58

Cybersavants IT Jeopardy

Embed Size (px)

Citation preview

Page 1: Cybersavants IT Jeopardy
Page 2: Cybersavants IT Jeopardy

200

300

400

500

100

200

300

400

500

100

200

300

400

500

100

200

300

400

500

100

200

300

400

Final

100

??? ??? ??? ??? ???

Page 3: Cybersavants IT Jeopardy

200

300

400

500

100

200

300

400

500

100

200

300

400

500

100

200

300

400

500

100

200

300

400

500

100

Cover YourAAS IoT Gone

“Phishing” “Ware” InfamousViruses

Page 4: Cybersavants IT Jeopardy

Cloud infrastructure service for accessing, monitoring, and

managing remote datacenter infrastructures

Page 5: Cybersavants IT Jeopardy

What is Infrastructure as a Service

Page 6: Cybersavants IT Jeopardy

Automates the configuration, deployment and ongoing

management of applications in the cloud.

Page 7: Cybersavants IT Jeopardy

What is Platform as a Service

Page 8: Cybersavants IT Jeopardy

Cloud service in which the back-end of a virtual desktop

infrastructure (VDI) is hosted by a cloud service provider.

Page 9: Cybersavants IT Jeopardy

What isDesktop as a Service

Page 10: Cybersavants IT Jeopardy

Software licensing and delivery model in which software is

licensed on a subscription basis and is centrally hosted.

Page 11: Cybersavants IT Jeopardy

What is Software as a Service

Page 12: Cybersavants IT Jeopardy

The replication and hosting of physical or virtual servers by a

third-party to provide failover in the event of a man-made or

natural catastrophe.

Page 13: Cybersavants IT Jeopardy

What is Disaster Recovery as a Service

Page 14: Cybersavants IT Jeopardy

Mesh network specification for low-power wireless local area

networks (WLANs) that cover a large area.

Page 15: Cybersavants IT Jeopardy

What is Zigbee

Page 16: Cybersavants IT Jeopardy

Wireless communications protocol for home automation

Page 17: Cybersavants IT Jeopardy

What is Z-Wave

Page 18: Cybersavants IT Jeopardy

DAILY DOUBLE

DAILY DOUBLE

Page 19: Cybersavants IT Jeopardy

Communication protocols that enable two electronic devices,

one of which is usually a portable device such as a smartphone, to

establish communication by bringing them within 4 cm (2 in)

of each other

Page 20: Cybersavants IT Jeopardy

What is Near Field Communication

Page 21: Cybersavants IT Jeopardy

Managed cloud platform that lets connected devices easily and securely interact with cloud

applications and other devices.

Clue – Lambda, S3, Cloudwatch

Page 22: Cybersavants IT Jeopardy

What is AWS IoT

Page 23: Cybersavants IT Jeopardy

Allows software developers to programmatically make and

receive phone calls and send and receive text messages using its

web service APIs – CEO Jeff Lawson

Page 24: Cybersavants IT Jeopardy

What is Twillio

Page 25: Cybersavants IT Jeopardy

Surveillance software (considered to be either software

or spyware) that has the capability to record every

keystroke you make to a log file, usually encrypted.

Page 26: Cybersavants IT Jeopardy

What is a Keylogger

Page 27: Cybersavants IT Jeopardy

Hackers position themselves between the user and the

legitimate website or system

Page 28: Cybersavants IT Jeopardy

What is a Man-in-the-Middle Phishing

attack

Page 29: Cybersavants IT Jeopardy

Phishing attempts directed at specific individuals or companies

Page 30: Cybersavants IT Jeopardy

What is Spear Phishing

Page 31: Cybersavants IT Jeopardy

Phishing attacks directed specifically at senior executives and other high profile targets

Page 32: Cybersavants IT Jeopardy

What is Whaling

Page 33: Cybersavants IT Jeopardy

Where user’s activities are monitored clearly until they log

into a target account like the bank account and establish their

credentials.

Page 34: Cybersavants IT Jeopardy

What is Session Hijacking

Page 35: Cybersavants IT Jeopardy

Short for malicious software, it is any software used to disrupt computer operations, gather

sensitive information, gain access to private computer systems, or display unwanted advertising

Page 36: Cybersavants IT Jeopardy

What is Malware

Page 37: Cybersavants IT Jeopardy

A type of malware that can be covertly installed on a computer without knowledge or intention

of the user that restricts access to the infected computer system in some way, and demands that the

user pay to restore access

Page 38: Cybersavants IT Jeopardy

What is Ransomware

Page 39: Cybersavants IT Jeopardy

Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from

their hard drive.

Page 40: Cybersavants IT Jeopardy

What is Spyware

Page 41: Cybersavants IT Jeopardy

A form of software that downloads or displays unwanted

ads when a user is online, collects marketing data and other

information without the user's knowledge or redirects search requests to certain advertising

websites.

Page 42: Cybersavants IT Jeopardy

What is Adware

Page 43: Cybersavants IT Jeopardy

Malware designed to trick victims into purchasing and

downloading useless and potentially dangerous software.

Page 44: Cybersavants IT Jeopardy

What is Scareware

Page 45: Cybersavants IT Jeopardy

Computer worm that caused a denial of service on some

Internet hosts and dramatically slowed down general Internet traffic on January 25, 2003. It

spread rapidly, infecting most of its 75,000 victims within ten

minutes.

Page 46: Cybersavants IT Jeopardy

What is SQL Slammer

Page 47: Cybersavants IT Jeopardy

A fast-spreading macro virus that is distributed as an e-mail attachment

that, when opened, disables a number of safeguards in Word 97 or Word

2000, and, if the user has the Microsoft Outlook e-mail program,

causes the virus to be resent to the first 50 people in each of the user's address

books.

Page 48: Cybersavants IT Jeopardy

What is Melissa

Page 49: Cybersavants IT Jeopardy

E-mailed virus with an attachment that, when opened, results in the message being re-

sent to everyone in the recipient's Microsoft Outlook address book

and, the loss of every JPEG, MP3, and certain other files on

the recipient's hard disk.

Page 50: Cybersavants IT Jeopardy

What is the ILOVEYOU

virus

Page 51: Cybersavants IT Jeopardy

First discovered in May 2000, this malicious computer worm targets software that controls industrial

systems.

Page 52: Cybersavants IT Jeopardy

What is Stuxnet

Page 53: Cybersavants IT Jeopardy

A worm that spread through email as what appeared to be a

bounced message.

Page 54: Cybersavants IT Jeopardy

What is MYDOOM

Page 55: Cybersavants IT Jeopardy
Page 56: Cybersavants IT Jeopardy

The most widely accepted approach to IT service

management in the world.

Page 57: Cybersavants IT Jeopardy
Page 58: Cybersavants IT Jeopardy

What is ITIL(Information Technology Infrastructure Library)