semester 1

33
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Mar

Upload: viveka

Post on 11-Feb-2016

25 views

Category:

Documents


0 download

DESCRIPTION

Semester 1. Cisco Discovery. Chapter 8. JEOPADY. Q&A by SMBender, Template by K. Martin. Router Modes. Router Modes. Acronyms. Firewalls. WAN Encapsulation. WAN Encapsulation. Network Intrusion. WAN Services. WAN Services. Attacks. Router Basics. Router Basics. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Semester 1

IT Ess I v.4x Chapter 1

Cisco Discovery

Semester 1

Chapter 8

JEOPADY

Q&A by SMBender, Template by K. Martin

Page 2: Semester 1

IT Ess I v.4x Chapter 1

RouterRouterModesModes

WANWANEncapsulationEncapsulation

WANWANServicesServices

RouterRouterBasicsBasics

RouterRouterCommands Commands

100

200

300

400

500

RouterRouterModesModes

WANWANEncapsulationEncapsulation

WANWANServicesServices

RouterRouterBasicsBasics

RouterRouterCommands Commands

100 100 100 100 100

200 200 200 200 200

300 300 300 300 300

400 400 400 400 400

500 500 500 500 500

AcronymsAcronyms FirewallsFirewalls NetworkNetworkIntrusionIntrusion AttacksAttacks Methods of Methods of

AttackAttack PotpourriPotpourri

100

200

300

400

500

100

200

300

400

500

► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

Page 3: Semester 1

IT Ess I v.4x Chapter 1

Question

DoS

Acronyms100

A: What is Denial of Service?

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

Page 4: Semester 1

IT Ess I v.4x Chapter 1

QuestionA: What is Distributed Denial of Service?

DDoS

IT Ess I v4x Chapter 1

Acronyms200

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

Page 5: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Network Address Translation?

NAT

IT Ess I v4x Chapter 1

Acronyms300

Page 6: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

A: What is Demilitarized Zone?

DMZ

IT Ess I v4x Chapter 1

Acronyms400

Page 7: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Uniform Resource Locator?

URL

Acronyms500

Page 8: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is an Appliance Based Firewall?

A firewall that is built-in to a dedicated hardware device known as a security appliance.

Firewalls 100

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

Page 9: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is a Server Based Firewall?

A firewall that consists of a firewall application that runs on a network operating system (NOS) such as UNIX, Windows or Novell.

Firewalls 200

Page 10: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is an Integrated Firewall?

A firewall that is implemented by adding firewall functionality to an existing device, such as a router.

Firewalls 300

Page 11: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is a Personal Firewall?

A type firewall that resides on host computers and are not designed for LAN implementations.

Firewalls 400

Page 12: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is a Application Based Firewall?

Cisco Pix 500 series.

Firewalls 500

Page 13: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is an Internal attack?

Up to 70% of all attacks come from this attack.

Network Intrusion 100

Page 14: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Social Engineering?

A term that refers to the ability of something or someone to influence the behavior of a group of people.

Network Intrusion 200

Page 15: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Pretexting?

A form of social engineering where an invented (the pretext) is used on a victim in order to get the victim to release information or perform an action.

Network Intrusion 300

Page 16: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Vishing?

An unsuspecting user is sent a voice mail instructing them to call a number which appears to be a legitimate telephone-banking service.

Network Intrusion 400

Page 17: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Phishing?

Fraudulent acquisition of sensitive information through the impression of a trustworthy source.

Network Intrusion 500

Page 18: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is DoS?

These types of attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users.

Attacks100

Page 19: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is SYN Flooding?

In this type of attack a flood of packets are sent to a server requesting a client connection.

Attacks 200

Page 20: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is a Ping of Death?

In this type of attack a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device.

Attacks 300

Page 21: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is DDoS?

This type of attack is designed to saturate and overwhelm network links with useless data.

Attacks 400

Page 22: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Brute Force?

In this type of attack a fast computer is used to try to guess passwords or to decipher an encryption code.

Attacks 500

Page 23: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Spyware?

Any program that gathers personal information from your computer without your permission or knowledge.

Methods of Attack 100

Page 24: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What are Cookies?

They are used to record information about an Internet user when they visit websites.

Methods of Attack 200

Page 25: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Adware?

A form of spyware used to collect information about a user based on websites the user visits.

Methods of Attack300

Page 26: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What are Pop Ups and Pop Unders?

Additional advertising windows that display when visiting a web site.

Methods of Attack 400

Page 27: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Spam?

Another annoying by-product of our increasing reliance on electronic communications is unwanted bulk email.

Methods of Attack 500

Page 28: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is a Security Policy?

Documentation that details system, physical, and behavioral constraints in an organization.

Potpourri 100

Page 29: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Software patches and updates, virus protection, Spyware protection, Spam blockers, Pop up blockers, and Firewalls?

3 security tools and applications used in security.

Potpourri 200

Page 30: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is a Patch?

A small piece of code that fixes a specific problem.

Potpourri 300

Page 31: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Packet Filtering?

Prevents or allows access based on IP or MAC addresses.

Potpourri 400

Page 32: Semester 1

IT Ess I v.4x Chapter 1

Question

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500IT Ess I v4x Chapter 1

A: What is Application/Web site filtering?

Prevents or allows access based on the application.

Potpourri 500

Page 33: Semester 1

IT Ess I v.4x Chapter 1

QuestionA: What is NAT?

Translates an internal address or group of addresses into an outside, public address that is sent across the network.

Final Jeopardy

CCNA1 v3 Module 1

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500