IT_Security_-_Jeopardy

advertisement
IT Computer Security
JEOPARDY
Router
Viruses
Modes
WAN Web WANSecurity Router
Router
Spyware
Prevention Removal
Security
Threats Basics
Encapsulation
Services
Commands
►►► Final Jeopardy ◄◄◄
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Viruses
100
A program written with malicious intent.
Question
A: What is a virus?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Viruses
200
A self-replicating program that is harmful to
networks
Question
A: What is a worm?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Viruses
300
This is often disguised as useful
software.
Question
A: What is a Trojan?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Viruses
400
Worms are harmful in a network because
they do this to network bandwidth.
Question
A: What is Consume the Network Bandwidth?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Viruses
500
A virus that records anything typed into
the computer by the keyboard and sends
a log to the virus author.
Question
A: What is a Keylogger?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Spyware
100
Displays advertising on the user’s
computer.
Question
A: What is Adware?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Spyware
200
Monitors activity on the computer.
Question
A: What is Spyware?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Spyware
300
A file that may or may not be harmful
that tracks user web browsing behaviour
Question
A: What is a Tracking Cookie?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Spyware
400
Installing this type of software is
usually how adware is installed on a
user’s system.
Question
A: What is a Shareware/Bundled Software?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Spyware
500
Unwanted software designed to
infiltrate a computer system and send
out personal information.
Question
A: What is Grayware or Malware?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Web Security
100
Two of the three web tools that attackers
use to install a program on a computer
Question
A: What are ActiveX, Java, Javascript?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Web Security
200
Multiple windows appearing on the
screen above your browser window.
Question
A: What are pop-ups?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Web Security
300
A form of attack to gain access to
resources on devices by pretending to
be a trusted computer or website.
Question
A: What is spoofing?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Web Security
400
This prompt will appear in IE to prevent
unwanted software from being installed
by websites.
Question
A: What is the Internet Security Bar?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Web Security
500
This tab found in the Internet Options
will allow you to customize your
ActiveX, Java and Cookie settings.
Question
A: What is the Security Tab?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Threats
100
An event or attack that results in theft or
damage of office hardware such as
switches, servers, laptops, etc.
Question
A: What is a Physical Threat?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Threats
200
An event or attack that results in the
removal, corruption, or unauthorized
access of confidential information.
Question
A: What is a Data Threat?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Threats
300
When attackers use available resources
such as a passwords or scripts to gain
unauthorized access to a network.
Question
A: What is an Unstructured Attack?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Threats
400
When attackers use code to access
operating systems and software.
Question
A: What is a Structured Attack?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Security Threats
500
Accidental or intentional attacks from
company employees.
Question
A: What are Internal Threats?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Prevention
100
Two common indications of SPAM email that anti-spam software will
recognize.
Question
A: What are No Subject Line, Incomplete return address,
Computer general e-mail, Return e-mail not sent by
user?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Prevention
200
This can be disabled to prevent reinfection
of your system should you ever decide to
‘roll back’ to a previous saved point.
Question
A: What is System Restore?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Prevention
300
When installed, it can monitor your computer
system and prevent further infection from
unauthorized changes by Spyware programs.
Question
A: What is Spybot’s TeaTimer & SD Helper?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Prevention
400
Installing these will ensure your
system’s security is up to date and any
known vulnerabilities are eliminated.
Question
A: What are Operating System and Software Updates and
Patches?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Prevention
500
This type of software will prevent
websites from displaying annoying and
unwanted windows.
Question
A: What is a Pop-up Blocker?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Removal
100
Pressing F8 at the beginning of the
computer’s bootup sequence will allow
you access to this Windows feature..
Question
A: What is the Advanced Startup Menu & Safe Mode?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Removal
200
After scanning for a virus in Safe Mode,
an additional scan should be run in this
mode
Question
A: What is normal mode?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Removal
300
The number of different spyware
scanners you should utilize when
removing spyware.
Question
A: What is Two?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Removal
400
This should be done when a virus is
detected on your system by your antivirus program.
Question
A: What is Delete or Move to Vault/Quaruntine?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Removal
500
This type of virus scan should be done
if you suspect your computer has a
startup or boot sector virus.
Question
A: What is a boot-time scan?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Final Jeopardy
These are three signs that your computer
may be infected.
Question
A: What are computer starts acting abnormally, program does not respond to
mouse and keystrokes, program starting or shutting down on their own,
CPU usage is high, unidentifiable or large number of processes
running, computer slows down significantly or crashes, e-mail
program begins sending out large quantities of e-mail?
100
100
100
100
100
100
200
200
200
200
200
200
300
300
300
300
300
300
400
400
400
400
400
400
500
500
500
500
500
500
Download