Security Risks
More Security Risks
Protection
More Protection
Network Admin
100
What is a computer program that replicates itself and is often malicious?
A Virus.
100
It is malicious software meant to gain access, disrupt computer operation, or gather sensitive information.
Malware
100
A physical device or application designed to deny incoming or outgoing traffic on a network.
Firewall
100
A string of characters that allows access to a computer, interface, or system.
Password.
100
What is a network administrator?
someone who is responsible for configuring a network system and managing its operations.
200
What is a worm?
Software that uses computer networks and security holes to replicate itself.
200
It is a type of malware that collects user information by tracking the habits of users.
Spyware
200
Application used to prevent infection from risks.
Antivirus software.
200
Define Authentication.
The process of verifying that "you are who you say you are"
200
What are 3 responsibilities of a network administrator?
Network configuration Network design and supervision Monitoring and filtering Maintaining and securing Updating and backing up
300
What is a computer program hidden within the shell of another program with an alternative intent such as a virus.
A Trojan Horse.
300
What does DOS stand for?
Denial of Service.
300
Advertising software that automatically generates advertisements. It can be legitimately developed software but in some cases it can pose a threat.
Adware
300
How can internet users remain educated about computer risks?
Internet resources Public news networks
300
The overall design of a communications network is...
Network configuration?
400
What is a hacker?
It is a person who gains unauthorized access to a computing device or network.
400
Define DOS.
An attempt to make a machine or network resource unavailable to its intended users.
400

Explain the difference between symmetric and asymmetric encryption.

Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of keys – a public key for encryption and a private key for decryption.

400
How often should you change your password?
Often; regularly.
400
What does NOS stand for?
Network operating system.
500
What is phishing?
The act of masquerading as a trustworthy website or email to acquire user information; identity theft is the intent.
500

Explain what a man-in-the-middle attack is.

 Where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other.

500
Name three prevention methods for keeping your computer safe.
User awareness and education Anti-virus software Firewalls Passwords Authentication
500
What is the 2 step verification method?
A bank card and a PIN number is a two-step verification system.
500

Explain what a Disaster recovery plan is and list the 5 steps.

Novell Windows Linux

M
e
n
u