Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.

Similar presentations


Presentation on theme: "IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands."— Presentation transcript:

1

2 IT Computer Security JEOPARDY

3 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500 Viruses Spyware Web Security Web Security Security Security Threats Prevention Removal 100 200 300 400 500 100 200 300 400 500 ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

4 Question A program written with malicious intent. Viruses 100 A: What is a virus? 100 200 300 400 500

5 Question A: What is a worm? A self-replicating program that is harmful to networks Viruses 200 100 200 300 400 500

6 Question 100 200 300 400 500 A: What is a Trojan? This is often disguised as useful software. Viruses 300

7 Question 100 200 300 400 500 A: What is Consume the Network Bandwidth? Worms are harmful in a network because they do this to network bandwidth. Viruses 400

8 Question 100 200 300 400 500 A: What is a Keylogger? A virus that records anything typed into the computer by the keyboard and sends a log to the virus author. Viruses 500

9 Question 100 200 300 400 500 A: What is Adware? Displays advertising on the user’s computer. Spyware 100 200 300 400 500

10 Question 100 200 300 400 500 A: What is Spyware? Monitors activity on the computer. Spyware 200

11 Question 100 200 300 400 500 A: What is a Tracking Cookie? A file that may or may not be harmful that tracks user web browsing behaviour Spyware 300

12 Question 100 200 300 400 500 A: What is a Shareware/Bundled Software? Installing this type of software is usually how adware is installed on a user’s system. Spyware 400

13 Question 100 200 300 400 500 A: What is Grayware or Malware? Unwanted software designed to infiltrate a computer system and send out personal information. Spyware 500

14 Question 100 200 300 400 500 A: What are ActiveX, Java, Javascript? Two of the three web tools that attackers use to install a program on a computer Web Security 100

15 Question 100 200 300 400 500 A: What are pop-ups? Multiple windows appearing on the screen above your browser window. Web Security 200

16 Question 100 200 300 400 500 A: What is spoofing? A form of attack to gain access to resources on devices by pretending to be a trusted computer or website. Web Security 300

17 Question 100 200 300 400 500 A: What is the Internet Security Bar? This prompt will appear in IE to prevent unwanted software from being installed by websites. Web Security 400

18 Question 100 200 300 400 500 A: What is the Security Tab? This tab found in the Internet Options will allow you to customize your ActiveX, Java and Cookie settings. Web Security 500

19 Question 100 200 300 400 500 A: What is a Physical Threat? An event or attack that results in theft or damage of office hardware such as switches, servers, laptops, etc. Security Threats 100

20 Question 100 200 300 400 500 A: What is a Data Threat? An event or attack that results in the removal, corruption, or unauthorized access of confidential information. Security Threats 200

21 Question 100 200 300 400 500 A: What is an Unstructured Attack? When attackers use available resources such as a passwords or scripts to gain unauthorized access to a network. Security Threats 300

22 Question 100 200 300 400 500 A: What is a Structured Attack? When attackers use code to access operating systems and software. Security Threats 400

23 Question 100 200 300 400 500 A: What are Internal Threats? Accidental or intentional attacks from company employees. Security Threats 500

24 Question 100 200 300 400 500 A: What are No Subject Line, Incomplete return address, Computer general e-mail, Return e-mail not sent by user? Two common indications of SPAM e- mail that anti-spam software will recognize. Prevention 100

25 Question 100 200 300 400 500 A: What is System Restore? This can be disabled to prevent reinfection of your system should you ever decide to ‘roll back’ to a previous saved point. Prevention 200

26 Question 100 200 300 400 500 A: What is Spybot’s TeaTimer & SD Helper? When installed, it can monitor your computer system and prevent further infection from unauthorized changes by Spyware programs. Prevention 300

27 Question 100 200 300 400 500 A: What are Operating System and Software Updates and Patches? Installing these will ensure your system’s security is up to date and any known vulnerabilities are eliminated. Prevention 400

28 Question 100 200 300 400 500 A: What is a Pop-up Blocker? This type of software will prevent websites from displaying annoying and unwanted windows. Prevention 500

29 Question 100 200 300 400 500 A: What is the Advanced Startup Menu & Safe Mode? Pressing F8 at the beginning of the computer’s bootup sequence will allow you access to this Windows feature.. Removal 100

30 Question 100 200 300 400 500 A: What is normal mode? After scanning for a virus in Safe Mode, an additional scan should be run in this mode Removal 200

31 Question 100 200 300 400 500 A: What is Two? The number of different spyware scanners you should utilize when removing spyware. Removal 300

32 Question 100 200 300 400 500 A: What is Delete or Move to Vault/Quaruntine? This should be done when a virus is detected on your system by your anti- virus program. Removal 400

33 Question 100 200 300 400 500 A: What is a boot-time scan? This type of virus scan should be done if you suspect your computer has a startup or boot sector virus. Removal 500

34 Question A: What are computer starts acting abnormally, program does not respond to mouse and keystrokes, program starting or shutting down on their own, CPU usage is high, unidentifiable or large number of processes running, computer slows down significantly or crashes, e-mail program begins sending out large quantities of e-mail ? These are three signs that your computer may be infected. Final Jeopardy 100 200 300 400 500


Download ppt "IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands."

Similar presentations


Ads by Google