IT Essentials

Document Sample
IT Essentials Powered By Docstoc
					IT Essentials 1



JEOPADY
   Chapter 9
 Router       WAN TCP/IPWANSecurity Router
          Security                        Preventative Router
                                                       Trouble-
Viruses
 Modes    Threats                        Maintenance shooting
                      Attacks Procedures Basics
           Encapsulation Services                    Commands
                  ►►► Final Jeopardy ◄◄◄



100       100        100        100         100        100
200       200        200        200         200        200
300       300        300        300         300        300
400       400        400        400         400        400
500       500        500        500         500        500
                      Viruses
                        100
A program written with malicious intent.



 Question
A: What is a virus?
                                           100   100   100   100   100   100

                                           200   200   200   200   200   200

                                           300   300   300   300   300   300

                                           400   400   400   400   400   400

                                           500   500   500   500   500   500
                     Viruses
                       200
 A self-replicating program that is harmful to
 networks


 Question
A: What is a worm?
                                                 100   100   100   100   100   100

                                                 200   200   200   200   200   200

                                                 300   300   300   300   300   300

                                                 400   400   400   400   400   400

                                                 500   500   500   500   500   500
                       Viruses
                         300
Often disguised as useful software.


 Question
A: What is a Trojan?
                                      100   100   100   100   100   100

                                      200   200   200   200   200   200

                                      300   300   300   300   300   300

                                      400   400   400   400   400   400

                                      500   500   500   500   500   500
                   Viruses
                     400
Worms are harmful in a network
because they_____________.

Question
A: What is Consume Bandwidth?
                                 100   100   100   100   100   100

                                 200   200   200   200   200   200

                                 300   300   300   300   300   300

                                 400   400   400   400   400   400

                                 500   500   500   500   500   500
                       Viruses
                         500
 Type of virus that lays dormant until
 summoned by the attacker


 Question
A: What is a Stealth Virus.
                                         100   100   100   100   100   100

                                         200   200   200   200   200   200

                                         300   300   300   300   300   300

                                         400   400   400   400   400   400

                                         500   500   500   500   500   500
          Security Threats
                100
 Displays advertising on the user’s
 computer.

Question
A: What is Adware?
                                      100   100   100   100   100   100

                                      200   200   200   200   200   200

                                      300   300   300   300   300   300

                                      400   400   400   400   400   400

                                      500   500   500   500   500   500
          Security Threats
                200
 Monitors activity on the computer.


 Question
A: What is Spyware?
                                      100   100   100   100   100   100

                                      200   200   200   200   200   200

                                      300   300   300   300   300   300

                                      400   400   400   400   400   400

                                      500   500   500   500   500   500
          Security Threats
                300
Attacker pretends to represent a
legitimate outside organization.

Question
A: What is Phishing?
                                   100   100   100   100   100   100

                                   200   200   200   200   200   200

                                   300   300   300   300   300   300

                                   400   400   400   400   400   400

                                   500   500   500   500   500   500
           Security Threats
                 400
A person that is able to gain access to
private information through tricks.

 Question
A: What is a Social Engineer?
                                          100   100   100   100   100   100

                                          200   200   200   200   200   200

                                          300   300   300   300   300   300

                                          400   400   400   400   400   400

                                          500   500   500   500   500   500
           Security Threats
                 500
Two of the three web tools that attackers
use to install a program on a computer

 Question
A: What is ActiveX, Java, or JavaScript
                                          100   100   100   100   100   100

                                          200   200   200   200   200   200

                                          300   300   300   300   300   300

                                          400   400   400   400   400   400

                                          500   500   500   500   500   500
             TCP/IP Attacks
                  100
These infected computers make tracing
the origin of the DoS attack difficult to
locate.
  Question
A: What is zombies?
                                        100   100   100   100   100   100

                                        200   200   200   200   200   200

                                        300   300   300   300   300   300

                                        400   400   400   400   400   400

                                        500   500   500   500   500   500
            TCP/IP Attacks
                 200
 Information extracted from a replay
 attack.


 Question
A: What is usernames and passwords?
                                       100   100   100   100   100   100

                                       200   200   200   200   200   200

                                       300   300   300   300   300   300

                                       400   400   400   400   400   400

                                       500   500   500   500   500   500
            TCP/IP Attacks
                 300
A form of attack to gain access to
  resources on devices by pretending to
  be a trusted computer

Question
A: What is spoofing?
                                    100   100   100   100   100   100

                                    200   200   200   200   200   200

                                    300   300   300   300   300   300

                                    400   400   400   400   400   400

                                    500   500   500   500   500   500
            TCP/IP Attacks
                 400
A specific type of DoS attack via
random TCP/IP ports

Question
A: What is SYN flood?
                                    100   100   100   100   100   100

                                    200   200   200   200   200   200

                                    300   300   300   300   300   300

                                    400   400   400   400   400   400

                                    500   500   500   500   500   500
           TCP/IP Attacks
                500
A technique to redirect to false servers
containing malicious content

Question
A: What is DNS Poisoning?
                                       100   100   100   100   100   100

                                       200   200   200   200   200   200

                                       300   300   300   300   300   300

                                       400   400   400   400   400   400

                                       500   500   500   500   500   500
      Security Procedures
              100
 A file system with increased security
 and compatibility.


 Question
A: What is NTFS?
                                         100   100   100   100   100   100

                                         200   200   200   200   200   200

                                         300   300   300   300   300   300

                                         400   400   400   400   400   400

                                         500   500   500   500   500   500
      Security Procedures
              200
A list of definitions to describe how a
company addresses security issues.

 Question
A: What is a Security Policy?
                                          100   100   100   100   100   100

                                      200       200   200   200   200   200

                                      300       300   300   300   300   300

                                      400       400   400   400   400   400

                                      500       500   500   500   500   500
     Security Procedures
             300
Two levels of password protection.



Question
A: What is BIOS and Login?
                                     100   100   100   100   100   100

                                     200   200   200   200   200   200

                                     300   300   300   300   300   300

                                     400   400   400   400   400   400

                                     500   500   500   500   500   500
     Security Procedures
             400
List two methods of physical security.



 Question
A: What is Cable Locks, RFID tags, Berg
   Connectors, Biometric Sensors, Security Guards
                                                    100   100   100   100   100   100

   and Security Cages?                              200

                                                    300
                                                          200

                                                          300
                                                                200

                                                                300
                                                                      200

                                                                      300
                                                                            200

                                                                            300
                                                                                  200

                                                                                  300

                                                    400   400   400   400   400   400

                                                    500   500   500   500   500   500
     Security Procedures
             500
An encryption format covering the
entire 802.11i standard.

Question
A: What is a WPA2?
                                    100   100   100   100   100   100

                                    200   200   200   200   200   200

                                    300   300   300   300   300   300

                                    400   400   400   400   400   400

                                    500   500   500   500   500   500
 Preventative Maintenance
            100
 Patterns in the programming code of the
 software in a computer – used by
 antivirus programs to identify threats.
 Question
A: What is a signature?
                                     100   100   100   100   100   100

                                     200   200   200   200   200   200

                                     300   300   300   300   300   300

                                     400   400   400   400   400   400

                                     500   500   500   500   500   500
  Preventative Maintenance
             200
Code update provided by manufacturers of
operating systems and software
applications .
  Question
 A: What is a patch?
                                     100   100   100   100   100   100

                                     200   200   200   200   200   200

                                     300   300   300   300   300   300

                                     400   400   400   400   400   400

                                     500   500   500   500   500   500
Preventative Maintenance
           300
A comprehensive update application
which combines patches and upgrades.

 Question
A: What is a Service Pack?
                                  100   100   100   100   100   100

                                  200   200   200   200   200   200

                                  300   300   300   300   300   300

                                  400   400   400   400   400   400

                                  500   500   500   500   500   500
Preventative Maintenance
           400
Default time for Windows Update to
install updates and patches.

Question
A: What is 3 AM?
                                     100   100   100   100   100   100

                                     200   200   200   200   200   200

                                     300   300   300   300   300   300

                                     400   400   400   400   400   400

                                     500   500   500   500   500   500
Preventative Maintenance
           500
The first step when installing service
packs and security patches.

 Question
A: What is Create a Restore Point?
                                         100   100   100   100   100   100

                                         200   200   200   200   200   200

                                         300   300   300   300   300   300

                                         400   400   400   400   400   400

                                         500   500   500   500   500   500
           Troubleshooting
                 100
 A common sign that a computer may
 have a virus

 Question
A: What is slow computer operation OR slow Internet
   connection?
                                                      100   100   100   100   100   100

                                                      200   200   200   200   200   200

                                                      300   300   300   300   300   300

                                                      400   400   400   400   400   400

                                                      500   500   500   500   500   500
           Troubleshooting
                 200
In Closing with the customer, you
should have them verify
_____________.
 Question
A: What is That the problem has been solved?
                                               100   100   100   100   100   100

                                               200   200   200   200   200   200

                                               300   300   300   300   300   300

                                               400   400   400   400   400   400

                                               500   500   500   500   500   500
               Troubleshooting
                     300
    Two resources that could be used to
    Evaluate the Problem.

     Question
A: What is Other Techs, Internet Search, News Groups,
Manufacturer FAQs , Manuals, Online Forums, Technical   100

                                                        200
                                                              100

                                                              200
                                                                    100

                                                                    200
                                                                          100

                                                                          200
                                                                                100

                                                                                200
                                                                                      100

                                                                                      200


  Websites                                              300

                                                        400
                                                              300

                                                              400
                                                                    300

                                                                    400
                                                                          300

                                                                          400
                                                                                300

                                                                                400
                                                                                      300

                                                                                      400

                                                        500   500   500   500   500   500
          Troubleshooting
                400
One type of security that is better than
64-bit WEP.

Question
A: What is 128-bit WEP, WAP, or EAP-Cisco ?
                                              100   100   100   100   100   100

                                              200   200   200   200   200   200

                                              300   300   300   300   300   300

                                              400   400   400   400   400   400

                                              500   500   500   500   500   500
           Troubleshooting
                 500
Two Quick Solutions for virus problems


 Question
A: What is Scan the Computer, Reboot, Login as different
   user, Check for OS updates/patches, update anti-virus
   signatures, change password?                        100

                                                      200
                                                             100

                                                             200
                                                                   100

                                                                   200
                                                                         100

                                                                         200
                                                                               100

                                                                               200
                                                                                     100

                                                                                     200

                                                      300    300   300   300   300   300

                                                      400    400   400   400   400   400

                                                      500    500   500   500   500   500
               Final Jeopardy

Identifies physical characteristics of the
user, such as fingerprints or retinas



  Question
 A: What is a Biometric sensor?
                                             100   100   100   100   100   100

                                             200   200   200   200   200   200

                                             300   300   300   300   300   300

                                             400   400   400   400   400   400

                                             500   500   500   500   500   500

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:20
posted:9/5/2011
language:English
pages:33