1 / 33

Internetworking

JEOPARDY. Internetworking. Discovery 2. Module 8. K. Martin. Router Modes. Router Modes. Acronyms. Backups. WAN Encapsulation. WAN Encapsulation. Monitoring & Managing. WAN Services. WAN Services. Wireless Security. Router Basics. Router Basics. Security. Router

valora
Télécharger la présentation

Internetworking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. JEOPARDY Internetworking Discovery 2 Module 8 K. Martin

  2. Router Modes Router Modes Acronyms Backups WAN Encapsulation WAN Encapsulation Monitoring & Managing WAN Services WAN Services Wireless Security Router Basics Router Basics Security Router Commands Router Commands Grab Bag ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄ 100 100 100 100 100 100 100 100 200 200 200 200 200 200 200 200 300 300 300 300 300 300 300 300 400 400 400 400 400 400 400 400 500 500 500 500 500 500 500 500

  3. TLS 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Acronyms 100 A: What is Transport Layer Security?

  4. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Acronyms200 DMZ A: What is a Demilitarized Zone?

  5. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Acronyms300 IDS A: What is Intrusion Detection System?

  6. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Acronyms 400 IPS A: What is Intrusion Prevention System?

  7. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Acronyms500 DLT A: What is Digital Linear Tape?

  8. 100 100 100 100 100 100 100 100 100 100 100 100 200 200 200 200 200 200 200 200 200 200 200 200 Question 300 300 300 300 300 300 300 300 300 300 300 300 400 400 400 400 400 400 400 400 400 400 400 400 500 500 500 500 500 500 500 500 500 500 500 500 Backups100 This type of backup media is the most common available because of large capacities and being cost-effective. A: What is tape?

  9. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Backups200 This type of storage media is nonvolatile that does not have any moving parts. A: What is solid state storage?

  10. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Backups300 This is the quickest backup method. If run daily, it would only contain files created or changed on that day. A: What is an incremental backup?

  11. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Backups400 This backup method will only copy the files that have been changed since the last full backup. A: What is a differential backup?

  12. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Backups500 This backup measure would include an occasional defragmentation to improve the overall performance of the system A: What is performing drive maintenance?

  13. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 MANAGING & MONITORING100 This type of management uses protocols such as Telnet, SSH, HTTP, and Simple Network Management Protocol (SNMP) A: What is In Band Management?

  14. This protocol offers secure remote login and other network services.. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 MANAGING & MONITORING200 A: What is SSH (Secure Shell)?

  15. This keystroke sequence toggles • between Telnet sessions. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 MANAGING & MONITORING 300 A: What is Ctrl-Shift-6 X?

  16. When using SNMP, management stations and managed devices are identified by this . . . a 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 MANAGING & MONITORING 400 A: What is a Community String or community ID?

  17. When using SNMP, this allows servers to receive syslog messages from syslog senders. . 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 MANAGING & MONITORING 500 A: What is a syslog daemon?

  18. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Wireless Security100 This type of wireless authentication requires a matching, preconfigured key on both the server and the client. A: What is PSK (Pre-Shared Key)?

  19. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Wireless Security200 This type of wireless encryption protocol uses an improved encryption algorithm called Temporal Key Integrity Protocol (TKIP). A: What is WPA (Wifi-Protected Access)?

  20. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Wireless Security300 A major weakness of this encryption protocol is its use of static encryption keys so it should only be used with older equipment that does not support newer protocols. A: What is WEP (Wired Equivalent Privacy)?

  21. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Wireless Security400 This type of authentication is frequently used in Wi-Fi Hotspots? A: What is Open Authentication?

  22. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Wireless Security500 Hackers can bypass this wireless security measure by cloning. A: What is MAC Address Filtering?

  23. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 SECURITY100 This software runs directly on a host operating system which allows filtering based on a computer address and port, therefore offering additional protection over regular port filtering. A: What is a host-based firewall?

  24. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 SECURITY 200 Administrators create this security measure on network devices, such as routers, to control whether or not traffic is forwarded or blocked based on IP address or port numbers. A: What is Access Control Lists (ACLs)?

  25. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 SECURITY300 This area of a network stores servers that users from the Internet are allowed to access, while protecting the internal network from outside users. A: What is the DMZ (Demilitarized Zone)?

  26. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 SECURITY 400 This is a proactive device that examines almost the entire data packet from Layer 2 to Layer 7 for malicious traffic. A: What is an IPS (Intrusion Protection System)?

  27. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 SECURITY500 This software allows the user to turn a router into a network layer firewall with dynamic or stateful inspection. A: What is Cisco IOS Firewall software?

  28. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 GRAB BAG100 This software protects computer systems from viruses, worms, spyware, malware, phishing, and even spam. A: What is Anti-X Software?

  29. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 GRAB BAG200 This a contract between an ISP and a user that documents the expectations and obligations of both parties. A: What is an SLA (Service Level Agreement)?

  30. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 GRAB BAG300 This command will verify the bytes available in flash and confirm that there is enough room for the IOS file before starting the upgrade or restore. A: What is show flash?

  31. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 GRAB BAG400 This command will back up Cisco IOS software to a TFTP server. A: What is copy flash tftp?

  32. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 GRAB BAG 500 This Network Layer security protocol that can be used to secure any Application Layer protocol used for communication A: What is IPSec (IP Security)?

  33. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Final Jeopardy This security measure will keep track of the actual communication process occurring between the source and destination devices by using a state table. A: What is a Dynamic Packet Filter Firewall or Stateful Firewall?

More Related