Semester 1. Cisco I. Introduction to Networks JEOPADY. Chapter 11

Similar documents
1. Which network design consideration would be more important to a large corporation than to a small business?

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: Networks

Introduction p. 1 Self-Assessment p. 9 Networking Fundamentals p. 17 Introduction p. 18 Components and Terms p. 18 Topologies p. 18 LAN Technologies

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Wireless Router at Home

Chapter 2. Switch Concepts and Configuration. Part II

Chapter 5 Advanced Configuration

Exam E1 Copyright 2010 Thaar AL_Taiey

Cisco Implementing Cisco IP Routing (ROUTE v2.0)

CCNA 1 Chapter 6 v5.0 Exam Answers 2013

Voysis Cloud Implementation

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

IP ADVANCED RADIO SYSTEM FAQ

Troubleshooting Your Network

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

CCNA 1 v5.0 R&S ITN Final Exam 2014

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)

CCNA 1 Final Exam Answers UPDATE 2012 eg.2

Cisco 5921 Embedded Services Router

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Cisco 1: Networking Fundamentals

CCNA Exploration Network Fundamentals

Security SSID Selection: Broadcast SSID:

Configure a Switch. LAN Switching and Wireless Chapter 2. Version Cisco Systems, Inc. All rights reserved.

AplombTech Smart Router Manual

COPYRIGHTED MATERIAL. Table of Contents. Assessment Test

CertifyMe. CertifyMe

CCNA. Course Catalog

Exam Questions

PrepKing. PrepKing

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

INDEX. Symbols. Cisco Routers for the Desperate, 2nd Edition (C) 2009 by Michael W. Lucas

Configuring Local Authentication

Configuring Basic Wireless Settings on the RV130W

Qlear THE QLEAR EXPERIENCE INSIGHTS AFTER QLEAR PROBE INSTALLATION

Activity Configuring and Securing a Wireless LAN in Packet Tracer

Advanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices

MTA_98-366_Vindicator930

Lab Student Lab Orientation

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing

Interconnecting Cisco Networking Devices Part 1 ( )

Certified Cisco Networking Associate v1.1 ( )

Chapter 1 B: Exploring the Network

DVA-G3340S High-Speed 2.4 GHz Wireless ADSL VOIP Router. Manual

XL-PB350CA. EoC bridge slave. User manual

CISCO EXAM QUESTIONS & ANSWERS

Configuring a Basic Wireless LAN Connection

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

CCNA 4 - Final Exam (B)

CCNP SWITCH (22 Hours)

Added Features. 1. PPTP (Point-to-Point Tunneling Protocol)

2016/01/17 04:04 1/9 Basic Routing Lab

Basic Wireless Settings on the CVR100W VPN Router

What is Eavedropping?

Network Configuration Guide

Prestige 660H Series. Prestige 660HW Series

Configuring a Wireless LAN Connection

Troubleshooting the 792xG Series Wireless IP Phone

Configuring Cipher Suites and WEP

Deployment Scenarios

AirCruiser G Wireless Router GN-BR01G

CompTIA Network+ Study Guide Table of Contents

Cisco Introducing Cisco Data Center Technologies - DCICT. Download Full Version :

Cisco CCNA (ICND1, ICND2) Bootcamp

Cisco Exam Questions & Answers

Securing Wireless LAN Controllers (WLCs)

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.

Prototyping the campus network

This document is a tutorial related to the Router Emulator which is available at:

Configuring Repeater and Standby Access Points

NETWORK LAB 2 Configuring Switch Desktop

Configuring Settings on the Cisco Unified Wireless IP Phone 7921G

Wireless technology Principles of Security

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

Wireless LAN Security. Gabriel Clothier

How to connect to XBox Live ±via. BiPAC-72,73 Series? How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Configuring Settings on the Cisco Unified Wireless IP Phone

MiPDF.COM. 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Campus Network Design

IP819VGA g ADSL VoIP Gateway

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

Scope and Sequence: CCNA Exploration v4.0

Cisco.BrainDump v by.MuTe

The network requirements can vary based on the number of simultaneous users the system will need to support. The most basic requirements are:

IP806GA/GB Wireless ADSL Router

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

Exam : Title : Interconnecting Cisco Networking Devices Part 1. Ver :

CCNA Actual Test and Module 1, 5, 6 cisco.com

Simple, full featured and budgetary deployment of single AP or distributed APs Hot-Spot for small scale projects.

Entry Level Assessment Blueprint Computer Networking Fundamentals

A5500 Configuration Guide

Calix T07xG HGU ONT Operation and Maintenance Guide

Abstract. Avaya Solution & Interoperability Test Lab

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

Version 4.1. Configuring Network Devices

CompTIA E2C Security+ (2008 Edition) Exam Exam.

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN

Transcription:

Semester 1 Cisco I Introduction to Networks JEOPADY Chapter 11

Network Router Design Modes WAN WAN Router Router Safety Performance Commands ISR Potpourri Encapsulation Services Basics Commands F i n a l J e o p a r d y 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500

Network Design 100 This protocol is used to stream media effectively. A: What is RTP (Real-Time Transport Protocol)?

Network Design 200 Traffic patterns can be analyzed with this based on the source and destination of the traffic. A: What is a protocol analyzer?

Network Design 300 These two things should be done when determining traffic flow patterns. A: What is capture traffic at peak times and on different network segments

Network Design 400 This is an important consideration factor in a large network design A: What is redundancy?

This priority queue is used in a converged network for real time traffic such as VoIP. Network Design 500 A: What is High Priority?

Safety 100 This attack attempts to prevent a service from performing it s intended task. A: What is DoS (Denial of Service)?

This remote access requires one way secret keys used to encrypt communication Safety 200 A: What is SSH (Secure Shell)?

This password policy helps reduce the window of opportunity if a password has been compromised. Safety 300 A: What is change passwords frequently?

This command is used on a Cisco device to help prevent Brute-force attacks by limiting the number of attempts Safety 400 A: What is login block-for seconds attempts tries within seconds?

Safety 500 This should be done after Containment of a worm attack A: What is Inoculation?

Performance 100 This symbol represents a successful ping in the Cisco IOS A: What is! (explanation mark)?

A: What is a baseline? Performance 200 This should be created with the same test at different times over a period of time and documented

A: What is show version? Performance 300 This command will show memory amounts, IOS images, and hexadecimal configuration register settings on switches and routers

This command can be used to find bottlenecks and find the routed hops a packet takes through a network. Performance 400 A: What is traceroute (IOS/Unix) or tracert (Windows)?

Performance 500 This command is helpful in determining a picture of the network and does not require a network address to function A: What is show cdp neighbors?

This command displays the size and available space of directories in the memory A: What is show file system? Commands 100

Commands 200 This IOS or UNIX command displays the contents of a directory A: What is dir?

This command will disable the layer two proprietary protocol that identifies Cisco devices for every interface on a device. A: What is no cdp run? Commands 300

Commands 400 This command will save a configuration in RAM to a remote server. A: What is copy run tftp?

This command will verify what directory is currently the working directory. A: What is pwd? Commands 500

This 32 alpha-numeric, case sensitive WLAN identifier must be the same for all wireless device on the AP and is known as this. ISR 100 A: What is the SSID (Service Set Identifier)?

ISR 200 This WLAN security encryption generates a dynamic key on each connection A: What is WPA?

This feature of ISR s allow mobility and flexibility as well as access to wired LAN devices ISR 300 A: What is a wireless access point?

A WLAN with 802.11b, 802.11n and 802.11g devices will operate at this speed. ISR 400 A: What is 802.11b or 11Mbps?

ISR 500 These three measures should be taken to secure a WLAN A: What is change the default values, disable broadcasts, and use encryption?

Potpourri 100 Hardware, Environmental, Electrical, and Maintenance are examples of this A: What are Physical Threats?

Potpourri 200 This should be done to saved text config files before they are reloaded A: What is edit the file?

This service is less expensive but not the same quality as an integrated IP Telephony solution Potpourri 300 A: What is VoIP (Voice over IP)?

Potpourri 400 This firewall feature makes internal LAN addresses hidden from outside users A: What is NAT (Network Address Translation)?

This security service requires proof of who you are, what you are allowed to do and keeps track of what you do Potpourri 500 A: What is AAA (Authentication, Authorization, and Accounting?

Final Jeopardy These are the four categories of threats to networks A: What is Information Theft, Identity theft, Data Manipulation or Destruction, and DoS? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500