discovery 2 internetworking module 8 jeopardy k. martin

33
Discovery Discovery 2 2 Internetworking Module 8 JEOPARDY K. Martin

Upload: bonnie-burke

Post on 13-Dec-2015

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Discovery 2Discovery 2

Internetworking

Module 8

JEOPARDY

K. Martin

Page 2: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

RouterRouterModesModes

WANWANEncapsulationEncapsulation

WANWANServicesServices

RouterRouterBasicsBasics

RouterRouterCommands Commands

100

200

300

400

500

RouterRouterModesModes

WANWANEncapsulationEncapsulation

WANWANServicesServices

RouterRouterBasicsBasics

RouterRouterCommands Commands

100 100 100 100 100

200 200 200 200 200

300 300 300 300 300

400 400 400 400 400

500 500 500 500 500

AcronymsAcronyms BackupsBackupsMonitoringMonitoring

&&ManagingManaging

WirelessWirelessSecuritySecurity

SecuritySecurity Grab BagGrab Bag

100

200

300

400

500

100

200

300

400

500

► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

Page 3: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

TLS

Question

Acronyms

100

A: What is Transport Layer Security?

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

Page 4: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

QuestionA: What is a Demilitarized Zone?

DMZ

Acronyms200

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

Page 5: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Intrusion Detection System?

IDS

Acronyms300

Page 6: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Intrusion Prevention System?

IPS

Acronyms

400

Page 7: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Digital Linear Tape?

DLT

Acronyms500

Page 8: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is tape?

This type of backup media is the most common available because of large capacities and being cost-effective.

Backups100

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

Page 9: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is solid state storage?

This type of storage media is nonvolatile that does not have any moving parts.

Backups200

Page 10: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is an incremental backup?

This is the quickest backup method. If run daily, it would only contain files created or changed on that day.

Backups300

Page 11: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a differential backup?

This backup method will only copy the files that have been changed since the last full backup.

Backups400

Page 12: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is performing drive maintenance?

This backup measure would include an occasional defragmentation to improve the overall performance of the system

Backups500

Page 13: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is In Band Management?

This type of management uses protocols such as Telnet, SSH, HTTP, and Simple Network Management Protocol (SNMP)

MANAGING & MONITORING100

Page 14: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

This protocol offers secure remote login and other network services..

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is SSH (Secure Shell)?

MANAGING & MONITORING200

Page 15: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

This keystroke sequence toggles between Telnet sessions.

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Ctrl-Shift-6 X?

MANAGING & MONITORING 300

Page 16: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

When using SNMP, management stations and managed devices are identified by this . . . a

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a Community String or community ID?

MANAGING & MONITORING 400

Page 17: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

When using SNMP, this allows servers to receive syslog messages from syslog senders. .

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a syslog daemon?

MANAGING & MONITORING 500

Page 18: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is PSK (Pre-Shared Key)?

This type of wireless authentication requires a matching, preconfigured key on both the server and the client.

Wireless Security100

Page 19: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is WPA (Wifi-Protected Access)?

This type of wireless encryption protocol uses an improved encryption algorithm called Temporal Key Integrity Protocol (TKIP).

Wireless Security200

Page 20: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is WEP (Wired Equivalent Privacy)?

A major weakness of this encryption protocol is its use of static encryption keys so it should only be used with older equipment that does not support newer protocols.

Wireless Security300

Page 21: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Open Authentication?

This type of authentication is frequently used in Wi-Fi Hotspots?

Wireless Security400

Page 22: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is MAC Address Filtering?

Hackers can bypass this wireless security measure by cloning.

Wireless Security500

Page 23: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is a host-based firewall?

This software runs directly on a host operating system which allows filtering based on a computer address and port, therefore offering additional protection over regular port filtering.

SECURITY100

Page 24: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Access Control Lists (ACLs)?

Administrators create this security measure on network devices, such as routers, to control whether or not traffic is forwarded or blocked based on IP address or port numbers.

SECURITY 200

Page 25: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is the DMZ (Demilitarized Zone)?

SECURITY300

This area of a network stores servers that users from the Internet are allowed to access, while protecting the internal network from outside users.

Page 26: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is an IPS (Intrusion Protection System)?

This is a proactive device that examines almost the entire data packet from Layer 2 to Layer 7 for malicious traffic.

SECURITY 400

Page 27: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Cisco IOS Firewall software?

This software allows the user to turn a router into a network layer firewall with dynamic or stateful inspection.

SECURITY500

Page 28: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Anti-X Software?

This software protects computer systems from viruses, worms, spyware, malware, phishing, and even spam.

GRAB BAG100

Page 29: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is an SLA (Service Level Agreement)?

This a contract between an ISP and a user that documents the expectations and obligations of both parties.

GRAB BAG200

Page 30: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is show flash?

This command will verify the bytes available in flash and confirm that there is enough room for the IOS file before starting the upgrade or restore.

GRAB BAG 300

Page 31: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is copy flash tftp?

This command will back up Cisco IOS software to a TFTP server.

GRAB BAG

400

Page 32: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is IPSec (IP Security)?

This Network Layer security protocol that can be used to secure any Application Layer protocol used for communication

GRAB BAG 500

Page 33: Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

Question

A: What is a Dynamic Packet Filter Firewall or Stateful Firewall?

This security measure will keep track of the actual communication process occurring between the source and destination devices by using a state table.

Final Jeopardy

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500