1 / 33

Semester 1

Semester 1. Cisco Discovery. Chapter 8. JEOPADY. Q&A by SMBender, Template by K. Martin. Router Modes. Router Modes. Acronyms. Firewalls. WAN Encapsulation. WAN Encapsulation. Network Intrusion. WAN Services. WAN Services. Attacks. Router Basics. Router Basics.

viveka
Download Presentation

Semester 1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Semester 1 Cisco Discovery Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin

  2. Router Modes Router Modes Acronyms Firewalls WAN Encapsulation WAN Encapsulation Network Intrusion WAN Services WAN Services Attacks Router Basics Router Basics Methods of Attack Router Commands Router Commands Potpourri ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄ 100 100 100 100 100 100 100 100 200 200 200 200 200 200 200 200 300 300 300 300 300 300 300 300 400 400 400 400 400 400 400 400 500 500 500 500 500 500 500 500

  3. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Acronyms100 DoS A: What is Denial of Service? IT Ess I v4x Chapter 1

  4. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Acronyms200 DDoS A: What is Distributed Denial of Service? IT Ess I v4x Chapter 1

  5. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Acronyms300 NAT A: What is Network Address Translation? IT Ess I v4x Chapter 1

  6. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Acronyms400 DMZ A: What is Demilitarized Zone? IT Ess I v4x Chapter 1

  7. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Acronyms500 URL A: What is Uniform Resource Locator? IT Ess I v4x Chapter 1

  8. 100 100 100 100 100 100 100 100 100 100 100 100 200 200 200 200 200 200 200 200 200 200 200 200 Question 300 300 300 300 300 300 300 300 300 300 300 300 400 400 400 400 400 400 400 400 400 400 400 400 500 500 500 500 500 500 500 500 500 500 500 500 Firewalls100 A firewall that is built-in to a dedicated hardware device known as a security appliance. A: What is an Appliance Based Firewall? IT Ess I v4x Chapter 1

  9. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Firewalls200 A firewall that consists of a firewall application that runs on a network operating system (NOS) such as UNIX, Windows or Novell. A: What is a Server Based Firewall? IT Ess I v4x Chapter 1

  10. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Firewalls300 A firewall that is implemented by adding firewall functionality to an existing device, such as a router. A: What is an Integrated Firewall? IT Ess I v4x Chapter 1

  11. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Firewalls400 A type firewall that resides on host computers and are not designed for LAN implementations. A: What is a Personal Firewall? IT Ess I v4x Chapter 1

  12. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Firewalls500 Cisco Pix 500 series. A: What is a Application Based Firewall? IT Ess I v4x Chapter 1

  13. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Network Intrusion100 Up to 70% of all attacks come from this attack. A: What is an Internal attack? IT Ess I v4x Chapter 1

  14. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Network Intrusion200 A term that refers to the ability of something or someone to influence the behavior of a group of people. A: What is Social Engineering? IT Ess I v4x Chapter 1

  15. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Network Intrusion300 A form of social engineering where an invented (the pretext) is used on a victim in order to get the victim to release information or perform an action. A: What is Pretexting? IT Ess I v4x Chapter 1

  16. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Network Intrusion400 An unsuspecting user is sent a voice mail instructing them to call a number which appears to be a legitimate telephone-banking service. A: What is Vishing? IT Ess I v4x Chapter 1

  17. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Network Intrusion500 Fraudulent acquisition of sensitive information through the impression of a trustworthy source. A: What is Phishing? IT Ess I v4x Chapter 1

  18. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Attacks100 These types of attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users. A: What is DoS? IT Ess I v4x Chapter 1

  19. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Attacks 200 In this type of attack a flood of packets are sent to a server requesting a client connection. A: What is SYN Flooding? IT Ess I v4x Chapter 1

  20. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Attacks 300 In this type of attack a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device. A: What is a Ping of Death? IT Ess I v4x Chapter 1

  21. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Attacks 400 This type of attack is designed to saturate and overwhelm network links with useless data. A: What is DDoS? IT Ess I v4x Chapter 1

  22. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Attacks 500 In this type of attack a fast computer is used to try to guess passwords or to decipher an encryption code. A: What is Brute Force? IT Ess I v4x Chapter 1

  23. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Methods of Attack100 Any program that gathers personal information from your computer without your permission or knowledge. A: What is Spyware? IT Ess I v4x Chapter 1

  24. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Methods of Attack200 They are used to record information about an Internet user when they visit websites. A: What are Cookies? IT Ess I v4x Chapter 1

  25. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Methods of Attack300 A form of spyware used to collect information about a user based on websites the user visits. A: What is Adware? IT Ess I v4x Chapter 1

  26. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Methods of Attack400 Additional advertising windows that display when visiting a web site. A: What are Pop Ups and Pop Unders? IT Ess I v4x Chapter 1

  27. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Methods of Attack500 Another annoying by-product of our increasing reliance on electronic communications is unwanted bulk email. A: What is Spam? IT Ess I v4x Chapter 1

  28. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Potpourri100 Documentation that details system, physical, and behavioral constraints in an organization. A: What is a Security Policy? IT Ess I v4x Chapter 1

  29. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Potpourri200 3 security tools and applications used in security. A: What is Software patches and updates, virus protection, Spyware protection, Spam blockers, Pop up blockers, and Firewalls? IT Ess I v4x Chapter 1

  30. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Potpourri300 A small piece of code that fixes a specific problem. A: What is a Patch? IT Ess I v4x Chapter 1

  31. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Potpourri400 Prevents or allows access based on IP or MAC addresses. A: What is Packet Filtering? IT Ess I v4x Chapter 1

  32. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Potpourri500 Prevents or allows access based on the application. A: What is Application/Web site filtering? IT Ess I v4x Chapter 1

  33. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Final Jeopardy Translates an internal address or group of addresses into an outside, public address that is sent across the network. A: What is NAT? CCNA1 v3 Module 1

More Related