
<p>Name ______Date ______</p><p>Chapter 11 Student Version</p><p>Chapter 11 Objectives:</p><p>. Identify the devices and protocols used in a small network . Explain how a small network serves as the basis of larger networks. . Explain the need for basic security measures on network devices. . Identify security vulnerabilities and general mitigation techniques . Use the output of ping and tracert commands to establish relative network performance. . Use basic show commands to verify the configuration and status of a device interface. . Explain the file systems on Routers and Switches. . Apply the commands to back up and restore an IOS configuration file.</p><p>Required Materials:</p><p>Reading Organizer </p><p>Packet Tracer Activities: 11.3.2.2 Packet Tracer - Test Connectivity with Traceroute 11.3.3.4 Packet Tracer - Using Show Commands 11.4.2.5 Packet Tracer - Backing Up Configuration Files 11.5.2.4 Packet Tracer - Configuring a Linksys Router 11.6.1.2 Packet Tracer - Skills Integration Challenge </p><p>Labs: 11.0.1.2 Class Activity - Did You Notice Instructions 11.2.2.6 Lab - Researching Network Security Threats 11.2.4.5 Lab - Accessing Network Devices with SSH 11.2.4.6 Lab - Securing Network Devices 11.3.2.3 Lab - Testing Network Latency with Ping and Traceroute 11.4.2.6 Lab - Managing Router Configuration Files with Terminal Emulation Software 11.4.2.7 Lab - Managing Device Configuration Files Using TFTP, Flash, and USB 11.4.2.8 Lab - Researching Password Recovery Procedures 11.6.1.1 Class Activity - Design and Build a Small Network </p><p>Chapter Test</p><p>Cisco Semester 1 – Introduction to Networks 5.0 1 Mark Rawlings Chapter 11 Saint Paul College Chapter 11 Reading Organizer Student Version</p><p>Note: the Reading Organizer has weighted scoring. Any question with the word explain or define in it is expected to have a longer answer and is worth two points each.</p><p>After completion of this chapter, you should be able to:</p><p>. Identify the devices and protocols used in a small network . Explain how a small network serves as the basis of larger networks. . Explain the need for basic security measures on network devices. . Identify security vulnerabilities and general mitigation techniques . Use the output of ping and tracert commands to establish relative network performance. . Use basic show commands to verify the configuration and status of a device interface. . Explain the file systems on Routers and Switches. . Apply the commands to back up and restore an IOS configuration file.</p><p>11.1 Create and Grow</p><p>1. What are the factors to consider when planning a small network?</p><p> a. </p><p> b. </p><p> c. </p><p> d. </p><p>2. Planning and documenting the IP addressing scheme helps the administrator to track device types. Explain two reasons why this is important.</p><p> a. </p><p> b. </p><p>3. How can redundancy can be accomplished in a network environment?</p><p>2</p><p>4. The smaller the network, the less the chance that redundancy of equipment will be affordable. What is a common way to a common way to introduce redundancy in a small network?</p><p>5. To help ensure availability to network services, the network designer should take the following steps:</p><p>Step 1 – </p><p>Step 2 – </p><p>Step 3 – </p><p>Step 4 – </p><p>6. There are two forms of software programs or processes that provide access to the network. List and explain both.</p><p> a. ______–</p><p> b. ______–</p><p>7. What is the purpose of Network protocols?</p><p>8. List the common network protocols and add a brief description of the network services each provides.</p><p> a. ______–</p><p> b. ______– c. ______–</p><p>Cisco Semester 1 – Introduction to Networks 5.0 3 Mark Rawlings Chapter 11 Saint Paul College d. ______–</p><p> e. ______–</p><p> f. ______–</p><p>9. What is a concern when implementing Real-time applications?</p><p>10. Explain how VoIP works?</p><p>11. How is IP Telephony different than VoIP?</p><p>12. To transport streaming media effectively, the network must be able to support applications that require delay-sensitive delivery. List two protocols that support this requirement.</p><p> a. </p><p> b. </p><p>13. List and explain the elements required to scale a network.</p><p> a. ______–</p><p> b. ______–</p><p> c. ______–</p><p> d. ______– 14. What enables a network professional to quickly compile statistical information about traffic flows on a network?</p><p>4 15. To determine traffic flow patterns, it is important to:</p><p> a. </p><p> b. </p><p>16. Information gathered by the protocol analyzer is analyzed based on what?</p><p> a. </p><p> b. </p><p> c. </p><p>17. In addition to understanding changing traffic trends, a network administrator must also be aware of how network use is changing. What is one method of doing this?</p><p>11.2 Keeping the Network Safe</p><p>18. After the hacker gains access to the network, four types of threats may arise. Thses are:</p><p> a. </p><p> b. </p><p> c. </p><p> d. </p><p>19. List and explain the four classes of physical threats.</p><p> a. ______–</p><p>Cisco Semester 1 – Introduction to Networks 5.0 5 Mark Rawlings Chapter 11 Saint Paul College b. ______–</p><p> c. ______–</p><p> d. ______–</p><p>20. There are three network security factors. These are:</p><p> a. </p><p> b. </p><p> c. </p><p>21. What is network vulnerability?</p><p>22. What do network threats include?</p><p>23. There are three primary vulnerabilities or weaknesses. These are:</p><p> a. </p><p> b. </p><p> c. </p><p>24. List and explain the three main types of malicious code attacks?</p><p> a. ______–</p><p>6 b. ______–</p><p> c. ______–</p><p>25. Explain the three step process of a worm attack.</p><p> a. ______–</p><p> b. ______–</p><p> c. ______–</p><p>26. Network attacks can be classified into three major categories. List and explain each.</p><p> a. ______–</p><p> b. ______–</p><p> c. ______–</p><p>27. List several samples of Reconnaissance attacks.</p><p> a. </p><p> b. </p><p>Cisco Semester 1 – Introduction to Networks 5.0 7 Mark Rawlings Chapter 11 Saint Paul College c. </p><p> d. </p><p>28. List several samples of Access attacks.</p><p> a. </p><p> b. </p><p> c. </p><p> d. </p><p>29. List several samples of Denial of Service attacks.</p><p> a. </p><p> b. </p><p> c. </p><p> d. </p><p> e. </p><p>30. List and explain the recommended steps for worm attack mitigation.</p><p> a. ______–</p><p> b. ______–</p><p> c. ______–</p><p> d. ______–</p><p>31. What is the most effective way to mitigate a worm attack?</p><p>8 32. What is one solution to the management of critical security patches?</p><p>33. AAA, or “triple A” network security services provide the primary framework to set up access control on a network device. List and explain what the AAA represents?</p><p> a. ______–</p><p> b. ______–</p><p> c. ______–</p><p>34. List and explain the two most popular options for external authentication of users.</p><p> a. ______–</p><p> b. ______–</p><p>35. Firewall products use various techniques for determining what is permitted or denied access to a network. List and explain the techniques firewalls use.</p><p> a. ______–</p><p> b. ______–</p><p> c. ______–</p><p> d. ______–</p><p>Cisco Semester 1 – Introduction to Networks 5.0 9 Mark Rawlings Chapter 11 Saint Paul College 36. Firewall products come packaged in various forms. List and explain each.</p><p> a. ______–</p><p> b. ______–</p><p> c. ______–</p><p> d. ______–</p><p>37. Securing endpoint devices is one of the most challenging jobs of a network administrator, because it involves human nature. What must a company have to accomplish this task?</p><p>38. Endpoint security also requires securing Layer 2 devices in the network infrastructure to prevent against Layer 2 attacks such as MAC address spoofing, MAC address table overflow attacks, and LAN storm attacks. This is known as:</p><p>39. What are some simple steps that should be taken that apply to most operating systems?</p><p> a. </p><p> b. </p><p> c. </p><p>40. To protect network devices, it is important to use strong passwords. What are standard guidelines for creating strong passwords?</p><p> a. </p><p> b. </p><p> c. </p><p>10 d. </p><p> e. </p><p> f. </p><p>41. Which Cisco IOS command prevents unauthorized individuals from viewing passwords in plaintext in the configuration file?</p><p>42. Which Cisco IOS command ensures that all configured passwords are a minimum of a specified length?</p><p>43. Telnet is an unsecure method of accessing a Cisco device “in band”. What is a better method?</p><p>11.3 Basic Network Performance</p><p>44. Which command is an effective way to test connectivity?</p><p>45. A ping issued from the IOS will yield one of several indications for each ICMP echo that was sent. List and explain the most common indicators. a. ______–</p><p> b. ______–</p><p>Cisco Semester 1 – Introduction to Networks 5.0 11 Mark Rawlings Chapter 11 Saint Paul College c. ______–</p><p>46. Explain what pinging the loopback address 127.0.0.1 does.</p><p>47. Why would a network administrator enter a longer timeout period than the default when running an extended ping from a router?</p><p>48. What is a network baseline?</p><p>49. What does the Microsoft command tracert or the Cisco IOS command traceroute accomplish?</p><p>50. Network technicians use show commands extensively for:</p><p> a. </p><p> b. </p><p> c. </p><p>51. List some of the most popular Cisco IOS show commands.</p><p> a. </p><p> b. </p><p> c. </p><p> d. </p><p> e. </p><p> f. </p><p>12 52. List the output from the show version command.</p><p> a. </p><p> b. </p><p> c. </p><p> d. </p><p> e. </p><p> f. </p><p> g. </p><p> h. </p><p>53. What does the show version command on a switch display?</p><p>54. What information does the ipconfig command give you?</p><p> a. </p><p> b. </p><p> c. </p><p>55. What is the purpose of the arp command?</p><p>56. Explain what happens when a Cisco device boots up and has CDP enabled.</p><p>57. List and explain what information CDP provides about each CDP neighbor device.</p><p> a. ______–</p><p>Cisco Semester 1 – Introduction to Networks 5.0 13 Mark Rawlings Chapter 11 Saint Paul College b. ______–</p><p> c. ______–</p><p> d. ______–</p><p> e. ______–</p><p>58. What does the show cdp neighbors detail command reveal about a neighboring device?</p><p>59. What command can you use to disable CDP globally?</p><p>60. What does the show ip interface brief output display?</p><p> a. </p><p> b. </p><p> c. </p><p>11.4 Managing IOS Configuration Files</p><p>62. What is the purpose of the Cisco IOS File System (IFS)?</p><p>63. Which command can be used to view the file systems on a Catalyst switch or Cisco router?</p><p>64. Configuration files can be saved/archived to a text file using Tera Term. What are the steps involved?</p><p>Step 1. </p><p>Step 2. </p><p>14 Step 3. </p><p>Step 4. </p><p>Step 5. </p><p>65. Where can backup configuration files can be stored?</p><p> a. </p><p> b. </p><p>66. To be compatible with a Cisco router, a USB flash drive must be formatted in a ______format.</p><p>67. When backing up to a USB port, it is a good idea to issue the ______command to verify that the USB drive is there and confirm the name</p><p>68. What command do you use to copy the configuration file to the USB flash drive?</p><p>11.5 Integrated Routing Services</p><p>69. What is an integrated router (ISR)?</p><p>70. What is a wireless SSID?</p><p>71. How can you have multiple ISRs operate in close proximity?</p><p>72. What are some basic security measures you can take with and ISR?</p><p>Cisco Semester 1 – Introduction to Networks 5.0 15 Mark Rawlings Chapter 11 Saint Paul College a. </p><p> b. </p><p> c. </p><p>73. What is WEP?</p><p>74. Why is WPA a better choice than WEP?</p><p>75. Other security implementations that can be configured on a wireless AP include:</p><p> a. </p><p> b. </p><p> c. </p><p>16</p>
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages16 Page
-
File Size-