Title: Internetworking
1Internetworking
JEOPARDY
Discovery
K. Martin
2Router Modes
WAN Encapsulation
WAN Services
Router Basics
Router Commands
Router Modes
WAN Encapsulation
WAN Services
Router Basics
Router Commands
Threat Types
Engineering
Acronyms
Attacks
Security
Firewall
? ? ? F i n a l J e o p a r d y ? ? ?
100
100
100
100
100
100
100
100
200
200
200
200
200
200
200
200
300
300
300
300
300
300
300
300
400
400
400
400
400
400
400
400
500
500
500
500
500
500
500
500
3THREAT TYPES100
Threats caused by people outside the organization.
A What are external threats?
4THREAT TYPES200
The stealing of personal information.
A What is Identity theft?
5THREAT TYPES300
This type of intrusion causes loss of data
records.
A What is Data Loss/Manipulation?
6THREAT TYPES400
This type of theft involves stealing of
confidential information used for primarily
research purposes.
A What is Information Theft?
7THREAT TYPES500
This type of action is intended to prevent
legitimate users from accessing needed services.
A What is Disruption of Service?
8ENGINEERING100
The ability of someone or something to influence
behavior of a group of people.
A What is social engineering?
9ENGINEERING 200
Which one does not belong?? (phishing, spamming,
pretexting, vishing)
A What is spamming?
10ENGINEERING 300
This type of social engineering is implemented
via email communication.
A What is phishing?
11ENGINEERING 400
During a pretexting event, the user is typically
contacted using this form of communication.
A What is a phone?
12ENGINEERING 500
Another name for Phone Phising.
A What is Vishing?
13ACRONYMS100
VoIP
A What is Voice Over IP?
14ACRONYMS200
SYN
A What is Synchronous?
15ACRONYMS 300
DDoS
A What is Distributed Denial of Services?
16ACRONYMS 400
DMZ
A What is Demilitarized Zone?
17ACRONYMS 500
SPIC
A What is Stateful Packet Inspection?
18ATTACKS100
This type of attack cannot start by itself. It
must be activated by the user.
A What is a virus?
19ATTACKS 200
The primary purpose of this type of attack is to
deny services to users.
A What is Denial of Service?
20ATTACKS 300
Used by advertisers to market their product via
IM or email.
A What is spam?
21ATTACKS 400
A flooding of packets with an incorrect IP
address.
A What is SYN flooding?
22ATTACKS 500
The main characteristic of this type of attack is
to propagate itself across the network.
A What is a worm?
23SECURITY100
This part of a security policy explains how
mobile workers can access the network.
A What are Remote Access Policies?
24SECURITY 200
Small pieces of code that helps fix software
problems.
A What are patches?
25SECURITY 300
This type of security helps control traffic to
and from the network.
A What is a Firewall?
26SECURITY 400
Helps remove unwanted email.
A What is a spam filter?
27SECURITY 500
This part of a security policy states what
applications are permitted or denied.
A What is acceptable use policy?
28FIREWALL100
A dedicated hardware device that provides
firewall service.
A What is a appliance-based firewall?
29FIREWALL200
This type of business would be suited for a
two-firewall system.
A What is a large corporation?
30FIREWALL300
The area of the network that is accessible to
both internal and external devices.
A What is a DMZ?
31FIREWALL 400
TRUE OR FALSE Internet access can be denied for
specific dates and times on a Linksys integrated
router.
A What is TRUE?
32FIREWALL 500
A firewall method in which traffic is permitted
or denied based on an IP or MAC address.
A What is packet filtering method?
33Final Jeopardy
The SPI Firewall Protection is enabled on a
Linksys router for security. What is its purpose?
A What is to require packet to be responses to
internal hosts