CCNA Discovery 2, Chapter 8. “ ISP Responsibility” A MHS ...

syriannoviceΔίκτυα και Επικοινωνίες

13 Ιουλ 2012 (πριν από 5 χρόνια και 2 μήνες)

547 εμφανίσεις

CCNA Discovery
2
, Chapter
8
. “
ISP Responsibility


A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

1


Name:

1.

Some of the security services that an ISP support technician can provide include

(Explain each)
:










2.

What is the Microsoft Baseline Security Analyzer?






3.


List c
ommon data security features and procedures
:







4.


Explain the “principle of leas
t privilege”:







CCNA Discovery
2
, Chapter
8
. “
ISP Responsibility


A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

2


5.


Explain
AAA
, the

three
-
step process used by network administrators to make it
difficult for attack
ers to gain access to a network:









6.


List and explain the secure versions of application protocols that might be used
by the follo
wing:

a.

Web Servers



b.


Email Servers



c.


Telnet Servers



d.


FTP Servers



e.


File Servers




7.


Print, Complete, and submit Lab 8.1.3 “Securing Local Data and Transmitted
Data”

8.

List and explain the
three key types of denial of service attacks
:








CCNA Discovery
2
, Chapter
8
. “
ISP Responsibility


A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

3



9.


Define and
explain:

a.

Port Filtering




b.


Access Lists





10.


Print, complete, and submit Lab 8.2.1 “Planning for Access Lists and Port
Filters”

11.


Explain how a router might use a state table to filter packets:






12.


What is the purpose of an internal Firewall and how do
es it differ from a border
firewall?






13.


What is a DMZ?






14.


Do Packet Tracer Activity 8.2.2

CCNA Discovery
2
, Chapter
8
. “
ISP Responsibility


A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

4


15.

List and explain two tools often utilized by ISPs to prevent intrusions into their
networks and the networks of customers

who purchase managed services:








16.


What are two locations where an Intrusion Detection System (IDS) might be
used and explain what might be learned from placing the IDS in each location:








17.


Explain in detail how an IPS differs from an IDS:










18.


List and define four
ways used to
secure a wireless network:










CCNA Discovery
2
, Chapter
8
. “
ISP Responsibility


A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

5



19.


Do Packet Tracer Activity 8.2.4 “Configuring WEP on a Wireless Router”


20.


Explain what a host
-
based firewall is used for:








21.


List and define four
different types of attacks and vulnerabilities
that
ISP servers
that

utilize host
-
based firewalls are protected from
:










22.


Define:

a.

Phishing





b.


Anti
-
X software





c.


Incident management





CCNA Discovery
2
, Chapter
8
. “
ISP Responsibility


A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

6


23.


Print, complete, and submit Lab 8.2.5 “Researching an Anti
-
X Software
Product”


24.

List and describe each of the eight parts of a
typical SLA:

















25.


Print, complete, and submit Lab 8.3.1 “Interpreting a Service Level Agreement”


26.


Explain the difference between out
-
of
-
band and in
-
band management:






27.


List some traditional in
-
band management protocols:










CCNA Discovery
2
, Chapter
8
. “
ISP Responsibility


A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

7


28.


List and e
xplain each of the four components of SNMP:










29.


Explain:

a.

Traps




b.


Community string




c.


Syslog





30.


List factors to consider when choosing a type of backup media:














CCNA Discovery
2
, Chapter
8
. “
ISP Responsibility


A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

8


31.


Define each:

a.

Normal (full) backup:




b.


Differential backup:




c.


Increment
al backup:









32.


List and explain steps you need to take to ensure successful backups:










33.


Print, complete and submit Lab 8.4.2 “Planning a Backup Solution”


34.


What is a disaster recovery plan and what is its purpose?








CCNA Discovery
2
, Chapter
8
. “
ISP Responsibility


A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

9


35.


List and explain the
steps in understanding the needs of an organization prior to
designing a disaster recovery plan:










36.


List and explain steps to creating a disaster recovery plan: