discovery 2 internetworking module 8 jeopardy k. martin
TRANSCRIPT
Discovery 2Discovery 2
Internetworking
Module 8
JEOPARDY
K. Martin
RouterRouterModesModes
WANWANEncapsulationEncapsulation
WANWANServicesServices
RouterRouterBasicsBasics
RouterRouterCommands Commands
100
200
300
400
500
RouterRouterModesModes
WANWANEncapsulationEncapsulation
WANWANServicesServices
RouterRouterBasicsBasics
RouterRouterCommands Commands
100 100 100 100 100
200 200 200 200 200
300 300 300 300 300
400 400 400 400 400
500 500 500 500 500
AcronymsAcronyms BackupsBackupsMonitoringMonitoring
&&ManagingManaging
WirelessWirelessSecuritySecurity
SecuritySecurity Grab BagGrab Bag
100
200
300
400
500
100
200
300
400
500
► ► ► F i n a l J e o p a r d y ◄ ◄ ◄
TLS
Question
Acronyms
100
A: What is Transport Layer Security?
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
QuestionA: What is a Demilitarized Zone?
DMZ
Acronyms200
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Intrusion Detection System?
IDS
Acronyms300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Intrusion Prevention System?
IPS
Acronyms
400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Digital Linear Tape?
DLT
Acronyms500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is tape?
This type of backup media is the most common available because of large capacities and being cost-effective.
Backups100
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is solid state storage?
This type of storage media is nonvolatile that does not have any moving parts.
Backups200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is an incremental backup?
This is the quickest backup method. If run daily, it would only contain files created or changed on that day.
Backups300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a differential backup?
This backup method will only copy the files that have been changed since the last full backup.
Backups400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is performing drive maintenance?
This backup measure would include an occasional defragmentation to improve the overall performance of the system
Backups500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is In Band Management?
This type of management uses protocols such as Telnet, SSH, HTTP, and Simple Network Management Protocol (SNMP)
MANAGING & MONITORING100
This protocol offers secure remote login and other network services..
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is SSH (Secure Shell)?
MANAGING & MONITORING200
This keystroke sequence toggles between Telnet sessions.
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Ctrl-Shift-6 X?
MANAGING & MONITORING 300
When using SNMP, management stations and managed devices are identified by this . . . a
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Community String or community ID?
MANAGING & MONITORING 400
When using SNMP, this allows servers to receive syslog messages from syslog senders. .
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a syslog daemon?
MANAGING & MONITORING 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is PSK (Pre-Shared Key)?
This type of wireless authentication requires a matching, preconfigured key on both the server and the client.
Wireless Security100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is WPA (Wifi-Protected Access)?
This type of wireless encryption protocol uses an improved encryption algorithm called Temporal Key Integrity Protocol (TKIP).
Wireless Security200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is WEP (Wired Equivalent Privacy)?
A major weakness of this encryption protocol is its use of static encryption keys so it should only be used with older equipment that does not support newer protocols.
Wireless Security300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Open Authentication?
This type of authentication is frequently used in Wi-Fi Hotspots?
Wireless Security400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is MAC Address Filtering?
Hackers can bypass this wireless security measure by cloning.
Wireless Security500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a host-based firewall?
This software runs directly on a host operating system which allows filtering based on a computer address and port, therefore offering additional protection over regular port filtering.
SECURITY100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Access Control Lists (ACLs)?
Administrators create this security measure on network devices, such as routers, to control whether or not traffic is forwarded or blocked based on IP address or port numbers.
SECURITY 200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is the DMZ (Demilitarized Zone)?
SECURITY300
This area of a network stores servers that users from the Internet are allowed to access, while protecting the internal network from outside users.
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is an IPS (Intrusion Protection System)?
This is a proactive device that examines almost the entire data packet from Layer 2 to Layer 7 for malicious traffic.
SECURITY 400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Cisco IOS Firewall software?
This software allows the user to turn a router into a network layer firewall with dynamic or stateful inspection.
SECURITY500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Anti-X Software?
This software protects computer systems from viruses, worms, spyware, malware, phishing, and even spam.
GRAB BAG100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is an SLA (Service Level Agreement)?
This a contract between an ISP and a user that documents the expectations and obligations of both parties.
GRAB BAG200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is show flash?
This command will verify the bytes available in flash and confirm that there is enough room for the IOS file before starting the upgrade or restore.
GRAB BAG 300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is copy flash tftp?
This command will back up Cisco IOS software to a TFTP server.
GRAB BAG
400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is IPSec (IP Security)?
This Network Layer security protocol that can be used to secure any Application Layer protocol used for communication
GRAB BAG 500
Question
A: What is a Dynamic Packet Filter Firewall or Stateful Firewall?
This security measure will keep track of the actual communication process occurring between the source and destination devices by using a state table.
Final Jeopardy
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500