The type of security where you lock the server room and have a security camera to monitor access
What is physical security
.exe, .com and .bat are examples of this type of file.
What are executable (program) files.
It's what you should do when your browser tells you a website may contain malware
What is close your browser or go back to the previous page.
If you live in rugged terrain, or far from civilization where cellular access is not possible, it may be the only way to get Internet access.
What is satellite
Its the type of computer that other computers on a network use to gain access to files and network devices.
What is a server
The type of password that requires using uppercase, lowercase, numbers and special characters, but the best ones are long.
What is a secure password?
.rtf and .pdf and .doc are examples of file extensions used for data files of this type of program
What is a word processor.
You disable its broadcast on a wireless router. It doesn't secure much, but it's still a best practice.
What is the SSID
It's the most mobile type of network connection.
What is cellular
You find the iOS on it.
What is an iPhone or iPad
When an attacker uses a bluetooth connection to make it look like you sent out malware from your device.
What is bluejacking
they are 3 examples of image files.
What is .jpg, .jpeg, .png .tif, .bmp
Presently, it's the most secure wireless encryption protocol.
What is WPA2
It's the type of connector used most often for Ethernet networks.
What is RJ-45
It's a special device for reading digital books.
What is a kindle or eReader
Malware that replicates freely across a network and doesn't need a host file to do so
What is a worm
.rar .jar .gzip .iso and .dmg are all examples of this type of file.
What is a compression / compressed file
It's not very secure, but usually you press a button on the router and on the device to connect the wireless device to your wireless network. It can also be a code printed on the router that you enter into the wireless printer or device.
What is WPS (Wifi protected setup)
It's what DHCP on a router does
What is assign an IP address
They are the two most popular OSs found on smartphones.
What are Android and iOS
It's the most dangerous type of access that an attacker can gain, and it's usually done using a trojan horse.
What is remote control
.mp3 .m4a and .wav are all examples of this type of file
What is an audio file
It can be software or a physical device that does things like packet inspection and blocking certain traffic to protect your network.
what is a firewall
It has to be turned on in Control Panel before people can access your printer that you shared.
What is File and Printer Sharing
Between VGA, PS2, PATA, and USB, it's the only one you can plug in with the power on without risking damage to the motherboard or the device
What is USB