Download presentation
Presentation is loading. Please wait.
Published bySamson Boyd Modified over 9 years ago
2
IT Essentials 1 Chapter 9 JEOPADY
3
RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500 Viruses Security Threats TCP/IP Attacks Security Security Procedures Preventative Maintenance Trouble- shooting 100 200 300 400 500 100 200 300 400 500 ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄
4
Question A program written with malicious intent. Viruses 100 A: What is a virus? 100 200 300 400 500
5
Question A: What is a worm? A self-replicating program that is harmful to networks Viruses 200 100 200 300 400 500
6
Question 100 200 300 400 500 A: What is a Trojan? Often disguised as useful software. Viruses 300
7
Question 100 200 300 400 500 A: What is Consume Bandwidth? Worms are harmful in a network because they_____________. Viruses 400
8
Question 100 200 300 400 500 A: What is a Stealth Virus. Type of virus that lays dormant until summoned by the attacker Viruses 500
9
Question 100 200 300 400 500 A: What is Adware? Displays advertising on the user’s computer. Security Threats 100 200 300 400 500
10
Question 100 200 300 400 500 A: What is Spyware? Monitors activity on the computer. Security Threats 200
11
Question 100 200 300 400 500 A: What is Phishing? Attacker pretends to represent a legitimate outside organization. Security Threats 300
12
Question 100 200 300 400 500 A: What is a Social Engineer? A person that is able to gain access to private information through tricks. Security Threats 400
13
Question 100 200 300 400 500 A: What is ActiveX, Java, or JavaScript Two of the three web tools that attackers use to install a program on a computer Security Threats 500
14
Question 100 200 300 400 500 A: What is zombies? These infected computers make tracing the origin of the DoS attack difficult to locate. TCP/IP Attacks 100
15
Question 100 200 300 400 500 A: What is usernames and passwords? Information extracted from a replay attack. TCP/IP Attacks 200
16
Question 100 200 300 400 500 A: What is spoofing? A form of attack to gain access to resources on devices by pretending to be a trusted computer TCP/IP Attacks 300
17
Question 100 200 300 400 500 A: What is SYN flood? A specific type of DoS attack via random TCP/IP ports TCP/IP Attacks 400
18
Question 100 200 300 400 500 A: What is DNS Poisoning? A technique to redirect to false servers containing malicious content TCP/IP Attacks 500
19
Question 100 200 300 400 500 A: What is NTFS? A file system with increased security and compatibility. Security Procedures 100
20
Question 100 200 300 400 500 A: What is a Security Policy? A list of definitions to describe how a company addresses security issues. Security Procedures 200
21
Question 100 200 300 400 500 A: What is BIOS and Login? Two levels of password protection. Security Procedures 300
22
Question 100 200 300 400 500 A: What is Cable Locks, RFID tags, Berg Connectors, Biometric Sensors, Security Guards and Security Cages? List two methods of physical security. Security Procedures 400
23
Question 100 200 300 400 500 A: What is a WPA2? An encryption format covering the entire 802.11i standard. Security Procedures 500
24
Question 100 200 300 400 500 A: What is a signature? Patterns in the programming code of the software in a computer – used by antivirus programs to identify threats. Preventative Maintenance 100
25
Question 100 200 300 400 500 A: What is a patch? Code update provided by manufacturers of operating systems and software applications. Preventative Maintenance 200
26
Question 100 200 300 400 500 A: What is a Service Pack? A comprehensive update application which combines patches and upgrades. Preventative Maintenance 300
27
Question 100 200 300 400 500 A: What is 3 AM? Default time for Windows Update to install updates and patches. Preventative Maintenance 400
28
Question 100 200 300 400 500 A: What is Create a Restore Point? The first step when installing service packs and security patches. Preventative Maintenance 500
29
Question 100 200 300 400 500 A: What is slow computer operation OR slow Internet connection? A common sign that a computer may have a virus Troubleshooting 100
30
Question 100 200 300 400 500 A: What is That the problem has been solved? In Closing with the customer, you should have them verify _____________. Troubleshooting 200
31
Question 100 200 300 400 500 A: What is Other Techs, Internet Search, News Groups, Manufacturer FAQs, Manuals, Online Forums, Technical Websites Two resources that could be used to Evaluate the Problem. Troubleshooting 300
32
Question 100 200 300 400 500 A: What is 128-bit WEP, WAP, or EAP-Cisco ? One type of security that is better than 64-bit WEP. Troubleshooting 400
33
Question 100 200 300 400 500 A: What is Scan the Computer, Reboot, Login as different user, Check for OS updates/patches, update anti-virus signatures, change password? Two Quick Solutions for virus problems Troubleshooting 500
34
Question A: What is a Biometric sensor? Identifies physical characteristics of the user, such as fingerprints or retinas Final Jeopardy 100 200 300 400 500
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.