33
IT Essentials 1 Chapter 9 JEOPADY

IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands

Embed Size (px)

Citation preview

IT Essentials 1

Chapter 9

JEOPADY

RouterRouterModesModes

WANWANEncapsulationEncapsulation

WANWANServicesServices

RouterRouterBasicsBasics

RouterRouterCommands Commands

100

200

300

400

500

RouterRouterModesModes

WANWANEncapsulationEncapsulation

WANWANServicesServices

RouterRouterBasicsBasics

RouterRouterCommands Commands

100 100 100 100 100

200 200 200 200 200

300 300 300 300 300

400 400 400 400 400

500 500 500 500 500

VirusesVirusesSecuritySecurityThreatsThreats

TCP/IPTCP/IPAttacksAttacks

SecuritySecurityProceduresProcedures

PreventativePreventativeMaintenanceMaintenance

Trouble-Trouble-shootingshooting

100

200

300

400

500

100

200

300

400

500

► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

Question

A program written with malicious intent.

Viruses100

A: What is a virus?

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

QuestionA: What is a worm?

A self-replicating program that is harmful to networks

Viruses200

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Trojan?

Often disguised as useful software.

Viruses300

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Consume Bandwidth?

Worms are harmful in a network because they_____________.

Viruses400

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Stealth Virus.

Type of virus that lays dormant until summoned by the attacker

Viruses500

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Adware?

Displays advertising on the user’s computer.

Security Threats100

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Spyware?

Monitors activity on the computer.

Security Threats200

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Phishing?

Attacker pretends to represent a legitimate outside organization.

Security Threats300

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Social Engineer?

A person that is able to gain access to private information through tricks.

Security Threats400

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is ActiveX, Java, or JavaScript

Two of the three web tools that attackers use to install a program on a computer

Security Threats500

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is zombies?

These infected computers make tracing the origin of the DoS attack difficult to locate.

TCP/IP Attacks100

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is usernames and passwords?

Information extracted from a replay attack.

TCP/IP Attacks200

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is spoofing?

A form of attack to gain access to resources on devices by pretending to be a trusted computer

TCP/IP Attacks300

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is SYN flood?

A specific type of DoS attack via random TCP/IP ports

TCP/IP Attacks400

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is DNS Poisoning?

A technique to redirect to false servers containing malicious content

TCP/IP Attacks500

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is NTFS?

A file system with increased security and compatibility.

Security Procedures100

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Security Policy?

A list of definitions to describe how a company addresses security issues.

Security Procedures200

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is BIOS and Login?

Two levels of password protection.

Security Procedures300

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Cable Locks, RFID tags, Berg Connectors, Biometric Sensors, Security Guards and Security Cages?

List two methods of physical security.

Security Procedures400

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a WPA2?

An encryption format covering the entire 802.11i standard.

Security Procedures500

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a signature?

Patterns in the programming code of the software in a computer – used by antivirus programs to identify threats.

Preventative Maintenance100

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a patch?

Code update provided by manufacturers of operating systems and software applications .

Preventative Maintenance200

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Service Pack?

A comprehensive update application which combines patches and upgrades.

Preventative Maintenance300

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is 3 AM?

Default time for Windows Update to install updates and patches.

Preventative Maintenance400

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Create a Restore Point?

The first step when installing service packs and security patches.

Preventative Maintenance500

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is slow computer operation OR slow Internet connection?

A common sign that a computer may have a virus

Troubleshooting100

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is That the problem has been solved?

In Closing with the customer, you should have them verify _____________.

Troubleshooting200

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Other Techs, Internet Search, News Groups,

Manufacturer FAQs , Manuals, Online Forums, Technical Websites

Two resources that could be used to Evaluate the Problem.

Troubleshooting300

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is 128-bit WEP, WAP, or EAP-Cisco ?

One type of security that is better than 64-bit WEP.

Troubleshooting400

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Scan the Computer, Reboot, Login as different user, Check for OS updates/patches, update anti-virus signatures, change password?

Two Quick Solutions for virus problems

Troubleshooting500

QuestionA: What is a Biometric sensor?

Identifies physical characteristics of the user, such as fingerprints or retinas

Final Jeopardy

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500