it essentials 1 chapter 9 jeopady routermodeswanencapsulationwanservicesrouterbasicsroutercommands...
TRANSCRIPT
RouterRouterModesModes
WANWANEncapsulationEncapsulation
WANWANServicesServices
RouterRouterBasicsBasics
RouterRouterCommands Commands
100
200
300
400
500
RouterRouterModesModes
WANWANEncapsulationEncapsulation
WANWANServicesServices
RouterRouterBasicsBasics
RouterRouterCommands Commands
100 100 100 100 100
200 200 200 200 200
300 300 300 300 300
400 400 400 400 400
500 500 500 500 500
VirusesVirusesSecuritySecurityThreatsThreats
TCP/IPTCP/IPAttacksAttacks
SecuritySecurityProceduresProcedures
PreventativePreventativeMaintenanceMaintenance
Trouble-Trouble-shootingshooting
100
200
300
400
500
100
200
300
400
500
► ► ► F i n a l J e o p a r d y ◄ ◄ ◄
Question
A program written with malicious intent.
Viruses100
A: What is a virus?
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
QuestionA: What is a worm?
A self-replicating program that is harmful to networks
Viruses200
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Trojan?
Often disguised as useful software.
Viruses300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Consume Bandwidth?
Worms are harmful in a network because they_____________.
Viruses400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Stealth Virus.
Type of virus that lays dormant until summoned by the attacker
Viruses500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Adware?
Displays advertising on the user’s computer.
Security Threats100
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Spyware?
Monitors activity on the computer.
Security Threats200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Phishing?
Attacker pretends to represent a legitimate outside organization.
Security Threats300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Social Engineer?
A person that is able to gain access to private information through tricks.
Security Threats400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is ActiveX, Java, or JavaScript
Two of the three web tools that attackers use to install a program on a computer
Security Threats500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is zombies?
These infected computers make tracing the origin of the DoS attack difficult to locate.
TCP/IP Attacks100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is usernames and passwords?
Information extracted from a replay attack.
TCP/IP Attacks200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is spoofing?
A form of attack to gain access to resources on devices by pretending to be a trusted computer
TCP/IP Attacks300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is SYN flood?
A specific type of DoS attack via random TCP/IP ports
TCP/IP Attacks400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is DNS Poisoning?
A technique to redirect to false servers containing malicious content
TCP/IP Attacks500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is NTFS?
A file system with increased security and compatibility.
Security Procedures100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Security Policy?
A list of definitions to describe how a company addresses security issues.
Security Procedures200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is BIOS and Login?
Two levels of password protection.
Security Procedures300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Cable Locks, RFID tags, Berg Connectors, Biometric Sensors, Security Guards and Security Cages?
List two methods of physical security.
Security Procedures400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a WPA2?
An encryption format covering the entire 802.11i standard.
Security Procedures500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a signature?
Patterns in the programming code of the software in a computer – used by antivirus programs to identify threats.
Preventative Maintenance100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a patch?
Code update provided by manufacturers of operating systems and software applications .
Preventative Maintenance200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is a Service Pack?
A comprehensive update application which combines patches and upgrades.
Preventative Maintenance300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is 3 AM?
Default time for Windows Update to install updates and patches.
Preventative Maintenance400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Create a Restore Point?
The first step when installing service packs and security patches.
Preventative Maintenance500
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is slow computer operation OR slow Internet connection?
A common sign that a computer may have a virus
Troubleshooting100
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is That the problem has been solved?
In Closing with the customer, you should have them verify _____________.
Troubleshooting200
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Other Techs, Internet Search, News Groups,
Manufacturer FAQs , Manuals, Online Forums, Technical Websites
Two resources that could be used to Evaluate the Problem.
Troubleshooting300
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is 128-bit WEP, WAP, or EAP-Cisco ?
One type of security that is better than 64-bit WEP.
Troubleshooting400
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Scan the Computer, Reboot, Login as different user, Check for OS updates/patches, update anti-virus signatures, change password?
Two Quick Solutions for virus problems
Troubleshooting500