Presentation is loading. Please wait.

Presentation is loading. Please wait.

Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.

Similar presentations


Presentation on theme: "Discovery 2 Internetworking Module 8 JEOPARDY K. Martin."— Presentation transcript:

1

2 Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

3 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500 Acronyms Backups Monitoring & Managing Wireless Security Grab Bag Grab Bag 100 200 300 400 500 100 200 300 400 500 ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

4 TLS Question Acronyms 100 A: What is Transport Layer Security? 100 200 300 400 500

5 Question A: What is a Demilitarized Zone? DMZ Acronyms 200 100 200 300 400 500

6 Question 100 200 300 400 500 A: What is Intrusion Detection System? IDS Acronyms 300

7 Question 100 200 300 400 500 A: What is Intrusion Prevention System? IPS Acronyms 400

8 Question 100 200 300 400 500 A: What is Digital Linear Tape? DLT Acronyms 500

9 Question 100 200 300 400 500 A: What is tape? This type of backup media is the most common available because of large capacities and being cost-effective. Backups 100 200 300 400 500

10 Question 100 200 300 400 500 A: What is solid state storage? This type of storage media is nonvolatile that does not have any moving parts. Backups 200

11 Question 100 200 300 400 500 A: What is an incremental backup? This is the quickest backup method. If run daily, it would only contain files created or changed on that day. Backups 300

12 Question 100 200 300 400 500 A: What is a differential backup? This backup method will only copy the files that have been changed since the last full backup. Backups 400

13 Question 100 200 300 400 500 A: What is performing drive maintenance? This backup measure would include an occasional defragmentation to improve the overall performance of the system Backups 500

14 Question 100 200 300 400 500 A: What is In Band Management? This type of management uses protocols such as Telnet, SSH, HTTP, and Simple Network Management Protocol (SNMP) MANAGING & MONITORING 100

15 This protocol offers secure remote login and other network services.. Question 100 200 300 400 500 A: What is SSH (Secure Shell)? MANAGING & MONITORING 200

16 This keystroke sequence toggles between Telnet sessions. Question 100 200 300 400 500 A: What is Ctrl-Shift-6 X? MANAGING & MONITORING 300

17 When using SNMP, management stations and managed devices are identified by this... a Question 100 200 300 400 500 A: What is a Community String or community ID? MANAGING & MONITORING 400

18 When using SNMP, this allows servers to receive syslog messages from syslog senders.. Question 100 200 300 400 500 A: What is a syslog daemon? MANAGING & MONITORING 500

19 Question 100 200 300 400 500 A: What is PSK (Pre-Shared Key)? This type of wireless authentication requires a matching, preconfigured key on both the server and the client. Wireless Security 100

20 Question 100 200 300 400 500 A: What is WPA (Wifi-Protected Access)? This type of wireless encryption protocol uses an improved encryption algorithm called Temporal Key Integrity Protocol (TKIP). Wireless Security 200

21 Question 100 200 300 400 500 A: What is WEP (Wired Equivalent Privacy)? A major weakness of this encryption protocol is its use of static encryption keys so it should only be used with older equipment that does not support newer protocols. Wireless Security 300

22 Question 100 200 300 400 500 A: What is Open Authentication? This type of authentication is frequently used in Wi-Fi Hotspots? Wireless Security 400

23 Question 100 200 300 400 500 A: What is MAC Address Filtering? Hackers can bypass this wireless security measure by cloning. Wireless Security 500

24 Question 100 200 300 400 500 A: What is a host-based firewall? This software runs directly on a host operating system which allows filtering based on a computer address and port, therefore offering additional protection over regular port filtering. SECURITY 100

25 Question 100 200 300 400 500 A: What is Access Control Lists (ACLs)? Administrators create this security measure on network devices, such as routers, to control whether or not traffic is forwarded or blocked based on IP address or port numbers. SECURITY 200

26 Question 100 200 300 400 500 A: What is the DMZ (Demilitarized Zone)? SECURITY 300 This area of a network stores servers that users from the Internet are allowed to access, while protecting the internal network from outside users.

27 Question 100 200 300 400 500 A: What is an IPS (Intrusion Protection System)? This is a proactive device that examines almost the entire data packet from Layer 2 to Layer 7 for malicious traffic. SECURITY 400

28 Question 100 200 300 400 500 A: What is Cisco IOS Firewall software? This software allows the user to turn a router into a network layer firewall with dynamic or stateful inspection. SECURITY 500

29 Question 100 200 300 400 500 A: What is Anti-X Software? This software protects computer systems from viruses, worms, spyware, malware, phishing, and even spam. GRAB BAG 100

30 Question 100 200 300 400 500 A: What is an SLA (Service Level Agreement)? This a contract between an ISP and a user that documents the expectations and obligations of both parties. GRAB BAG 200

31 Question 100 200 300 400 500 A: What is show flash? This command will verify the bytes available in flash and confirm that there is enough room for the IOS file before starting the upgrade or restore. GRAB BAG 300

32 Question 100 200 300 400 500 A: What is copy flash tftp? This command will back up Cisco IOS software to a TFTP server. GRAB BAG 400

33 Question 100 200 300 400 500 A: What is IPSec (IP Security)? This Network Layer security protocol that can be used to secure any Application Layer protocol used for communication GRAB BAG 500

34 Question A: What is a Dynamic Packet Filter Firewall or Stateful Firewall? This security measure will keep track of the actual communication process occurring between the source and destination devices by using a state table. Final Jeopardy 100 200 300 400 500


Download ppt "Discovery 2 Internetworking Module 8 JEOPARDY K. Martin."

Similar presentations


Ads by Google