IT Essentials 1 JEOPADY Chapter 9 Router Viruses Modes WAN TCP/IPWANSecurity Router Security Preventative Router TroubleThreats Attacks Procedures Basics MaintenanceCommands shooting Encapsulation Services ►►► Final Jeopardy ◄◄◄ 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Viruses 100 A program written with malicious intent. Question A: What is a virus? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Viruses 200 A self-replicating program that is harmful to networks Question A: What is a worm? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Viruses 300 Often disguised as useful software. Question A: What is a Trojan? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Viruses 400 Worms are harmful in a network because they_____________. Question A: What is Consume Bandwidth? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Viruses 500 Type of virus that lays dormant until summoned by the attacker Question A: What is a Stealth Virus. 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Threats 100 Displays advertising on the user’s computer. Question A: What is Adware? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Threats 200 Monitors activity on the computer. Question A: What is Spyware? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Threats 300 Attacker pretends to represent a legitimate outside organization. Question A: What is Phishing? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Threats 400 A person that is able to gain access to private information through tricks. Question A: What is a Social Engineer? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Threats 500 Two of the three web tools that attackers use to install a program on a computer Question A: What is ActiveX, Java, or JavaScript 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 TCP/IP Attacks 100 These infected computers make tracing the origin of the DoS attack difficult to locate. Question A: What is zombies? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 TCP/IP Attacks 200 Information extracted from a replay attack. Question A: What is usernames and passwords? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 TCP/IP Attacks 300 A form of attack to gain access to resources on devices by pretending to be a trusted computer Question A: What is spoofing? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 TCP/IP Attacks 400 A specific type of DoS attack via random TCP/IP ports Question A: What is SYN flood? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 TCP/IP Attacks 500 A technique to redirect to false servers containing malicious content Question A: What is DNS Poisoning? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Procedures 100 A file system with increased security and compatibility. Question A: What is NTFS? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Procedures 200 A list of definitions to describe how a company addresses security issues. Question A: What is a Security Policy? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Procedures 300 Two levels of password protection. Question A: What is BIOS and Login? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Procedures 400 List two methods of physical security. Question A: What is Cable Locks, RFID tags, Berg Connectors, Biometric Sensors, Security Guards and Security Cages? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Procedures 500 An encryption format covering the entire 802.11i standard. Question A: What is a WPA2? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Preventative Maintenance 100 Patterns in the programming code of the software in a computer – used by antivirus programs to identify threats. Question A: What is a signature? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Preventative Maintenance 200 Code update provided by manufacturers of operating systems and software applications . Question A: What is a patch? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Preventative Maintenance 300 A comprehensive update application which combines patches and upgrades. Question A: What is a Service Pack? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Preventative Maintenance 400 Default time for Windows Update to install updates and patches. Question A: What is 3 AM? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Preventative Maintenance 500 The first step when installing service packs and security patches. Question A: What is Create a Restore Point? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Troubleshooting 100 A common sign that a computer may have a virus Question A: What is slow computer operation OR slow Internet connection? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Troubleshooting 200 In Closing with the customer, you should have them verify _____________. Question A: What is That the problem has been solved? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Troubleshooting 300 Two resources that could be used to Evaluate the Problem. Question A: What is Other Techs, Internet Search, News Groups, Manufacturer FAQs , Manuals, Online Forums, Technical Websites 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Troubleshooting 400 One type of security that is better than 64-bit WEP. Question A: What is 128-bit WEP, WAP, or EAP-Cisco ? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Troubleshooting 500 Two Quick Solutions for virus problems Question A: What is Scan the Computer, Reboot, Login as different user, Check for OS updates/patches, update anti-virus signatures, change password? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Final Jeopardy Identifies physical characteristics of the user, such as fingerprints or retinas Question A: What is a Biometric sensor? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500