16
What free anti-malware program did we recommend installing?
ANSWER: Microsoft Security Essentials
17
Where should symbols be placed in your password?
ANSWER: In the middle!
18
What type of malware can spread without human assistance?
ANSWER: Worm
19
Fingerprints and retina scans are examples of this type of authentication tool.
ANSWER: Biometrics
20
What is the only type of malware that Windows Defender protects against?
ANSWER: Spyware
21
For which of these network types should you have Windows Firewall enabled: Home, Public, Work?
ANSWER: All of them
22
If you allow a certain program through a firewall, what are you making?
ANSWER: An exception
23
What is the name of the day when Windows Updates are released?
ANSWER: Patch Tuesday
24
What device is used to connect networks with each other?
ANSWER: Router
25
Name three of the most commonly used (and insecure) passwords.
POSSIBLE ANSWERS: 123456, password, qwerty, letmein, welcome, dragon, iloveyou
26
Your lights can be turned on by an app, your refrigerator reminds you to buy milk, you can look at your home security camera from your phone…what do we call this? ANSWER: The Internet of Things
27
Which of these four words does not have the same meaning as the other three: virtual machine, snapshot, image, guest. ANSWER: Snapshot
28
Name a limitation or downside of virtual machines.
ANSWER: Performance depends on host machine, have a single point of failure, pull resources from the host
29
If you enable complexity requirements, how many types of characters must users have in their passwords? ANSWER: Three
30
How many old passwords should you set your computer to remember?
ANSWER: Five
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.