Question: Chapter 1 Assignment 1.1 Explain TCP/IP Transport Layer Features? 1.2 Write Popular Applications and Their Well-Known Port Numbers? Port Number Protocol Application FTP Control Telnet
Chapter 1 Assignment
1.1 Explain TCP/IP Transport Layer Features?
1.2 Write Popular Applications and Their Well-Known Port Numbers?
Port Number Protocol Application
FTP Control
Telnet
DNS POP3
1.3 Explain steps of three-way Handshake process of TCP connection establishment?
Message Description
SYN-ACK
1.4 Differentiate Connection-oriented and connectionless protocols?
Connection-oriented Service Connection-less Service
2. 4.
| FTP Data |
| SSH |
| SMTP |
| HTTP |
| SSL |
| SYN |
| ACK |
| 1. |
| 3. |
| 5. |
Chapter 2 Assignment
2.1 Differentiate Standard and Extended ACLs?
2.2 What is the rule when matching a subset of address with wildcard 0.0.0.255?
-
Decimal 0 :
-
Decimal 255 :
2.3 Write command structure to implement standard ACL on a device?
2.4 What commands can be used to verify implementation of ACL is on a device?
Chapter 3 Assignment
3.1 Write Extended ACLs syntax with required fields.
3.2 Explain following Extended access-list Commands highlighted matching Parameters?
Access-list Statement What it matches?
access-list 101 deny
access-list 101 deny
3.3 What points should be kept in mind when configuring ACLs?
access-list 101 deny
tcp any any
udp any any
access-list 101 deny
icmp any any
ip host 1.1.1.1 host 2.2.2.2
access-list 101 deny
udp 1.1.1.0 0.0.0.255 any
Chapter 4 Assignment
4.1 Explain different security threats?
Spoofing Attack
Reflection Attack
Man-in-the-Middle Attacks
Buffer Overflow Attacks
4.2 Define Malwares give examples.
| Denial-of-Service (DoS) Attack |
| Amplification Attack |
| Reconnaissance Attacks |
4.3 What does AAA stand for in Security?
Chapter 5 Assignment
5.1 What command is used in cisco network devices to encrypt passwords?
5.2 Differentiate enable and enable secret password command?
Enable password Enable secret
| 1. 2. 3. | |
| 4. 5. 6. |
5.3 What is a DMZ demilitarized zone?
5.4 What are main features of Cisco Next-Generation Firewalls?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
