Presentation is loading. Please wait.

Presentation is loading. Please wait.

I T Essentials I Chapter 9 JEOPARDY.

Similar presentations


Presentation on theme: "I T Essentials I Chapter 9 JEOPARDY."— Presentation transcript:

1 I T Essentials I Chapter 9 JEOPARDY

2 Technology Security Threats Security Maintenance Potpourri 100 100 100 100 100 200 200 200 200 200 300 300 300 300 300 400 400 400 400 400 500 500 500 500 500

3 Technology 100 Which technology is used for authenticating users?
Event Viewer Secure DNS Smart Card UNC A: What is smart card?

4 Technology 200 A fingerprint reader is an example of which security technology? Authorization Biometric Keylogging Secureware smartcard A: What is biometric?

5 Technology 300 Technology created by Microsoft to control interactivity on web pages? JAVA Visual Basic Active X JAVA Script A: What is Active X?

6 Technology 400 What are the primary responsibilities of a technician?
Assembling and networking computers Customer service Data and network security Implementing cost saving procedures A: What is data and network security?

7 Technology 500 What is an e-mail bomb?
A series of repeated, larger than normal pings that crash the receiving computer A large quantity of bulk that overwhelms the server preventing users from accessing it Programming language that allows applets to run within a web browser Technology created by Microsoft to control interactivity on web pages. A: What is Option 2?

8 Security Threats 100 What type of program causes banners and ads to appear on the desktop without any user intervention? Adware Spyware Stealth virus Trojan horse A: What is adware?

9 Security Threats 200 What are two examples of malware?
Registry cleaner Pop-up blocker Spyware Grayware A: What is spyware and grayware?

10 Security Threats 300 Which two characteristics describe a worm?
Executes when software is run on a computer Is self-replicating Hides in a dormant state until needed by an attacker Infects computers by attaching to software code Travels to new computers without any intervention or knowledge of the user A: What is options 2 & 5?

11 Security Threats 400 An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. What type of threat is this? Man-in-the-middle Phishing Physical Social engineering spoofing A: What is social engineering?

12 Security Threats 500 Which threat to security uses traffic from zombie computers to overwhelm servers? DoS DDoS Phishing Spoofing SYN flood A: What is DDoS?

13 Security 100 Which two statements are true regarding username and password standards? Keep the username naming convention simple Usernames should expire periodically Keep the passwords simple and easy to remember Rules about password expiration & lockout should be defined Users should create their own username and password What is options 1 & 4?

14 Security 200 When setting up a new wireless access point, which basic security measure should be taken? Disable SSID broadcast Enable SSID broadcast Broadcast the default SSID Broadcast a unique SSID A: What is Disable SSID broadcast?

15 Security 300 An attacker claiming to be a bank representative contacts a potential victim via and requests disclosure of vital account information. Which security attack is being implemented? Adware Phishing Spyware Trojan A: What is phishing?

16 Security 400 What is the best method for a company to secure data being transmitted across the internet between remote sites? Use plain text in an Use a shared server with an encrypted password on the file Use computers secured with smartcard authentication Use a VPN connection A: What is use a VPN connection?

17 Security 500 Which is the best way to secure a laptop left at the office while the user is away for an extended period of time? Cover the laptop with files and leave it on your desk Put the laptop in a desk drawer in your locked office Place the laptop in a locked security cage designed to store computer equipment Hide the laptop in your supervisor’s office A: What is option 3 – Security cage?

18 Maintenance 100 What is the safest place to store backups?
Portable lock box Locked telecommunications room Locked server room Offsite secure facility What is Offsite secure facility

19 Maintenance 200 What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses? Download the latest signature files on a regular basis Schedule a scan once a week Schedule anti-virus updates using windows task manager Follow the firewall configuration guidelines on the anti-virus manufacturer website. A: What is download latest signature files on a regular basis?

20 Maintenance 300 Which two items can be downloaded from the Microsoft website to help protect Windows XP? ROM upgrades Service packs Security patches BIOS upgrades DirectX updates A: What is options 2 & 3?

21 Maintenance 400 A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data? Delete the files containing the confidential data Reformat the hard drives Expose the hard drives to ultraviolet light Destroy the hard drives with a hammer A: What is destroy the hard drives with a hammer?

22 Maintenance 500 A technician downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? Create a restore point Manually update the last know good configuration Reinstall the anti-virus software Change the firewall rules to enable the installer to access a port 8900 of the Microsoft server What is create a restore point

23 Potpourri 100 What is the difference between WEP64 and WEP 128?
WEP64 can handle 64 simultaneous connections, & WEP128 can handle 128 simultaneous connections. WEP64 operates on a 64-bit processor, but WEP128 requires a dual core 128-bit processor WEP64 uses 64-byte packets, and WEP128 uses 128-byte packets WEP64 uses a 64-bit encryption key, and WEP uses a 128-bit key. A: What is Option 4?

24 Potpourri 200 Which best practice should be included in a password protection policy? Encourage users to document passwords in a personal file Enforce password protection at the BIOS level Implement lockout rules upon consecutive unsuccessful attempts at accessing the system Restrict passwords to text-bases strings A: What is option 3?

25 Potourri 300 The value of physical equipment is often of far more than the value of the data it contains. True False A: What is False?

26 Potpourri 400 What network uses encryption to protect data? Wireless
VPN WEP Star A: What is VPN?

27 Potpourri 500 What file system used in some versions of Windows lacks both journaling and encryption capabilities? NTFS FAT32 FAT 16 NTFS2 A: What is FAT32?

28 Double Jeopardy Manufacturers of operating systems and software applications may provide code updates called __________ that prevent a newly discovered virus or worm from making a successful attack. Signatures patches Service pack SYN flood A: What is Patches?

29 Double Jeopardy Subject: Security


Download ppt "I T Essentials I Chapter 9 JEOPARDY."

Similar presentations


Ads by Google