Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.

Similar presentations


Presentation on theme: "IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands."— Presentation transcript:

1

2 IT Essentials 1 Chapter 9 JEOPADY

3 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500 Viruses Security Threats TCP/IP Attacks Security Security Procedures Preventative Maintenance Trouble- shooting 100 200 300 400 500 100 200 300 400 500 ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

4 Question A program written with malicious intent. Viruses 100 A: What is a virus? 100 200 300 400 500

5 Question A: What is a worm? A self-replicating program that is harmful to networks Viruses 200 100 200 300 400 500

6 Question 100 200 300 400 500 A: What is a Trojan? Often disguised as useful software. Viruses 300

7 Question 100 200 300 400 500 A: What is Consume Bandwidth? Worms are harmful in a network because they_____________. Viruses 400

8 Question 100 200 300 400 500 A: What is a Stealth Virus. Type of virus that lays dormant until summoned by the attacker Viruses 500

9 Question 100 200 300 400 500 A: What is Adware? Displays advertising on the user’s computer. Security Threats 100 200 300 400 500

10 Question 100 200 300 400 500 A: What is Spyware? Monitors activity on the computer. Security Threats 200

11 Question 100 200 300 400 500 A: What is Phishing? Attacker pretends to represent a legitimate outside organization. Security Threats 300

12 Question 100 200 300 400 500 A: What is a Social Engineer? A person that is able to gain access to private information through tricks. Security Threats 400

13 Question 100 200 300 400 500 A: What is ActiveX, Java, or JavaScript Two of the three web tools that attackers use to install a program on a computer Security Threats 500

14 Question 100 200 300 400 500 A: What is zombies? These infected computers make tracing the origin of the DoS attack difficult to locate. TCP/IP Attacks 100

15 Question 100 200 300 400 500 A: What is usernames and passwords? Information extracted from a replay attack. TCP/IP Attacks 200

16 Question 100 200 300 400 500 A: What is spoofing? A form of attack to gain access to resources on devices by pretending to be a trusted computer TCP/IP Attacks 300

17 Question 100 200 300 400 500 A: What is SYN flood? A specific type of DoS attack via random TCP/IP ports TCP/IP Attacks 400

18 Question 100 200 300 400 500 A: What is DNS Poisoning? A technique to redirect to false servers containing malicious content TCP/IP Attacks 500

19 Question 100 200 300 400 500 A: What is NTFS? A file system with increased security and compatibility. Security Procedures 100

20 Question 100 200 300 400 500 A: What is a Security Policy? A list of definitions to describe how a company addresses security issues. Security Procedures 200

21 Question 100 200 300 400 500 A: What is BIOS and Login? Two levels of password protection. Security Procedures 300

22 Question 100 200 300 400 500 A: What is Cable Locks, RFID tags, Berg Connectors, Biometric Sensors, Security Guards and Security Cages? List two methods of physical security. Security Procedures 400

23 Question 100 200 300 400 500 A: What is a WPA2? An encryption format covering the entire 802.11i standard. Security Procedures 500

24 Question 100 200 300 400 500 A: What is a signature? Patterns in the programming code of the software in a computer – used by antivirus programs to identify threats. Preventative Maintenance 100

25 Question 100 200 300 400 500 A: What is a patch? Code update provided by manufacturers of operating systems and software applications. Preventative Maintenance 200

26 Question 100 200 300 400 500 A: What is a Service Pack? A comprehensive update application which combines patches and upgrades. Preventative Maintenance 300

27 Question 100 200 300 400 500 A: What is 3 AM? Default time for Windows Update to install updates and patches. Preventative Maintenance 400

28 Question 100 200 300 400 500 A: What is Create a Restore Point? The first step when installing service packs and security patches. Preventative Maintenance 500

29 Question 100 200 300 400 500 A: What is slow computer operation OR slow Internet connection? A common sign that a computer may have a virus Troubleshooting 100

30 Question 100 200 300 400 500 A: What is That the problem has been solved? In Closing with the customer, you should have them verify _____________. Troubleshooting 200

31 Question 100 200 300 400 500 A: What is Other Techs, Internet Search, News Groups, Manufacturer FAQs, Manuals, Online Forums, Technical Websites Two resources that could be used to Evaluate the Problem. Troubleshooting 300

32 Question 100 200 300 400 500 A: What is 128-bit WEP, WAP, or EAP-Cisco ? One type of security that is better than 64-bit WEP. Troubleshooting 400

33 Question 100 200 300 400 500 A: What is Scan the Computer, Reboot, Login as different user, Check for OS updates/patches, update anti-virus signatures, change password? Two Quick Solutions for virus problems Troubleshooting 500

34 Question A: What is a Biometric sensor? Identifies physical characteristics of the user, such as fingerprints or retinas Final Jeopardy 100 200 300 400 500


Download ppt "IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands."

Similar presentations


Ads by Google