Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.

Similar presentations


Presentation on theme: "IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin."— Presentation transcript:

1

2 IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin

3 IT Ess I v.4x Chapter 1 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500 Acronyms Firewalls Network Intrusion Attacks Attacks Methods of Methods of Attack Potpourri 100 200 300 400 500 100 200 300 400 500 ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄

4 IT Ess I v.4x Chapter 1 Question DoS Acronyms 100 A: What is Denial of Service? 100 200 300 400 500 IT Ess I v4x Chapter 1

5 IT Ess I v.4x Chapter 1 Question A: What is Distributed Denial of Service? DDoS IT Ess I v4x Chapter 1 Acronyms 200 100 200 300 400 500

6 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 A: What is Network Address Translation? NAT IT Ess I v4x Chapter 1 Acronyms 300

7 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 A: What is Demilitarized Zone? DMZ IT Ess I v4x Chapter 1 Acronyms 400

8 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Uniform Resource Locator? URL Acronyms 500

9 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is an Appliance Based Firewall? A firewall that is built-in to a dedicated hardware device known as a security appliance. Firewalls 100 200 300 400 500

10 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Server Based Firewall? A firewall that consists of a firewall application that runs on a network operating system (NOS) such as UNIX, Windows or Novell. Firewalls 200

11 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is an Integrated Firewall? A firewall that is implemented by adding firewall functionality to an existing device, such as a router. Firewalls 300

12 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Personal Firewall? A type firewall that resides on host computers and are not designed for LAN implementations. Firewalls 400

13 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Application Based Firewall? Cisco Pix 500 series. Firewalls 500

14 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is an Internal attack? Up to 70% of all attacks come from this attack. Network Intrusion 100

15 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Social Engineering? A term that refers to the ability of something or someone to influence the behavior of a group of people. Network Intrusion 200

16 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Pretexting? A form of social engineering where an invented (the pretext) is used on a victim in order to get the victim to release information or perform an action. Network Intrusion 300

17 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Vishing? An unsuspecting user is sent a voice mail instructing them to call a number which appears to be a legitimate telephone- banking service. Network Intrusion 400

18 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Phishing? Fraudulent acquisition of sensitive information through the impression of a trustworthy source. Network Intrusion 500

19 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is DoS? These types of attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users. Attacks 100

20 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is SYN Flooding? In this type of attack a flood of packets are sent to a server requesting a client connection. Attacks 200

21 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Ping of Death? In this type of attack a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device. Attacks 300

22 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is DDoS? This type of attack is designed to saturate and overwhelm network links with useless data. Attacks 400

23 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Brute Force? In this type of attack a fast computer is used to try to guess passwords or to decipher an encryption code. Attacks 500

24 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Spyware? Any program that gathers personal information from your computer without your permission or knowledge. Methods of Attack 100

25 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What are Cookies? They are used to record information about an Internet user when they visit websites. Methods of Attack 200

26 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Adware? A form of spyware used to collect information about a user based on websites the user visits. Methods of Attack 300

27 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What are Pop Ups and Pop Unders? Additional advertising windows that display when visiting a web site. Methods of Attack 400

28 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Spam? Another annoying by-product of our increasing reliance on electronic communications is unwanted bulk email. Methods of Attack 500

29 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Security Policy? Documentation that details system, physical, and behavioral constraints in an organization. Potpourri 100

30 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Software patches and updates, virus protection, Spyware protection, Spam blockers, Pop up blockers, and Firewalls? 3 security tools and applications used in security. Potpourri 200

31 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is a Patch? A small piece of code that fixes a specific problem. Potpourri 300

32 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Packet Filtering? Prevents or allows access based on IP or MAC addresses. Potpourri 400

33 IT Ess I v.4x Chapter 1 Question 100 200 300 400 500 IT Ess I v4x Chapter 1 A: What is Application/Web site filtering? Prevents or allows access based on the application. Potpourri 500

34 IT Ess I v.4x Chapter 1 Question A: What is NAT? Translates an internal address or group of addresses into an outside, public address that is sent across the network. Final Jeopardy CCNA1 v3 Module 1 100 200 300 400 500


Download ppt "IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin."

Similar presentations


Ads by Google