Presentation is loading. Please wait.

Presentation is loading. Please wait.

I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri 100100 200 300 400 500.

Similar presentations


Presentation on theme: "I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri 100100 200 300 400 500."— Presentation transcript:

1

2 I T Essentials I Chapter 4 JEOPARDY

3 PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri 100100 200 300 400 500

4 Preventative Maintenance 100 Which two are benefits of preventative maintenance? (choose 2) 1.Extends the life of the components 2.Requires less manpower 3.Reduces repair costs 4.Teaches the users to help themselves A: What is options 1 & 3?

5 Preventative Maintenance 200 Which of the following is not an example of software maintenance? 1.Remove unwanted programs 2.Clean the mouse and keyboard 3.Review driver updates 4.Review security updates 5.Review software updates A: What is clean the mouse and keyboard?

6 Preventative Maintenance 300 What should a preventative maintenance plan be based on? 1.The technician’s experience 2.The company’s budget 3.The needs of the equipment 4.The complaints of the users A: What is The needs of the equipment?

7 Preventative Maintenance 400 What are some of the things you should do when providing hardware maintenance? (choose 3) 1.Check the condition of the cables 2.Clean the components with mild detergent and a lint free cloth 3.Check and secure any loose cables 4.Remove dust from the components 5.Replace all parts after 1 year A: What is options 1, 3, & 4?

8 Preventative Maintenance 500 What statements are true regarding preventative maintenance? (Choose 3) 1.It helps prevent failure of parts 2.Ensures components are in good working condition 3.It is a learned skill 4.Provides a regular and systematic inspection 5.It reduces the workload on the technicians A: What is options 1, 2, & 4?

9 Troubleshooting 100 A: What is Device Manager? Where can you find a list of all the devices that are configured on a computer? 1.Motherboard manuals 2.Control Panel 3.Device Manager 4.Hardware database

10 Troubleshooting 200 A: What is internet, other technicians, newsgroups, technical websites, online forums, computer manuals, device manuals, manufacturer’s FAQ’s ? When you are researching possible solutions for a computer problem, name one location you may start your research?

11 Troubleshooting 300 A: What is verify the obvious issues? What is the second step of the troubleshooting process? 1.Try quick solutions 2.Gather data from the computer 3.Gather data from the customer 4.Verify obvious issues 5.Evaluate the problem

12 Troubleshooting 400 A: What is social engineering? An employee fo a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. What type of threat is this? 1.Man-in-the-middle 2.Phishing 3.Physical 4.Social engineering 5.spoofing

13 Troubleshooting 500 A: What is DDoS? Which threat to security uses traffic from zombie computers to overwhelm servers? 1.DoS 2.DDoS 3.Phishing 4.Spoofing 5.SYN flood

14 Security 100 What is options 1 & 4? Which two statements are true regarding username and password standards? 1.Keep the username naming convention simple 2.Usernames should expire periodically 3.Keep the passwords simple and easy to remember 4.Rules about password expiration & lockout should be defined 5.Users should create their own username and password

15 Security 200 A: What is Disable SSID broadcast? When setting up a new wireless access point, which basic security measure should be taken? 1.Disable SSID broadcast 2.Enable SSID broadcast 3.Broadcast the default SSID 4.Broadcast a unique SSID

16 Security 300 A: What is phishing? An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented? 1.Adware 2.Phishing 3.Spyware 4.Trojan

17 Security 400 A: What is use a VPN connection? What is the best method for a company to secure data being transmitted across the internet between remote sites? 1.Use plain text in an e-mail 2.Use a shared server with an encrypted password on the file 3.Use computers secured with smartcard authentication 4.Use a VPN connection

18 Security 500 A: What is option 3 – Security cage? Which is the best way to secure a laptop left at the office while the user is away for an extended period of time? 1.Cover the laptop with files and leave it on your desk 2.Put the laptop in a desk drawer in your locked office 3.Place the laptop in a locked security cage designed to store computer equipment 4.Hide the laptop in your supervisor’s office

19 Maintenance 100 What is Offsite secure facility What is the safest place to store backups? 1.Portable lock box 2.Locked telecommunications room 3.Locked server room 4.Offsite secure facility

20 Maintenance 200 A: What is download latest signature files on a regular basis? What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses? 1.Download the latest signature files on a regular basis 2.Schedule a scan once a week 3.Schedule anti-virus updates using windows task manager 4.Follow the firewall configuration guidelines on the anti-virus manufacturer website.

21 Maintenance 300 A: What is options 2 & 3? Which two items can be downloaded from the Microsoft website to help protect Windows XP? 1.ROM upgrades 2.Service packs 3.Security patches 4.BIOS upgrades 5.DirectX updates

22 Maintenance 400 A: What is destroy the hard drives with a hammer? A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data? 1.Delete the files containing the confidential data 2.Reformat the hard drives 3.Expose the hard drives to ultraviolet light 4.Destroy the hard drives with a hammer

23 Maintenance 500 What is create a restore point A technician downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? 1.Create a restore point 2.Manually update the last know good configuration 3.Reinstall the anti-virus software 4.Change the firewall rules to enable the installer to access a port 8900 of the Microsoft server

24 Potpourri 100 A: What is Option 4? What is the difference between WEP64 and WEP 128? 1.WEP64 can handle 64 simultaneous connections, & WEP128 can handle 128 simultaneous connections. 2.WEP64 operates on a 64-bit processor, but WEP128 requires a dual core 128-bit processor 3.WEP64 uses 64-byte packets, and WEP128 uses 128- byte packets 4.WEP64 uses a 64-bit encryption key, and WEP uses a 128-bit key.

25 Potpourri 200 A: What is option 3? Which best practice should be included in a password protection policy? 1.Encourage users to document passwords in a personal file 2.Enforce password protection at the BIOS level 3.Implement lockout rules upon consecutive unsuccessful attempts at accessing the system 4.Restrict passwords to text-bases strings

26 Potourri 300 A: What is False? The value of physical equipment if often far more than the value of the data it contains. 1.True 2.False

27 Potpourri 400 A: What is VPN? What network uses encryption to protect data? 1.Wireless 2.VPN 3.WEP 4.Star

28 Potpourri 500 A: What is FAT32? What file system used in some versions of Windows lacks both journaling and encryption capabilities? 1.NTFS 2.FAT32 3.FAT 16 4.NTFS2

29 Double Jeopardy A: What is Patches? Manufacturers of operating systems and software applications may provide code updates called __________ that prevent a newly discovered virus or worm from making a successful attack. 1.Signatures 2.patches 3.Service pack 4.SYN flood

30 Double Jeopardy Subject: Security


Download ppt "I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri 100100 200 300 400 500."

Similar presentations


Ads by Google