Question - Teacher

ovenforksqueeSecurity

Nov 3, 2013 (3 years and 9 months ago)

138 views

IT Essentials Module 9 Fundamentals of Security Study Guide



Name: _______________________________

Period: _____

Curriculum
Section

Question

Answer

9.
0

1.

Technicians need to understand



2.

Failure to implement proper security
procedures can have an impact on


9.1

3.

Computer and network security help to



4.

_________, _____
____,

and
__________ are some of the ways a
network
or computer can be harmed.



5.

Repairing and replacing equipment can
cost the company



6.

Poorly implemented security measures
to wireless network devices demonstrate that



7.

The primary responsibilities of a
technician include



8.

You may also be asked to instruct users
how to





9.2

9.

List the two type of threat that
a
technician must understand:



10.

Threats to security can come from



11.

Internal Threats include:



12.

External Threats include:



13.

Threats against data are constantly
changing as



14.

After completing this section, you will
meet these objectives:


9.2.1

15.

Computer viruses are deliberately



16.

A virus is a program written with



17.

The virus is transferred to another
computer through



18.

How does a virus work?



19.

The most damaging type of virus is used
to



20.

That allows these viruses to be used by
attackers to harvest sensitive information,
such as



21.

A worm is a



22.

How is a worm different from a virus?



23.

Even if the worm does not damage data
or applications on the hosts it infects, it is
harmful to networks because it



24.

A Trojan threat is hidden in software
that



25.

Trojans are often disguised as



26.

Go to the internet & google
cost of
computer virus
.
How much does it
cost?


IT Essentials Module 9 Fundamentals of Security Study Guide



Name: _______________________________

Period: _____


27.

Virus protection software, known
as___________, is software designed
specifically to _____ before they infect a
computer.


9.2.2

28.

Web security is important because



29.

examples of web tools: (just list)



30.

Attackers may use any of these tools to


9.2.3

31.

Adware, spyware, and grayware are
usually installed on a computer



32.

Adware is a software program that



33.

Grayware or malware is



34.

Spyware monitors__________. The
spyware then sends this information to
________.



35.

Phishing is



36.

Do the
Adware, Spyware, and
Phishing activity


9.2.4

37.

_____________
is a form of attack
that prevents users from accessing normal
services, such as e
-
mail and a web server.



38.

It is caused by



39.

Common DoS attacks include:





40.

Distributed DoS (DDoS) is another form
of attack that uses many infected computers,
called ________, to launch an attack.


9.2.5

41.

Spam, also known as junk mail, is ____,



42.

When used as an attack method, spam
may include links to ________or an
_______.



43.

Spam may include links to an infected
website or an attachment that could infect a
computer. These links or attachments may
result in lots of windows designed to capture
your attention and lead you to advertising
sites. These windows are called________.



44.

Common SPAM indications:


9.2.6

45.

A _______is a person who is able to
gain access to equipment or a network by
tricking people into providing the necessary
access information.




46.

Basic precautions to help protect against
social engineering:


9.2.7

47.

Define these common attacks:


IT Essentials Module 9 Fundamentals of Security Study Guide



Name: _______________________________

Period: _____


48.

SYN Flood



49.

DoS



50.

DDoS



51.

Spoofing



52.

Man
-
in
-
the
-
Middle



53.

Replay



54.

DNS Poisoning


9.2.8

55.

______ is the process of removing
sensitive data from hardware and software
before recycling or discarding.



56.

The only way to fully ensure that data
cannot be recovered from a hard drive is to



57.

Media like CDs and floppy disks must
also be destroyed. Use a


9.
3

58.

A security plan should be used to
determine



59.

Part of the process of ensuring security
is to conduct tests to


9.
3.1

60.

Though local security policies may vary
between organizations, there are questions all
organizations should ask:



61.

List
4

security issues that a company
must address.


9.
3.2

62.

______is as important as data security.



63.

List 3
methods of physically protecting
computer equipment


9.3.3

64.

The value of physical equipment is often
far less than the



65.

Losses may result in



66.

All computers should be.



67.

Two levels of password
protection are
recommended:



68.

List Password rules:



69.

Encrypting data uses



70.

Virtual Private Network (VPN) uses
_____ to protect data.



71.

Every communication using TCP/IP is
associated with a



72.

__________ procedures should be
included in a security
plan.



73.

3 considerations for backup include:



74.

All file systems keep track of resources,
but only file systems with ______ can log

IT Essentials Module 9 Fundamentals of Security Study Guide



Name: _______________________________

Period: _____

access by user, date, and time.

9.3.4

75.

Since traffic flows through radio waves
in wireless networks, it is easy for attackers
to



76.

A technician needs to know how to



77.

An attacker can access data as it travels
over the radio signal. A ________ system
can be used to prevent unwanted capture a
nd
use of data by encoding the information that
is sent.



78.

Wired Equivalent Privacy (WEP)



the



79.

Wi
-
Fi Protected Access (WPA)



an



80.

Lightweight Extensible
Authentication Protocol (LEAP)
, also
called
EAP
-
Cisco



81.

Wireless Transport Layer Security
(WTLS) is a


9.4

82.

__________is a constantly changing
process and technology



83.

Software manufacturers have to
regularly create and issue


9.4.1

84.

Threats to security from ______and
______ are always present.



85.

Virus, spyware, and adware detection
programs look for



86.

Code patterns are called



87.

To avoid creating too much traffic at a
single website, some manufacturers
distribute their signature files for download
to multiple download sites. These download
sites

are called__________.


9.4.2

88.

From time to time, manufacturers
combine patches and upgrades into a
comprehensive update application called a



89.

If you use the Automatic setting you can
schedule the time and day. Otherwise, new
updates are installed at __
_____ by default.



90.

Follow the steps in Figure 1 to update
the operating system with a service pack or
security patch. Log IN as admin.


9.5

91.

The troubleshooting process is used to
help



92.

List the troubleshooting steps.


9.5.1

93.

List 3 open ended
questions



94.

List 3 closed ended questions



95.

List 3 things to verify obvious issues.


IT Essentials Module 9 Fundamentals of Security Study Guide



Name: _______________________________

Period: _____


96.

List 3 quick try solutions.



97.

At this point, you will have enough
information to


9.5.2

98.

List 3 possible problems & their
solutions,


9.6

99.

Security protects