Viewing information on a user's screen without their knowledge
What is Shoulder Surfing?
Secure encryption method used by WPA2 to protect wireless networks
What is AES (Advanced Encryption Standard?
A form of malware that has the ability to replicate without any intervention is referred to as a ____.
What is a worm?
Windows feature that lets any single file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent
What is EFS?
Information that, when used alone or with other relevant data, can identify an individual
What is PII (Personally Identifiable Information)?
Security measure that uses an individual's physical characteristics for authentication
What is biometrics?
Protocol and port number used to talk to the Microsoft directory service database used to manage computers and other devices on the network
What is LDAP (Lightweight Directory Access Protocol), port 389?
One form of malware is disguised as an application that users unwittingly download and run, which leads to a virus. This form of malware is referred to as ____.
What is a Trojan Horse?
Technology that provides a secure tunnel over an un-trusted network.
What is a VPN?
Peter Parker's popular line at the end of "Avengers: Infinity War"
What is "Mr. Stark, I don't feel so good"?
A form of social engineering where an unauthorized person gains access to a controlled area by following in someone who has legitimate access.
What is tailgating?
Incorporate this on a home router to prevent network access to an unauthorized device based on its specific address.
What is MAC filtering?
The attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other
What is a Man in the Middle attack?
Windows allows removable flash drives and external hard drives to be encrypted using a process referred to as ____.
What is Bitlocker-to-Go?
Port number and protocol that allows secure login to a remote device.
What is SSH (22)?
A physical or logical subnetwork that contains and exposes an organization's external-facing services to an un-trusted, usually larger, network such as the Internet
What is a DMZ?
Used by HTTPS to verify the authenticity of the server as well as provide encryption for the HTTP protocol?
What is a certificate?
Attack that occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
What is a DDOS attack?
A feature of the Windows operating system that causes predetermined system actions when certain media is inserted
What is Autorun?
The cartoon show Ms. Courtney's background is taken from
What is Kim Possible?
Name three out of the five factors/ methods used for authentication
Something you know: Passwords, PIN numbers, account number
Something you have: Physical keys, fobs
Something you are: Biometrics
Somewhere you are: GPS, Geo-IP
Something you do: Signing your name
Name three out of the five 802.11 standards, their bandwidths and frequencies.
A: 54 Mbps/ 5.0 GHz
B: 11 Mbps/ 2.4 GHz
G: 54 Mbps/ 2.4 GHz
N: 600 Mbps/ 2.4 & 5.0 GHz
AC: 1300 Mbps or 1.3 Gbps/ 5.0 GHz
A fast-moving virus that is able to attack the boot sector and executable files simultaneously
What is a multipartite virus?
Technology from Microsoft that can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs
What is Active Directory?
A computer connected to the Internet that has been compromised and can be used to perform malicious tasks under remote direction
What is a zombie?