CISCO ITE1: PC Hardware & Software Study Guide

advertisement
CISCO ITE1: PC Hardware & Software Study Guide
Module 9 – Security
Viruses
Mix’n’Match – Write the letter by the appropriate description for the following terms
a) Virus
______ Often disguised as useful Software
b) Worm
______ A Program Written With Malicious Intent
c) Trojan
______ Lays dormant until summoned by the attacker
d) Stealth Virus
______ Self-replicating program that is harmful to
networks
Worms are harmful in a network because they….
Security Threats
When this type of software gets installed on your computer, it
normally displays advertisements (usually in the form of popups).
This type of software monitors activities on your computer.
When an attacker pretends to represent a legitimate outside
organization to gain information from you is a form of this
attack.
When someone uses tricks to fool someone into giving access
to them unknowingly is this type of attack.
ITE1 – Mod9 – Study Guide
Three web tools that attackers can exploit vulnerabilities on to
install malicious software on your computer.
1.
2.
3.
TCP/IP Attacks
When an attacker uses vulnerabilities in another system to
install software on the computer to initiate attacks on other
computer systems (such as DoS) makes the exploited
computer this.
What type of information is extracted from a replay attack?
This type of attack is use to gain access to resources or
devices by pretending to be a trusted computer within the
network.
This is a specific type of DoS attack via random TCP/IP ports.
This attack technique is used to redirect a computer to false
servers containing malicious content.
Security Procedures
What file system has increased security and compatibility?
A company should create one of these to describe how they
will address security issues.
What are two levels of password protection?
1.
2.
ITE1 – Mod9 – Study Guide
List four methods of physical security.
1.
2.
3.
4.
What type of encryption can be found cover the entire 802.11i
standard?
Preventative Maintenance
These are patterns in the programming code of the software in
a computer – used by antivirus programs to identify threats.
This is a code update provided by manufacturers of operating
systems and software applications.
Used mainly in the Windows-family of Operating Systems, this
is a comprehensive update which combines patches and
upgrades.
This is the default time for Windows Update to install updates
and patches.
Before you install a service pack or security patch, what is the
first step that should be done?
Troubleshooting
What are two signs that a computer may be infected by a
virus?
1.
2.
In closing with a customer, you should have them verify this.
ITE1 – Mod9 – Study Guide
Two resources that could be used to “Evaluate the Problem.”
1.
2.
Another type of security that is better than 64-bit WEP is?
What are two quick solutions for virus problems? (Hint: A
Complete Reformat is not one of them.
1.
2.
Bonus Question
What type of technology identifies a user through physical
characteristics such as fingerprints or retinas?
ITE1 – Mod9 – Study Guide
Download