Question

advertisement
IT Essentials 1
JEOPADY
Chapter 9
Router
Viruses
Modes
WAN TCP/IPWANSecurity Router
Security
Preventative Router
TroubleThreats
Attacks
Procedures Basics
MaintenanceCommands
shooting
Encapsulation
Services
►►► Final Jeopardy ◄◄◄
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Viruses
100
A program written with malicious intent.
Question
A: What is a virus?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Viruses
200
A self-replicating program that is harmful to
networks
Question
A: What is a worm?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Viruses
300
Often disguised as useful software.
Question
A: What is a Trojan?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Viruses
400
Worms are harmful in a network
because they_____________.
Question
A: What is Consume Bandwidth?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Viruses
500
Type of virus that lays dormant until
summoned by the attacker
Question
A: What is a Stealth Virus.
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Threats
100
Displays advertising on the user’s
computer.
Question
A: What is Adware?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Threats
200
Monitors activity on the computer.
Question
A: What is Spyware?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Threats
300
Attacker pretends to represent a
legitimate outside organization.
Question
A: What is Phishing?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Threats
400
A person that is able to gain access to
private information through tricks.
Question
A: What is a Social Engineer?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Threats
500
Two of the three web tools that attackers
use to install a program on a computer
Question
A: What is ActiveX, Java, or JavaScript
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
TCP/IP Attacks
100
These infected computers make tracing
the origin of the DoS attack difficult to
locate.
Question
A: What is zombies?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
TCP/IP Attacks
200
Information extracted from a replay
attack.
Question
A: What is usernames and passwords?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
TCP/IP Attacks
300
A form of attack to gain access to
resources on devices by pretending to
be a trusted computer
Question
A: What is spoofing?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
TCP/IP Attacks
400
A specific type of DoS attack via
random TCP/IP ports
Question
A: What is SYN flood?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
TCP/IP Attacks
500
A technique to redirect to false servers
containing malicious content
Question
A: What is DNS Poisoning?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Procedures
100
A file system with increased security
and compatibility.
Question
A: What is NTFS?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Procedures
200
A list of definitions to describe how a
company addresses security issues.
Question
A: What is a Security Policy?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Procedures
300
Two levels of password protection.
Question
A: What is BIOS and Login?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Procedures
400
List two methods of physical security.
Question
A: What is Cable Locks, RFID tags, Berg
Connectors, Biometric Sensors, Security Guards
and Security Cages?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Procedures
500
An encryption format covering the
entire 802.11i standard.
Question
A: What is a WPA2?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Preventative Maintenance
100
Patterns in the programming code of the
software in a computer – used by
antivirus programs to identify threats.
Question
A: What is a signature?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Preventative Maintenance
200
Code update provided by manufacturers of
operating systems and software
applications .
Question
A: What is a patch?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Preventative Maintenance
300
A comprehensive update application
which combines patches and upgrades.
Question
A: What is a Service Pack?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Preventative Maintenance
400
Default time for Windows Update to
install updates and patches.
Question
A: What is 3 AM?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Preventative Maintenance
500
The first step when installing service
packs and security patches.
Question
A: What is Create a Restore Point?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Troubleshooting
100
A common sign that a computer may
have a virus
Question
A: What is slow computer operation OR slow Internet
connection?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Troubleshooting
200
In Closing with the customer, you
should have them verify
_____________.
Question
A: What is That the problem has been solved?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Troubleshooting
300
Two resources that could be used to
Evaluate the Problem.
Question
A: What is Other Techs, Internet Search, News Groups,
Manufacturer FAQs , Manuals, Online Forums, Technical
Websites
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Troubleshooting
400
One type of security that is better than
64-bit WEP.
Question
A: What is 128-bit WEP, WAP, or EAP-Cisco ?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Troubleshooting
500
Two Quick Solutions for virus problems
Question
A: What is Scan the Computer, Reboot, Login as different
user, Check for OS updates/patches, update anti-virus
signatures, change password?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Final Jeopardy
Identifies physical characteristics of the
user, such as fingerprints or retinas
Question
A: What is a Biometric sensor?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Download