Download presentation
Presentation is loading. Please wait.
Published byFrancine Bruce Modified over 9 years ago
2
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin
3
IT Ess I v.4x Chapter 1 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500 Acronyms Firewalls Network Intrusion Attacks Attacks Methods of Methods of Attack Potpourri 100 200 300 400 500 100 200 300 400 500 ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄
4
IT Ess I v.4x Chapter 1 Question DoS Acronyms 100 A: What is Denial of Service? 100 200 300 400 500 IT Ess I v4x Chapter 1
5
IT Ess I v.4x Chapter 1 Question A: What is Distributed Denial of Service? DDoS IT Ess I v4x Chapter 1 Acronyms 200 100 200 300 400 500
6
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 A: What is Network Address Translation? NAT IT Ess I v4x Chapter 1 Acronyms 300
7
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 A: What is Demilitarized Zone? DMZ IT Ess I v4x Chapter 1 Acronyms 400
8
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Uniform Resource Locator? URL Acronyms 500
9
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is an Appliance Based Firewall? A firewall that is built-in to a dedicated hardware device known as a security appliance. Firewalls 100 200 300 400 500
10
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Server Based Firewall? A firewall that consists of a firewall application that runs on a network operating system (NOS) such as UNIX, Windows or Novell. Firewalls 200
11
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is an Integrated Firewall? A firewall that is implemented by adding firewall functionality to an existing device, such as a router. Firewalls 300
12
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Personal Firewall? A type firewall that resides on host computers and are not designed for LAN implementations. Firewalls 400
13
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Application Based Firewall? Cisco Pix 500 series. Firewalls 500
14
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is an Internal attack? Up to 70% of all attacks come from this attack. Network Intrusion 100
15
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Social Engineering? A term that refers to the ability of something or someone to influence the behavior of a group of people. Network Intrusion 200
16
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Pretexting? A form of social engineering where an invented (the pretext) is used on a victim in order to get the victim to release information or perform an action. Network Intrusion 300
17
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Vishing? An unsuspecting user is sent a voice mail instructing them to call a number which appears to be a legitimate telephone- banking service. Network Intrusion 400
18
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Phishing? Fraudulent acquisition of sensitive information through the impression of a trustworthy source. Network Intrusion 500
19
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is DoS? These types of attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users. Attacks 100
20
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is SYN Flooding? In this type of attack a flood of packets are sent to a server requesting a client connection. Attacks 200
21
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Ping of Death? In this type of attack a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device. Attacks 300
22
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is DDoS? This type of attack is designed to saturate and overwhelm network links with useless data. Attacks 400
23
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Brute Force? In this type of attack a fast computer is used to try to guess passwords or to decipher an encryption code. Attacks 500
24
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Spyware? Any program that gathers personal information from your computer without your permission or knowledge. Methods of Attack 100
25
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What are Cookies? They are used to record information about an Internet user when they visit websites. Methods of Attack 200
26
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Adware? A form of spyware used to collect information about a user based on websites the user visits. Methods of Attack 300
27
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What are Pop Ups and Pop Unders? Additional advertising windows that display when visiting a web site. Methods of Attack 400
28
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Spam? Another annoying by-product of our increasing reliance on electronic communications is unwanted bulk email. Methods of Attack 500
29
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Security Policy? Documentation that details system, physical, and behavioral constraints in an organization. Potpourri 100
30
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Software patches and updates, virus protection, Spyware protection, Spam blockers, Pop up blockers, and Firewalls? 3 security tools and applications used in security. Potpourri 200
31
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Patch? A small piece of code that fixes a specific problem. Potpourri 300
32
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Packet Filtering? Prevents or allows access based on IP or MAC addresses. Potpourri 400
33
IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Application/Web site filtering? Prevents or allows access based on the application. Potpourri 500
34
IT Ess I v.4x Chapter 1 Question A: What is NAT? Translates an internal address or group of addresses into an outside, public address that is sent across the network. Final Jeopardy CCNA1 v3 Module 1 100 200 300 400 500
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.