Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

CCNA1 v3 Module 9 v3 CCNA 1 Module 9 JEOPARDY K. Martin Galo Valencia.
Security in Wireless Networks Juan Camilo Quintero D
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Security Awareness Chapter 5 Wireless Network Security.
Firewalls and Intrusion Detection Systems
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Chp. 8: ISP Responsibility
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
A Guide to major network components
COEN 252: Computer Forensics Router Investigation.
CCENT Review. Put the following descriptions in order from Layer 7 to Layer 1 and give the name of each layer.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Securing a Wireless Network
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 6 Configuring a Router/ Learning About Other Devices/ Managing Cisco IOS Software.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
COEN 252 Computer Forensics
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Common Devices Used In Computer Networks
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
COEN 252 Computer Forensics Collecting Network-based Evidence.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Version 3.0 Module 11 TCP Application and Transport.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Discovery 2 Internetworking Module 5 JEOPARDY John Celum.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Wireless Networking & Security Greg Stabler Spencer Smith.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Discovery 2 Internetworking Module 2 JEOPARDY K. Martin.
D-Link Airplus Xtreme G DI-624 Wireless Router Packet Filtering Firewall w/NAT H. Victoria Bryant.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Network System Security - Task 2. Russell Johnston.
Discovery Internetworking Module 9 JEOPARDY K. Martin.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 11: It’s a Network
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
– Chapter 3 – Device Security (B)
– Chapter 3 – Device Security (B)
Introduction to Network Security
Presentation transcript:

Discovery 2 Internetworking Module 8 JEOPARDY K. Martin

RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands Acronyms Backups Monitoring & Managing Wireless Security Grab Bag Grab Bag ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

TLS Question Acronyms 100 A: What is Transport Layer Security?

Question A: What is a Demilitarized Zone? DMZ Acronyms

Question A: What is Intrusion Detection System? IDS Acronyms 300

Question A: What is Intrusion Prevention System? IPS Acronyms 400

Question A: What is Digital Linear Tape? DLT Acronyms 500

Question A: What is tape? This type of backup media is the most common available because of large capacities and being cost-effective. Backups

Question A: What is solid state storage? This type of storage media is nonvolatile that does not have any moving parts. Backups 200

Question A: What is an incremental backup? This is the quickest backup method. If run daily, it would only contain files created or changed on that day. Backups 300

Question A: What is a differential backup? This backup method will only copy the files that have been changed since the last full backup. Backups 400

Question A: What is performing drive maintenance? This backup measure would include an occasional defragmentation to improve the overall performance of the system Backups 500

Question A: What is In Band Management? This type of management uses protocols such as Telnet, SSH, HTTP, and Simple Network Management Protocol (SNMP) MANAGING & MONITORING 100

This protocol offers secure remote login and other network services.. Question A: What is SSH (Secure Shell)? MANAGING & MONITORING 200

This keystroke sequence toggles between Telnet sessions. Question A: What is Ctrl-Shift-6 X? MANAGING & MONITORING 300

When using SNMP, management stations and managed devices are identified by this... a Question A: What is a Community String or community ID? MANAGING & MONITORING 400

When using SNMP, this allows servers to receive syslog messages from syslog senders.. Question A: What is a syslog daemon? MANAGING & MONITORING 500

Question A: What is PSK (Pre-Shared Key)? This type of wireless authentication requires a matching, preconfigured key on both the server and the client. Wireless Security 100

Question A: What is WPA (Wifi-Protected Access)? This type of wireless encryption protocol uses an improved encryption algorithm called Temporal Key Integrity Protocol (TKIP). Wireless Security 200

Question A: What is WEP (Wired Equivalent Privacy)? A major weakness of this encryption protocol is its use of static encryption keys so it should only be used with older equipment that does not support newer protocols. Wireless Security 300

Question A: What is Open Authentication? This type of authentication is frequently used in Wi-Fi Hotspots? Wireless Security 400

Question A: What is MAC Address Filtering? Hackers can bypass this wireless security measure by cloning. Wireless Security 500

Question A: What is a host-based firewall? This software runs directly on a host operating system which allows filtering based on a computer address and port, therefore offering additional protection over regular port filtering. SECURITY 100

Question A: What is Access Control Lists (ACLs)? Administrators create this security measure on network devices, such as routers, to control whether or not traffic is forwarded or blocked based on IP address or port numbers. SECURITY 200

Question A: What is the DMZ (Demilitarized Zone)? SECURITY 300 This area of a network stores servers that users from the Internet are allowed to access, while protecting the internal network from outside users.

Question A: What is an IPS (Intrusion Protection System)? This is a proactive device that examines almost the entire data packet from Layer 2 to Layer 7 for malicious traffic. SECURITY 400

Question A: What is Cisco IOS Firewall software? This software allows the user to turn a router into a network layer firewall with dynamic or stateful inspection. SECURITY 500

Question A: What is Anti-X Software? This software protects computer systems from viruses, worms, spyware, malware, phishing, and even spam. GRAB BAG 100

Question A: What is an SLA (Service Level Agreement)? This a contract between an ISP and a user that documents the expectations and obligations of both parties. GRAB BAG 200

Question A: What is show flash? This command will verify the bytes available in flash and confirm that there is enough room for the IOS file before starting the upgrade or restore. GRAB BAG 300

Question A: What is copy flash tftp? This command will back up Cisco IOS software to a TFTP server. GRAB BAG 400

Question A: What is IPSec (IP Security)? This Network Layer security protocol that can be used to secure any Application Layer protocol used for communication GRAB BAG 500

Question A: What is a Dynamic Packet Filter Firewall or Stateful Firewall? This security measure will keep track of the actual communication process occurring between the source and destination devices by using a state table. Final Jeopardy