Download presentation
Presentation is loading. Please wait.
Published byBonnie Burke Modified over 9 years ago
2
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin
3
RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500 Acronyms Backups Monitoring & Managing Wireless Security Grab Bag Grab Bag 100 200 300 400 500 100 200 300 400 500 ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄
4
TLS Question Acronyms 100 A: What is Transport Layer Security? 100 200 300 400 500
5
Question A: What is a Demilitarized Zone? DMZ Acronyms 200 100 200 300 400 500
6
Question 100 200 300 400 500 A: What is Intrusion Detection System? IDS Acronyms 300
7
Question 100 200 300 400 500 A: What is Intrusion Prevention System? IPS Acronyms 400
8
Question 100 200 300 400 500 A: What is Digital Linear Tape? DLT Acronyms 500
9
Question 100 200 300 400 500 A: What is tape? This type of backup media is the most common available because of large capacities and being cost-effective. Backups 100 200 300 400 500
10
Question 100 200 300 400 500 A: What is solid state storage? This type of storage media is nonvolatile that does not have any moving parts. Backups 200
11
Question 100 200 300 400 500 A: What is an incremental backup? This is the quickest backup method. If run daily, it would only contain files created or changed on that day. Backups 300
12
Question 100 200 300 400 500 A: What is a differential backup? This backup method will only copy the files that have been changed since the last full backup. Backups 400
13
Question 100 200 300 400 500 A: What is performing drive maintenance? This backup measure would include an occasional defragmentation to improve the overall performance of the system Backups 500
14
Question 100 200 300 400 500 A: What is In Band Management? This type of management uses protocols such as Telnet, SSH, HTTP, and Simple Network Management Protocol (SNMP) MANAGING & MONITORING 100
15
This protocol offers secure remote login and other network services.. Question 100 200 300 400 500 A: What is SSH (Secure Shell)? MANAGING & MONITORING 200
16
This keystroke sequence toggles between Telnet sessions. Question 100 200 300 400 500 A: What is Ctrl-Shift-6 X? MANAGING & MONITORING 300
17
When using SNMP, management stations and managed devices are identified by this... a Question 100 200 300 400 500 A: What is a Community String or community ID? MANAGING & MONITORING 400
18
When using SNMP, this allows servers to receive syslog messages from syslog senders.. Question 100 200 300 400 500 A: What is a syslog daemon? MANAGING & MONITORING 500
19
Question 100 200 300 400 500 A: What is PSK (Pre-Shared Key)? This type of wireless authentication requires a matching, preconfigured key on both the server and the client. Wireless Security 100
20
Question 100 200 300 400 500 A: What is WPA (Wifi-Protected Access)? This type of wireless encryption protocol uses an improved encryption algorithm called Temporal Key Integrity Protocol (TKIP). Wireless Security 200
21
Question 100 200 300 400 500 A: What is WEP (Wired Equivalent Privacy)? A major weakness of this encryption protocol is its use of static encryption keys so it should only be used with older equipment that does not support newer protocols. Wireless Security 300
22
Question 100 200 300 400 500 A: What is Open Authentication? This type of authentication is frequently used in Wi-Fi Hotspots? Wireless Security 400
23
Question 100 200 300 400 500 A: What is MAC Address Filtering? Hackers can bypass this wireless security measure by cloning. Wireless Security 500
24
Question 100 200 300 400 500 A: What is a host-based firewall? This software runs directly on a host operating system which allows filtering based on a computer address and port, therefore offering additional protection over regular port filtering. SECURITY 100
25
Question 100 200 300 400 500 A: What is Access Control Lists (ACLs)? Administrators create this security measure on network devices, such as routers, to control whether or not traffic is forwarded or blocked based on IP address or port numbers. SECURITY 200
26
Question 100 200 300 400 500 A: What is the DMZ (Demilitarized Zone)? SECURITY 300 This area of a network stores servers that users from the Internet are allowed to access, while protecting the internal network from outside users.
27
Question 100 200 300 400 500 A: What is an IPS (Intrusion Protection System)? This is a proactive device that examines almost the entire data packet from Layer 2 to Layer 7 for malicious traffic. SECURITY 400
28
Question 100 200 300 400 500 A: What is Cisco IOS Firewall software? This software allows the user to turn a router into a network layer firewall with dynamic or stateful inspection. SECURITY 500
29
Question 100 200 300 400 500 A: What is Anti-X Software? This software protects computer systems from viruses, worms, spyware, malware, phishing, and even spam. GRAB BAG 100
30
Question 100 200 300 400 500 A: What is an SLA (Service Level Agreement)? This a contract between an ISP and a user that documents the expectations and obligations of both parties. GRAB BAG 200
31
Question 100 200 300 400 500 A: What is show flash? This command will verify the bytes available in flash and confirm that there is enough room for the IOS file before starting the upgrade or restore. GRAB BAG 300
32
Question 100 200 300 400 500 A: What is copy flash tftp? This command will back up Cisco IOS software to a TFTP server. GRAB BAG 400
33
Question 100 200 300 400 500 A: What is IPSec (IP Security)? This Network Layer security protocol that can be used to secure any Application Layer protocol used for communication GRAB BAG 500
34
Question A: What is a Dynamic Packet Filter Firewall or Stateful Firewall? This security measure will keep track of the actual communication process occurring between the source and destination devices by using a state table. Final Jeopardy 100 200 300 400 500
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.