Security Threats
Security Procedures Preventive Maintenance
Types of Security Threats
Preventative Security Procedures
Security Troubleshooting
100

Malware that can lay dormant until summoned by an attacker is considered this.

What is a virus.

100

This is a program that runs on a computer to allow or deny traffic between the computer and other computers to which it is connected. 

What is a software firewall.

100

While you cannot stop this threat, you can diminish it by running a filter on your email.

What is Spam.

100

These are three things you can do to avoid being attached via social engineering.

  • Never give out your login credentials 
  • Never post credential information in your work area.
  • Lock your computer when you leave your desk.
100

This is the solution of a user receiving hundreds or thousands of junk mail each day.

What is installing an antivirus or an email software program that removes spam.
200

This looks like a useful program but actually holds malicious code.

What is a trojan horse.

200

This compares physical characteristics against stored profiles to authenticate people. 

Biometric Security

200

These are used in the process of a DDoS attack as an army. They are also the first to be infected.

What are Zombie computers.

200

An administrator configures this that applies to all computers that join a domain. Account policies are automatically set when a user logs in to Windows.

 What is a Domain Security Policy.

200

This is why all my Windows Updates fail.

What is the update is corrupted or the update requires a previous update that is not installed.

300

This malware is very difficult to detect because it can conceal itself.

What is a Rootkit.

300

This store private information, such as bank account numbers, personal identification, medical records, and digital signatures. 

What is smart card security.

300

This type of attack randomly opens TCP ports at the source of the attack and ties up the network equipment or computer with a large amount of false requests.

What is a SYN flood.

300

The system administrator usually defines this for usernames when creating network logins.

What is a naming convention.

300

This is causing all my files to disappear.

What is a virus.
400
You must use these three things to detect, disable, and remove malware before it infects a computer.

What is antivirus, antispyware, and adware removal tools.

400

This is a process which is more secure than a username and password combination. 

What is two-factor authentication.

400

This type of attack is used to manipulate messages and relay false information between hosts, because the hosts are unaware that the messages have been modified.

What is man-in-the-middle.

400

These are the recommended three levels of password protection.

What are 

- The BIOS login

- The OS login

- The Network login

400

Changing my email password and contacting the email service support is a way of solving this problem.

What is a hijacked email.

500

Many organizations establish this stating that employees are not permitted to install any software that is not provided by the company.

what is a written security policy.

500

These are the five types of permissions.

What are 

- Full control

-Modify

-Read & Execute

-Read

-Write

500

The term zero-hour describes this.

What is the moment when the exploited vulnerability is discovered by the manufacturer.

500

These are the four guidelines for strong password.

What are 

-Minimum length

-Complexity

- Variety

-Expiration

500

This is what you should do if you see an unknown person looking under keyboards and on desktops.

What is contact security.