Documente Academic
Documente Profesional
Documente Cultură
JEOPARDY
Chapter 2
IST291 Chapter 2
K. Koon
More Router WAN WAN Router Router True False Router Terms Potpourri Security Encapsulation Services Basics Commands Security
Final Jeopardy
CCNA1 v3 Module 2
Acronyms 100
SDM
Question
A: What is the Cisco Router and Security Device Manager?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Acronyms 200
NTP
Question
A: What is the Network Time Protocol?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Acronyms 300
SSH
Question
A: What is Secure Shell (sometimes referred to as Secure Telnet)?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Acronyms 400
CDP
Question
A: What is the Cisco Discovery Protocol?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Acronyms 500
SNMP
Question
A: What is the Simple Network Management Protocol?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is the Single Router Approach?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is the Defense-in-Depth Approach?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is an Edge Router?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is an Edge Router?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is a Firewall?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is False? It is only available for systems that support a PCMCIA Advanced Technology Attachment(ATA) Flash interface.
CCNA1 v3 Module 2 IST291 Chapter 2
100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
Question
A: What is False?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is True?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is False?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is True?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is a Firewall?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is a Firewall?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is the Demilitarized Zone(DMZ)?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is a Firewall and Demilitarized Zone.?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Question
A: What is the Demilitarized Zone, Router, Firewall?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Terms 100
Place the router and physical devices that connect to it in a secure locked room that is accessible only to authorized personnel, free of electrostatic or magnetic interference, has fire suppression, and controls for temperature and humidity. This is _____________.
Question
A: What is Physical Security?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Terms 200
Configure the router with the maximum amount of memory possible. The availability of memory can help protect the network from some DoS attacks, while supporting the widest range of security services. This is __________________.
Question
A: What is Operating System Security?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Terms 300
Secure administrative control. Ensure that only authorized personnel have access and that their level of access is controlled. Disable unused ports and interfaces. Reduce the number of ways a device can be accessed. This is ______________.
Question
A: What is Router Hardening?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Terms 400
___ view has the same access privileges as a user who has level 15 privileges. Only a ___ view user can configure a new view and add or remove commands from the existing views.
Question
A: What is Root?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Terms 500
A specific set of commands can be bundled into a ____ view. Unlike privilege levels, a ____ view has no command hierarchy and no higher or lower views.
Question
A: What is CLI?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Potpourri 100
A ______ consists of one or more CLI views. ______s allow a network administrator to assign users and groups of users multiple CLI views at once, instead of having to assign a single CLI view per user with all commands associated to the one CLI view.
Question
A: What is Superview?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Potpourri 200
This feature allows for faster recovery if someone reformats flash memory or erases the startup configuration file in NVRAM. It secures the router image and maintains a secure working copy of the running configuration.
Question
A: What is the Cisco IOS Resilient Configuration?
CCNA1 v3 Module 2 IST291 Chapter 2
100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
Potpourri 300
ATA
Question
A: What is Advanced Technology Attachment?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Potpourri 400
___ provides functionality similar to an outbound Telnet connection, except the connection is encrypted and operates on port 22. With authentication and encryption, ___ allows for secure communication over a non-secure network.
Question
A: What is Secure Shell (SSH)?
100 200 300 400 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
500
Potpourri 500
One way secret (asymmetric) keys must be generated for a router to encrypt the SSH traffic. To create the RSA key, use the crypto key generate rsa general-keys modulus modulus-size command in global configuration mode where modulus-size can be configured from ___ to ___.
Question
100 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500
Final Jeopardy
There are three versions of SSH: SSHv1 SSHv2 & SSHv3. Of these versions, CISCO IOS 12.3(4)T and later support ________. ___ uses the Rivest, Shamir and Adleman (RSA) algorithm & ___ uses the Diffie-Hellman key exchange and the strong integrity-checking message authentication code (MAC).
Question
100 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500