Download presentation
Presentation is loading. Please wait.
Published bySophia Henderson Modified over 8 years ago
2
I T Essentials I Chapter 4 JEOPARDY
3
PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri 100100 200 300 400 500
4
Preventative Maintenance 100 Which two are benefits of preventative maintenance? (choose 2) 1.Extends the life of the components 2.Requires less manpower 3.Reduces repair costs 4.Teaches the users to help themselves A: What is options 1 & 3?
5
Preventative Maintenance 200 Which of the following is not an example of software maintenance? 1.Remove unwanted programs 2.Clean the mouse and keyboard 3.Review driver updates 4.Review security updates 5.Review software updates A: What is clean the mouse and keyboard?
6
Preventative Maintenance 300 What should a preventative maintenance plan be based on? 1.The technician’s experience 2.The company’s budget 3.The needs of the equipment 4.The complaints of the users A: What is The needs of the equipment?
7
Preventative Maintenance 400 What are some of the things you should do when providing hardware maintenance? (choose 3) 1.Check the condition of the cables 2.Clean the components with mild detergent and a lint free cloth 3.Check and secure any loose cables 4.Remove dust from the components 5.Replace all parts after 1 year A: What is options 1, 3, & 4?
8
Preventative Maintenance 500 What statements are true regarding preventative maintenance? (Choose 3) 1.It helps prevent failure of parts 2.Ensures components are in good working condition 3.It is a learned skill 4.Provides a regular and systematic inspection 5.It reduces the workload on the technicians A: What is options 1, 2, & 4?
9
Troubleshooting 100 A: What is Device Manager? Where can you find a list of all the devices that are configured on a computer? 1.Motherboard manuals 2.Control Panel 3.Device Manager 4.Hardware database
10
Troubleshooting 200 A: What is internet, other technicians, newsgroups, technical websites, online forums, computer manuals, device manuals, manufacturer’s FAQ’s ? When you are researching possible solutions for a computer problem, name one location you may start your research?
11
Troubleshooting 300 A: What is verify the obvious issues? What is the second step of the troubleshooting process? 1.Try quick solutions 2.Gather data from the computer 3.Gather data from the customer 4.Verify obvious issues 5.Evaluate the problem
12
Troubleshooting 400 A: What is social engineering? An employee fo a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. What type of threat is this? 1.Man-in-the-middle 2.Phishing 3.Physical 4.Social engineering 5.spoofing
13
Troubleshooting 500 A: What is DDoS? Which threat to security uses traffic from zombie computers to overwhelm servers? 1.DoS 2.DDoS 3.Phishing 4.Spoofing 5.SYN flood
14
Security 100 What is options 1 & 4? Which two statements are true regarding username and password standards? 1.Keep the username naming convention simple 2.Usernames should expire periodically 3.Keep the passwords simple and easy to remember 4.Rules about password expiration & lockout should be defined 5.Users should create their own username and password
15
Security 200 A: What is Disable SSID broadcast? When setting up a new wireless access point, which basic security measure should be taken? 1.Disable SSID broadcast 2.Enable SSID broadcast 3.Broadcast the default SSID 4.Broadcast a unique SSID
16
Security 300 A: What is phishing? An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented? 1.Adware 2.Phishing 3.Spyware 4.Trojan
17
Security 400 A: What is use a VPN connection? What is the best method for a company to secure data being transmitted across the internet between remote sites? 1.Use plain text in an e-mail 2.Use a shared server with an encrypted password on the file 3.Use computers secured with smartcard authentication 4.Use a VPN connection
18
Security 500 A: What is option 3 – Security cage? Which is the best way to secure a laptop left at the office while the user is away for an extended period of time? 1.Cover the laptop with files and leave it on your desk 2.Put the laptop in a desk drawer in your locked office 3.Place the laptop in a locked security cage designed to store computer equipment 4.Hide the laptop in your supervisor’s office
19
Maintenance 100 What is Offsite secure facility What is the safest place to store backups? 1.Portable lock box 2.Locked telecommunications room 3.Locked server room 4.Offsite secure facility
20
Maintenance 200 A: What is download latest signature files on a regular basis? What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses? 1.Download the latest signature files on a regular basis 2.Schedule a scan once a week 3.Schedule anti-virus updates using windows task manager 4.Follow the firewall configuration guidelines on the anti-virus manufacturer website.
21
Maintenance 300 A: What is options 2 & 3? Which two items can be downloaded from the Microsoft website to help protect Windows XP? 1.ROM upgrades 2.Service packs 3.Security patches 4.BIOS upgrades 5.DirectX updates
22
Maintenance 400 A: What is destroy the hard drives with a hammer? A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data? 1.Delete the files containing the confidential data 2.Reformat the hard drives 3.Expose the hard drives to ultraviolet light 4.Destroy the hard drives with a hammer
23
Maintenance 500 What is create a restore point A technician downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? 1.Create a restore point 2.Manually update the last know good configuration 3.Reinstall the anti-virus software 4.Change the firewall rules to enable the installer to access a port 8900 of the Microsoft server
24
Potpourri 100 A: What is Option 4? What is the difference between WEP64 and WEP 128? 1.WEP64 can handle 64 simultaneous connections, & WEP128 can handle 128 simultaneous connections. 2.WEP64 operates on a 64-bit processor, but WEP128 requires a dual core 128-bit processor 3.WEP64 uses 64-byte packets, and WEP128 uses 128- byte packets 4.WEP64 uses a 64-bit encryption key, and WEP uses a 128-bit key.
25
Potpourri 200 A: What is option 3? Which best practice should be included in a password protection policy? 1.Encourage users to document passwords in a personal file 2.Enforce password protection at the BIOS level 3.Implement lockout rules upon consecutive unsuccessful attempts at accessing the system 4.Restrict passwords to text-bases strings
26
Potourri 300 A: What is False? The value of physical equipment if often far more than the value of the data it contains. 1.True 2.False
27
Potpourri 400 A: What is VPN? What network uses encryption to protect data? 1.Wireless 2.VPN 3.WEP 4.Star
28
Potpourri 500 A: What is FAT32? What file system used in some versions of Windows lacks both journaling and encryption capabilities? 1.NTFS 2.FAT32 3.FAT 16 4.NTFS2
29
Double Jeopardy A: What is Patches? Manufacturers of operating systems and software applications may provide code updates called __________ that prevent a newly discovered virus or worm from making a successful attack. 1.Signatures 2.patches 3.Service pack 4.SYN flood
30
Double Jeopardy Subject: Security
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.