Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2015 Air Force Association

Similar presentations


Presentation on theme: "© 2015 Air Force Association"— Presentation transcript:

1 © 2015 Air Force Association

2 Instructions Before playing:
Identify and mark a 3-point and 4-point line away from a garbage can or another receptacle Wad up a piece of paper or have a ball handy Split into teams. Each team will start with ten Xs. Teams will take turns answering questions. If your team answers its question correctly, you can choose to take a shot from the 3-point or 4-point line. If you make your shot, you can erase a total of three or four Xs from other teams. If you miss, you can still take a total of two Xs from other teams. The last team with Xs win.

3 What directs traffic within a network?
ANSWER: Switch

4 How does anti-virus software work?
ANSWER: It scans your files/software for matches in a regularly updated database of known malware

5 What is ROM short for? ANSWER: Read-Only Memory

6 What do you call social engineering attempts sent by text message?
ANSWER: Smishing

7 Confidentiality, Integrity, Availability
The three main goals of info security are to maintain information C______ I______ A______ ANSWER: Confidentiality, Integrity, Availability

8 What do you call a password cracking attempt that tests all possible combinations of letters, numbers, and characters? ANSWER: Brute Force Cracking

9 What maximum password age do we recommend for standard user accounts?
ANSWER: 90 days

10 Host [operating system]
When working with virtual machines, what do you call the OS on the physical computer? ANSWER: Host [operating system]

11 Name at least two cybersecurity tools displayed in Action Center
POSSIBLE ANSWERS: Firewall, Anti-Virus, Windows Updates

12 Password Policies and Account Lockout Policies
What two types of security settings can you find in the Local Security Policy menu? ANSWER: Password Policies and Account Lockout Policies

13 What is one benefit of working with virtual machines?
POSSIBLE ANSWERS: Can run multiple OSs on one computer, can use to test software in a safe environment, saves money/real estate, portable

14 What do we recommend for minimum password length?
ANSWER: At least ten characters

15 How long should an account stay locked out before a user can try to log in again?
ANSWER: 30 minutes

16 What free anti-malware program did we recommend installing?
ANSWER: Microsoft Security Essentials

17 Where should symbols be placed in your password?
ANSWER: In the middle!

18 What type of malware can spread without human assistance?
ANSWER: Worm

19 Fingerprints and retina scans are examples of this type of authentication tool.
ANSWER: Biometrics

20 What is the only type of malware that Windows Defender protects against?
ANSWER: Spyware

21 For which of these network types should you have Windows Firewall enabled: Home, Public, Work?
ANSWER: All of them

22 If you allow a certain program through a firewall, what are you making?
ANSWER: An exception

23 What is the name of the day when Windows Updates are released?
ANSWER: Patch Tuesday

24 What device is used to connect networks with each other?
ANSWER: Router

25 Name three of the most commonly used (and insecure) passwords.
POSSIBLE ANSWERS: 123456, password, qwerty, letmein, welcome, dragon, iloveyou

26 Your lights can be turned on by an app, your refrigerator reminds you to buy milk, you can look at your home security camera from your phone…what do we call this? ANSWER: The Internet of Things

27 Which of these four words does not have the same meaning as the other three: virtual machine, snapshot, image, guest. ANSWER: Snapshot

28 Name a limitation or downside of virtual machines.
ANSWER: Performance depends on host machine, have a single point of failure, pull resources from the host

29 If you enable complexity requirements, how many types of characters must users have in their passwords? ANSWER: Three

30 How many old passwords should you set your computer to remember?
ANSWER: Five


Download ppt "© 2015 Air Force Association"

Similar presentations


Ads by Google