it computer security jeopardy routermodeswanencapsulationwanservicesrouterbasicsroutercommands 100...

33
IT Computer Security JEOPARDY

Upload: eustace-little

Post on 21-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

IT Computer Security

JEOPARDY

Page 2: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

RouterRouterModesModes

WANWANEncapsulationEncapsulation

WANWANServicesServices

RouterRouterBasicsBasics

RouterRouterCommands Commands

100

200

300

400

500

RouterRouterModesModes

WANWANEncapsulationEncapsulation

WANWANServicesServices

RouterRouterBasicsBasics

RouterRouterCommands Commands

100 100 100 100 100

200 200 200 200 200

300 300 300 300 300

400 400 400 400 400

500 500 500 500 500

VirusesViruses SpywareSpywareWeb Web

SecuritySecurity SecuritySecurityThreatsThreats

PreventionPrevention RemovalRemoval

100

200

300

400

500

100

200

300

400

500

► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

Page 3: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

A program written with malicious intent.

Viruses100

A: What is a virus?

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

Page 4: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

QuestionA: What is a worm?

A self-replicating program that is harmful to networks

Viruses200

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

Page 5: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Trojan?

This is often disguised as useful software.

Viruses300

Page 6: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Consume the Network Bandwidth?

Worms are harmful in a network because they do this to network bandwidth.

Viruses400

Page 7: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Keylogger?

A virus that records anything typed into the computer by the keyboard and sends a log to the virus author.

Viruses500

Page 8: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Adware?

Displays advertising on the user’s computer.

Spyware100

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

Page 9: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Spyware?

Monitors activity on the computer.

Spyware 200

Page 10: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Tracking Cookie?

A file that may or may not be harmful that tracks user web browsing behaviour

Spyware 300

Page 11: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Shareware/Bundled Software?

Installing this type of software is usually how adware is installed on a user’s system.

Spyware 400

Page 12: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Grayware or Malware?

Unwanted software designed to infiltrate a computer system and send out personal information.

Spyware 500

Page 13: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What are ActiveX, Java, Javascript?

Two of the three web tools that attackers use to install a program on a computer

Web Security100

Page 14: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What are pop-ups?

Multiple windows appearing on the screen above your browser window.

Web Security 200

Page 15: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is spoofing?

A form of attack to gain access to resources on devices by pretending to be a trusted computer or website.

Web Security 300

Page 16: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is the Internet Security Bar?

This prompt will appear in IE to prevent unwanted software from being installed by websites.

Web Security 400

Page 17: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is the Security Tab?

This tab found in the Internet Options will allow you to customize your ActiveX, Java and Cookie settings.

Web Security 500

Page 18: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Physical Threat?

An event or attack that results in theft or damage of office hardware such as switches, servers, laptops, etc.

Security Threats100

Page 19: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Data Threat?

An event or attack that results in the removal, corruption, or unauthorized access of confidential information.

Security Threats 200

Page 20: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is an Unstructured Attack?

When attackers use available resources such as a passwords or scripts to gain unauthorized access to a network.

Security Threats 300

Page 21: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Structured Attack?

When attackers use code to access operating systems and software.

Security Threats 400

Page 22: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What are Internal Threats?

Accidental or intentional attacks from company employees.

Security Threats 500

Page 23: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What are No Subject Line, Incomplete return address, Computer general e-mail, Return e-mail not sent by user?

Two common indications of SPAM e-mail that anti-spam software will recognize.

Prevention100

Page 24: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is System Restore?

This can be disabled to prevent reinfection of your system should you ever decide to ‘roll back’ to a previous saved point.

Prevention 200

Page 25: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Spybot’s TeaTimer & SD Helper?

When installed, it can monitor your computer system and prevent further infection from unauthorized changes by Spyware programs.

Prevention 300

Page 26: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What are Operating System and Software Updates and Patches?

Installing these will ensure your system’s security is up to date and any known vulnerabilities are eliminated.

Prevention 400

Page 27: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Pop-up Blocker?

This type of software will prevent websites from displaying annoying and unwanted windows.

Prevention 500

Page 28: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is the Advanced Startup Menu & Safe Mode?

Pressing F8 at the beginning of the computer’s bootup sequence will allow you access to this Windows feature..

Removal100

Page 29: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is normal mode?

After scanning for a virus in Safe Mode, an additional scan should be run in this mode

Removal 200

Page 30: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Two?

The number of different spyware scanners you should utilize when removing spyware.

Removal 300

Page 31: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Delete or Move to Vault/Quaruntine?

This should be done when a virus is detected on your system by your anti-virus program.

Removal 400

Page 32: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a boot-time scan?

This type of virus scan should be done if you suspect your computer has a startup or boot sector virus.

Removal 500

Page 33: IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

QuestionA: What are computer starts acting abnormally, program does not respond to

mouse and keystrokes, program starting or shutting down on their own, CPU usage is high, unidentifiable or large number of processes running, computer slows down significantly or crashes, e-mail

program begins sending out large quantities of e-mail?

These are three signs that your computer may be infected.

Final Jeopardy

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500