Ch6 Ntwrk Sharing & Storage
Ch 7 Mobile Devices
Ch 8 Security Threats
Ch 9 Security Best Practices
Ch 10 Buying & Config
100

Network that spans a city or large campus.

What is a MAN? Metropolitan Area Network

100

POP3

What is Post Office Protocol 3?

Page 351

100

Name 2 of 3 types of security threats

What are physical, people based, and software based?

Page 378

100

Optimal number of characters for password

What is 8?

Page 423

100

SOHO

What is Small/Office/Home Office computers?

Page 469

200

Server based networks are also known as this

What is a domain? 

Page 308

200

Short range connectivity with peripheral devices

(key boards, mice, speakers, communication devices......)

What is Bluetooth?

Page 359

200

Method of circumventing the normal security system on a computer

What backdoor?

Page 396

200

This requires multiple pieces of information for you to log in

What is multi-factor?

Page 424

200

HTPC

What is Home Theater PC?

Page 472

300

This type of sharing does not involve servers

What is P2P? Peer to peer

Page 312

300

IMAP

What is Internet Message Protocol?

Page 352

port 143

300

Rogue application that enters the system or network disguised as another program

What is a Trojan Horse?

Page 394

300

Name a software component added to your browser to give it additional functionality.

What are Plugins, Toolbars, or Extensions?

Page 430

300

Connectors that go on ONE WAY are called this

What are keyed?

Page 475

400

Share permission that users can't change permissions, delete sub-folders or files or give themselves ownership

What is modify? 

Page 318

Others Full control and read.

400

Occurs when someone connects to your device without your knowledge and has access to all of the data (pictures, contacts, emails, etc) on your device

What is Bluesnarfing?

Page 359

Bluejacking is sending harmless messages to your device via Bluetooth.

400

Exploits the enhancement made to many application programs such a Microsoft Word and Excel.

What is Macro?

Page 390

400

An extra, usually small browser window that appears automatically when you display a certain web page or click on a button on a web page

What is a Pop-up?

Page 447

400

McAfee and Norton

What are Security System Software?

Page 481

500

IaaS

What is Infrastructure as a Service?

Page 325

500

Placing 2 fingers together and then slow spreading them apart to zoom in

What is a pinch? (reverse pinch)

Page 345

500

Many viruses today are spread using this

What is email?

Page 391

500

Name 1 of 2 cardinal rules for suspicious email

What are NEVER open any attachments or NEVER click on hyperlinks?

Page 454

500

Name the 3 steps involved in Configuring Peripherials

What are Plug in the device, Install the driver, and Verify functionality?

Page 481

M
e
n
u