MTA Security Fundamentals Lesson 5: Protecting ... - Davis.K12.ut.us
Recommend Documents
Period ______. MTA Security Fundamentals. Lesson 4: Understanding Network
Security. Key Terms application-level firewall - circuit-level firewall -.
The Fundamentals of Utility IT Security ... Center for Business Intelligence
conference - Electronic Security for the Power Industry ..... Microsoft Security
Center.
It was also because students knew that the results of the post test would .....
intelligence as a unitary trait that can be adequately measured by an IQ test”.
The President took bold action to stem the crisis and stimulate our economy and, since that time, America has worked har
Server Administration Fundamentals. Prerequisite: Basic computer skills. Note:
Textbook required; DVD-RW disc required. Learn server fundamentals such as ...
Welcome to the Microsoft Official Academic Course (MOAC) program for
Windows Server. Administration Fundamentals. MOAC represents the
collaboration ...
98-372. MTA: Microsoft .NET Fundamentals. Audience. Microsoft Technology ...
Candidates for this exam are seeking to prove knowledge and skills on Microsoft
...
SAT Vocabulary Lesson and Practice: Lesson 5. Word List with Definitions. 1.
absence (n) the fact of being gone or not present. 2. ambiguous (adj) having two
...
They also must learn how to influence the behavior of subordinates so that their
personal goals complement or ... few people reach the top level, those needs ...
In order for leaders to motivate, they .... Create self-motivation in subordinates.
Oct 15, 2009 ... Babylon. And while in captivity, remember the prophesies of. Jeremiah and those
and they prophesied they would come out in seventy years.
Under-Painting Techniques With Pastel. This lesson is a bit different in that you'll be copying my simple composition, t
Lesson Transparency 1.1. Houghton Mifflin Math • Grade 5. Problem of the Day.
Five friends are waiting in line for a movie. Jeff is immediately behind Kelly.
1. Network Security. Fundamentals. Steven Taylor. President, Distributed
Networking Associates, Inc. Publisher/Editor, Webtorials [email protected].
Scope and Scale. • Focus: FreeBSD - enterprise hardware support and most '
mainstream' of the open source BSD trees. • Security refresher and some new
and.
Microsoft. Security Fundamentals http://www.ipass4sure.com. The 98-367
practice exam is written and formatted by Certified Senior IT Professionals
working in.
Computer Security. Fundamentals .... How Seriously Should You Take Threats to
Network Security?.............. 3. Identifying Types of ... Microsoft Security Advisor.
Introduction. • Welcome to the course! • Instructor: ▫ Dr. Charles J. Antonelli. LSA
Information Technology. 500 S State Ste 1112 [email protected], 734 763 0607.
information security, both their definitions and their relationships. The included ...
to increase the understanding of information security fundamentals. This is.
0.250” diameter flat center cutting end mill to drill the holes ... TASK 9: Post and
create the CNC code file. Sample not for ... VR-8 5-AXIS MACHINING CENTERS.
about what's inside your body. This is an ... Activity: students observe and record
information about their own bodies. ... Connections to Other Curricular Areas.
8 And above all things have fervent love for one another, for "love will cover a multitude of sins." Thomas Constable. T
5-E Lesson Plan Template. Your Name: Ailsa R. White. Your E-mail Address:
[email protected]. Subject Area: Science. Grade Level: 6th, 7th, 8th grade.
flopped around in her big shoes and honked her round, red nose, but no one .... burst out of the cabin, eyes brimming wi
MTA Security Fundamentals Lesson 5: Protecting ... - Davis.K12.ut.us
MTA Security Fundamentals Lesson 5: Protecting the Server and Client Key Terms adwarebackdoor Bayesian filter – content zones – cookie – malicious software (malware) – Microsoft Baseline Security Analyzer (MBSA) offline files pharming phishing pop-up window – rootkit – Sender Policy Framework (SPF) – spam – spyware Trojan horse User Account Control (UAC) virus virus hoax Windows Defender Windows Firewall – Windows Server Update Server (WSUS) –. Windows updates -
Period ______
worm -
Multiple Choice: Circle the letter or letters that correspond to the best answer or answers. 1.
2.
3.
Which type of malware copies itself onto other computers without the owner’s consent and will often delete or corrupt files? a. Virus
c. Trojan horse
b. Worm
d. Spyware
Which type of malware collects personal information or browsing history, often without the user’s knowledge? a. Virus
c.
Trojan horse
b. Worm
d.
Spyware
Your computer seems to be slow, and you notice that you have a different default web page than usual. What is most likely the cause of problems? a. Your ISP has slowed your network connection. b. Your computer has been infected with malware. c. You did not update your computer. d. You accidentally clicked the turbo button.
4.
Besides installing an antivirus software package, you should always ___________ to protect your computer against malware. a. keep your machine up to date with the latest security patches b. reboot your computer on a regular basis c. change your password on a regular basis d. spoof your IP address
5.
6.
7.
A thoroughly tested, cumulative set of hotfixes and other patches is known as a(n): a. recommended update.
c.
service pack.
b. hotfix pack.
d.
critical update.
What technology is used by Windows to prevent unauthorized changes to your system? a. UAC
c.
Windows Defender
b. Protected mode
d.
ProtectGuard
When using UAC, which of the following requires administrative permissions or rights? a. Installing updates from Windows update b. Changing the date and time c. Resetting the network adapter d. Installing drivers from Windows update or attached with the operating system
8.
9.
What mechanism is working when you try to change a computer’s display settings and you get a pop-up asking whether you wish to continue? a. Windows Firewall
c.
Windows Update
b. Protected Mode
d.
UAC
What host-based firewall software comes with current versions of Windows? a. Windows Firewall b. Windows Protected Mode c.
UAC
d. Windows GuardIt 10.
What program would you use to configure IPsec on a computer running Windows Server 2008? a. Windows Firewall with IPsec Plugin b. IPsec Monitor c.
Windows with Advanced Security
d. IPsec Configuration console 11.
If you have sensitive or confidential information stored in your offline files, it is recommended that you: a. clear your cache. b. encrypt the offline files. c.
clear your cookies.
d. execute ipconfig /renewip. 12.
You determine that legitimate emails are being blocked by your spam-blocking device. What should you do? a. Flush out the quarantined items b. Reboot the spam-blocking device c.
Add the address or domain for these emails to the white list
d. Add the address or domain for these emails to the black list 13.
14.
15.
SMTP uses TCP port: a. 43.
c.
80.
b. 25.
d.
443.
How many content zones are there in Internet Explorer? a. 1
c.
4
b. 2
d.
8
Say that you receive an email stating that your account has just expired and asking you to log in to a legitimate-looking website to fix the problem. This is most likely an instance of: a. phishing.
c.
phaking.
b. pharming.
d.
IP address spoofing..
Fill in the Blank 1.
_________________________ is software that is designed to infiltrate or infect a computer, usually with ill intent.
2.
A(n) _________________________ is a self-replicating program that copies itself to other computers while consuming network resources.
3.
Microsoft’s antispyware program is called _________________________.
4.
For antivirus software to be effective, it must be kept _________________________.
5.
An example of a(n) _________________________ is a message saying to delete the win.com file because it is a virus.
6.
If you want to control what updates get pushed to clients within your organization, you would use ______________________________ or ______________________________.
7.
_________________________is when you are asked if you want to continue with an action and your desktop is dimmed and other programs are temporary halted until you approve the change.
8.
_________________________are copies of network files that are stored on your computer so that you can access them when you are not connected to the network.
9.
_________________________ is another name for junk email.
10.
_________________________________ is an email validation system that is designed to verify that an email is coming from the proper email server.