Printers
Printer Functions
Operational Procedures
Securing Computers
Mix it up
100

A type of printer that works by ejecting ink through tiny tubes

What is Inkjet

  

100

The primary corona wire charges this

 

What is the drum

  

100

What should be used to protect against power dips and blackouts

What is an uninterruptible power supply

  

100

How a computer determines who can or should access it, and once accessed, what that user can do

What is authentication

  

100

The Control Panel applet that is used to manage printers and faxes in Windows 7/8/8.1

What are Devices and Printers 

200

A printer that relies on a photoconductive process

What is Laser

200

Laser printers usually use a laser as the light source because of 

What is precision 

200

Is used to protect against power spikes

What is a surge protector

  

200

Most computer attacks that involves using or manipulating people inside the networking environment to gain access to that network from the outside is called

What is social engineering

  

200

This consists of techs and representatives from management, IT security, and administration who review the change documentation and either approve or deny the change

What is change board

  

300

The type of printer that is used with multipart forms such as those with point of sale machines

What is Dot-matrix

300

How dots are put onto the surface of paper from a direct thermal printer

What is by burning 

300

The process that enables organizations to implement changes to IT infrastructure in a safe and cost-effective manner

What is change management process

  

300

Physical security, authentication, users and groups, and security policies are all aspects of

What is access control

  

300

A complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems

What is a worm

400

A printer that transfers data to the printer one character or one line at a time

What is impact

400

The fuser assembly in a laser printer is almost always separate from the

What is toner cartridge

  

400

Verifying a backup is called

What is backup testing

  

400

Together, what are viruses, Trojans, and worms called

What is malware

400

A type of virus that attempts to change its signature to prevent detection by antivirus programs

What is a polymorph

  

500

A 9-pin dot-matrix printer is generically called

What is draft quality

  

500

This printer part can cause an unwanted mark (dark ghosting) to appear on printed pages

What is a damaged drum

  

500

Tracking of specific problems that helps current and future techs deal with problematic hardware and individuals is called

What is incident documentation

500

A term that describes the process of cleaning up after a virus infection

What is remediation 

500

If Sally is a member of multiple groups. A file has been granted different permissions to these different groups. What is Sally's effective permission?

What are combined permissions of all groups

  

M
e
n
u