Super Omega Physical Security
Name that Omega Word
Fill in the Awesome Omega Blank
Super Hot fire walls
&
Awesome End point Security
Omega Freestyle
100
names of hardware threats?
What is Physical damaged to servers, routers, switches, cabling plant, and workstations.
100
What is the omega word for the definition of The entire application was written to look like something else when in fact it is an attack tool?
What is Trojan horse?
100
Basic security of wireless ____ default values
What is Change?
100
what are some common endpoints?
What is laptops, desktops, servers, smart phones, and tablets.
100
The command "ipconfig" when entered in the windows command prompt displays what?
What is the ip address, subnet mask and default gateway?
200
name of the environmental threats?
What is temperature extremes or humidity extremes
200
What is the omega word that refers to: recording what the user accessed, the amount of time the they had accessed it , and if any changes were made?
What is Accounting?
200
______ is a case sensitive, alpha-numeric name for your home wireless network.
What is SSID
200
Employees must follow what, when working in a company or organization?
What are documents security policies?
200
What are two real-time video protocols?
What is the use time transport protocol (RTP) and Real-time Transport Control Protocol (RTCP)?
300
Name three types of electrical hazards.
What are voltage spikes, insufficient supply voltage, unconditioned power, and total power loss
300
What is the omega word of malicious software that Is attached to another program to execute a particular unwanted function on a workstation
What is a virus?
300
USB flash drive must be formatted in a _______ format for using on a Cisco Router
What is FAT 16
300
Polices often include the use of ______(what you use to protect your computer from viruses) and host intrusion prevention.
What is abut-virus software
300
What are some common factors when considering intermediate devices?
What is the cost of said items, ports, the speed capability, expandable or not, and how manageable it is?
400
all 4 of the maintenance threats?
What is poor handling of key electrical components, lack of critical spare parts, poor cabling and poor labeling?
400
What is the omega word of self-contained programs that attack a system and try to exploit a specific vulnerability in the target. the worm copies its program from the attacking host to the newly exploited system to begin the cycle again.
What is a worm.
400
Backup configuration files using ____ or ____
What is TFTP or USB
400
what is SPI ( stateful packet inspection)?
What is incoming packets must be legitmate responses to request from internal hosts
400
How do you save Startup configuration to the tftp server
What is copy startup-config tftp
500
what is the key components to a completely secure physical area?
What is locked door, locked server rack, motion sensors, cameras, electric fence, armed guards, attack dogs, sentry guns, unmanned drones, Chuck Norris with 10 zombie pets with laser eyes. YES IT JUST GOT REAL!!! Also Mr. Ritchie is awesome!
500
type of wireless security that uses pre-configured keys to encrypt and decrypt data.
What is a WEP?
500
______ is the past present and future? (hint we all hate it and have no clue how to use it.)
What is Power Shell?
500
what firewall methods are used to help prevent unauthorized access and control traffic
What is packet filtering, application filtering, URL filtering, Stateful Packet Inspection.
500
Who has a power level of over 10,000 in this class
What is Mr.Ritchie