semester 1
DESCRIPTION
Semester 1. Cisco Discovery. Chapter 8. JEOPADY. Q&A by SMBender, Template by K. Martin. Router Modes. Router Modes. Acronyms. Firewalls. WAN Encapsulation. WAN Encapsulation. Network Intrusion. WAN Services. WAN Services. Attacks. Router Basics. Router Basics. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/1.jpg)
IT Ess I v.4x Chapter 1
Cisco Discovery
Semester 1
Chapter 8
JEOPADY
Q&A by SMBender, Template by K. Martin
![Page 2: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/2.jpg)
IT Ess I v.4x Chapter 1
RouterRouterModesModes
WANWANEncapsulationEncapsulation
WANWANServicesServices
RouterRouterBasicsBasics
RouterRouterCommands Commands
100
200
300
400
500
RouterRouterModesModes
WANWANEncapsulationEncapsulation
WANWANServicesServices
RouterRouterBasicsBasics
RouterRouterCommands Commands
100 100 100 100 100
200 200 200 200 200
300 300 300 300 300
400 400 400 400 400
500 500 500 500 500
AcronymsAcronyms FirewallsFirewalls NetworkNetworkIntrusionIntrusion AttacksAttacks Methods of Methods of
AttackAttack PotpourriPotpourri
100
200
300
400
500
100
200
300
400
500
► ► ► F i n a l J e o p a r d y ◄ ◄ ◄
![Page 3: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/3.jpg)
IT Ess I v.4x Chapter 1
Question
DoS
Acronyms100
A: What is Denial of Service?
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
![Page 4: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/4.jpg)
IT Ess I v.4x Chapter 1
QuestionA: What is Distributed Denial of Service?
DDoS
IT Ess I v4x Chapter 1
Acronyms200
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
![Page 5: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/5.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Network Address Translation?
NAT
IT Ess I v4x Chapter 1
Acronyms300
![Page 6: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/6.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
A: What is Demilitarized Zone?
DMZ
IT Ess I v4x Chapter 1
Acronyms400
![Page 7: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/7.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Uniform Resource Locator?
URL
Acronyms500
![Page 8: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/8.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is an Appliance Based Firewall?
A firewall that is built-in to a dedicated hardware device known as a security appliance.
Firewalls 100
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500
![Page 9: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/9.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is a Server Based Firewall?
A firewall that consists of a firewall application that runs on a network operating system (NOS) such as UNIX, Windows or Novell.
Firewalls 200
![Page 10: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/10.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is an Integrated Firewall?
A firewall that is implemented by adding firewall functionality to an existing device, such as a router.
Firewalls 300
![Page 11: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/11.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is a Personal Firewall?
A type firewall that resides on host computers and are not designed for LAN implementations.
Firewalls 400
![Page 12: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/12.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is a Application Based Firewall?
Cisco Pix 500 series.
Firewalls 500
![Page 13: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/13.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is an Internal attack?
Up to 70% of all attacks come from this attack.
Network Intrusion 100
![Page 14: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/14.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Social Engineering?
A term that refers to the ability of something or someone to influence the behavior of a group of people.
Network Intrusion 200
![Page 15: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/15.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Pretexting?
A form of social engineering where an invented (the pretext) is used on a victim in order to get the victim to release information or perform an action.
Network Intrusion 300
![Page 16: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/16.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Vishing?
An unsuspecting user is sent a voice mail instructing them to call a number which appears to be a legitimate telephone-banking service.
Network Intrusion 400
![Page 17: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/17.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Phishing?
Fraudulent acquisition of sensitive information through the impression of a trustworthy source.
Network Intrusion 500
![Page 18: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/18.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is DoS?
These types of attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users.
Attacks100
![Page 19: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/19.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is SYN Flooding?
In this type of attack a flood of packets are sent to a server requesting a client connection.
Attacks 200
![Page 20: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/20.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is a Ping of Death?
In this type of attack a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device.
Attacks 300
![Page 21: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/21.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is DDoS?
This type of attack is designed to saturate and overwhelm network links with useless data.
Attacks 400
![Page 22: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/22.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Brute Force?
In this type of attack a fast computer is used to try to guess passwords or to decipher an encryption code.
Attacks 500
![Page 23: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/23.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Spyware?
Any program that gathers personal information from your computer without your permission or knowledge.
Methods of Attack 100
![Page 24: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/24.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What are Cookies?
They are used to record information about an Internet user when they visit websites.
Methods of Attack 200
![Page 25: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/25.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Adware?
A form of spyware used to collect information about a user based on websites the user visits.
Methods of Attack300
![Page 26: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/26.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What are Pop Ups and Pop Unders?
Additional advertising windows that display when visiting a web site.
Methods of Attack 400
![Page 27: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/27.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Spam?
Another annoying by-product of our increasing reliance on electronic communications is unwanted bulk email.
Methods of Attack 500
![Page 28: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/28.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is a Security Policy?
Documentation that details system, physical, and behavioral constraints in an organization.
Potpourri 100
![Page 29: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/29.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Software patches and updates, virus protection, Spyware protection, Spam blockers, Pop up blockers, and Firewalls?
3 security tools and applications used in security.
Potpourri 200
![Page 30: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/30.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is a Patch?
A small piece of code that fixes a specific problem.
Potpourri 300
![Page 31: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/31.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Packet Filtering?
Prevents or allows access based on IP or MAC addresses.
Potpourri 400
![Page 32: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/32.jpg)
IT Ess I v.4x Chapter 1
Question
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500IT Ess I v4x Chapter 1
A: What is Application/Web site filtering?
Prevents or allows access based on the application.
Potpourri 500
![Page 33: Semester 1](https://reader031.vdocument.in/reader031/viewer/2022013012/56815d36550346895dcb3654/html5/thumbnails/33.jpg)
IT Ess I v.4x Chapter 1
QuestionA: What is NAT?
Translates an internal address or group of addresses into an outside, public address that is sent across the network.
Final Jeopardy
CCNA1 v3 Module 1
100 100 100 100 100 100
200 200 200 200 200 200
300 300 300 300 300 300
400 400 400 400 400 400
500 500 500 500 500 500