it computer security jeopardy routermodeswanencapsulationwanservicesrouterbasicsroutercommands 100...
TRANSCRIPT
IT Computer Security
JEOPARDY
RouterRouterModesModes
WANWANEncapsulationEncapsulation
WANWANServicesServices
RouterRouterBasicsBasics
RouterRouterCommands Commands
100
200
300
400
500
RouterRouterModesModes
WANWANEncapsulationEncapsulation
WANWANServicesServices
RouterRouterBasicsBasics
RouterRouterCommands Commands
100 100 100 100 100
200 200 200 200 200
300 300 300 300 300
400 400 400 400 400
500 500 500 500 500
VirusesViruses SpywareSpywareWeb Web
SecuritySecurity SecuritySecurityThreatsThreats
PreventionPrevention RemovalRemoval
100
200
300
400
500
100
200
300
400
500
► ► ► F i n a l J e o p a r d y ◄ ◄ ◄
Question
A program written with malicious intent.
Viruses100
A: What is a virus?
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
QuestionA: What is a worm?
A self-replicating program that is harmful to networks
Viruses200
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Trojan?
This is often disguised as useful software.
Viruses300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Consume the Network Bandwidth?
Worms are harmful in a network because they do this to network bandwidth.
Viruses400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Keylogger?
A virus that records anything typed into the computer by the keyboard and sends a log to the virus author.
Viruses500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Adware?
Displays advertising on the user’s computer.
Spyware100
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Spyware?
Monitors activity on the computer.
Spyware 200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Tracking Cookie?
A file that may or may not be harmful that tracks user web browsing behaviour
Spyware 300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Shareware/Bundled Software?
Installing this type of software is usually how adware is installed on a user’s system.
Spyware 400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Grayware or Malware?
Unwanted software designed to infiltrate a computer system and send out personal information.
Spyware 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What are ActiveX, Java, Javascript?
Two of the three web tools that attackers use to install a program on a computer
Web Security100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What are pop-ups?
Multiple windows appearing on the screen above your browser window.
Web Security 200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is spoofing?
A form of attack to gain access to resources on devices by pretending to be a trusted computer or website.
Web Security 300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is the Internet Security Bar?
This prompt will appear in IE to prevent unwanted software from being installed by websites.
Web Security 400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is the Security Tab?
This tab found in the Internet Options will allow you to customize your ActiveX, Java and Cookie settings.
Web Security 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Physical Threat?
An event or attack that results in theft or damage of office hardware such as switches, servers, laptops, etc.
Security Threats100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Data Threat?
An event or attack that results in the removal, corruption, or unauthorized access of confidential information.
Security Threats 200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is an Unstructured Attack?
When attackers use available resources such as a passwords or scripts to gain unauthorized access to a network.
Security Threats 300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Structured Attack?
When attackers use code to access operating systems and software.
Security Threats 400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What are Internal Threats?
Accidental or intentional attacks from company employees.
Security Threats 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What are No Subject Line, Incomplete return address, Computer general e-mail, Return e-mail not sent by user?
Two common indications of SPAM e-mail that anti-spam software will recognize.
Prevention100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is System Restore?
This can be disabled to prevent reinfection of your system should you ever decide to ‘roll back’ to a previous saved point.
Prevention 200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Spybot’s TeaTimer & SD Helper?
When installed, it can monitor your computer system and prevent further infection from unauthorized changes by Spyware programs.
Prevention 300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What are Operating System and Software Updates and Patches?
Installing these will ensure your system’s security is up to date and any known vulnerabilities are eliminated.
Prevention 400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Pop-up Blocker?
This type of software will prevent websites from displaying annoying and unwanted windows.
Prevention 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is the Advanced Startup Menu & Safe Mode?
Pressing F8 at the beginning of the computer’s bootup sequence will allow you access to this Windows feature..
Removal100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is normal mode?
After scanning for a virus in Safe Mode, an additional scan should be run in this mode
Removal 200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Two?
The number of different spyware scanners you should utilize when removing spyware.
Removal 300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Delete or Move to Vault/Quaruntine?
This should be done when a virus is detected on your system by your anti-virus program.
Removal 400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a boot-time scan?
This type of virus scan should be done if you suspect your computer has a startup or boot sector virus.
Removal 500
QuestionA: What are computer starts acting abnormally, program does not respond to
mouse and keystrokes, program starting or shutting down on their own, CPU usage is high, unidentifiable or large number of processes running, computer slows down significantly or crashes, e-mail
program begins sending out large quantities of e-mail?
These are three signs that your computer may be infected.
Final Jeopardy
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500