Question: Chapter 1 Assignment 1.1 Explain TCP/IP Transport Layer Features? 1.2 Write Popular Applications and Their Well-Known Port Numbers? Port Number Protocol Application FTP Control Telnet

Chapter 1 Assignment

1.1 Explain TCP/IP Transport Layer Features?

1.2 Write Popular Applications and Their Well-Known Port Numbers?

Port Number Protocol Application

FTP Control

Telnet

DNS POP3

1.3 Explain steps of three-way Handshake process of TCP connection establishment?

Message Description

SYN-ACK

1.4 Differentiate Connection-oriented and connectionless protocols?

Connection-oriented Service Connection-less Service

2. 4.

FTP Data

SSH

SMTP

HTTP

SSL

SYN

ACK

1.

3.

5.

Chapter 2 Assignment

2.1 Differentiate Standard and Extended ACLs?

2.2 What is the rule when matching a subset of address with wildcard 0.0.0.255?

  • Decimal 0 :

  • Decimal 255 :

    2.3 Write command structure to implement standard ACL on a device?

2.4 What commands can be used to verify implementation of ACL is on a device?

Chapter 3 Assignment

3.1 Write Extended ACLs syntax with required fields.

3.2 Explain following Extended access-list Commands highlighted matching Parameters?

Access-list Statement What it matches?

access-list 101 deny

access-list 101 deny

3.3 What points should be kept in mind when configuring ACLs?

access-list 101 deny

tcp any any

udp any any

access-list 101 deny

icmp any any

ip host 1.1.1.1 host 2.2.2.2

access-list 101 deny

udp 1.1.1.0 0.0.0.255 any

Chapter 4 Assignment

4.1 Explain different security threats?

Spoofing Attack

Reflection Attack

Man-in-the-Middle Attacks

Buffer Overflow Attacks

4.2 Define Malwares give examples.

Denial-of-Service (DoS) Attack

Amplification Attack

Reconnaissance Attacks

4.3 What does AAA stand for in Security?

Chapter 5 Assignment

5.1 What command is used in cisco network devices to encrypt passwords?

5.2 Differentiate enable and enable secret password command?

Enable password Enable secret

1. 2. 3.

4. 5. 6.

5.3 What is a DMZ demilitarized zone?

5.4 What are main features of Cisco Next-Generation Firewalls?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!