Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






2. Command to disable BOOTP Server






3. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






4. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






5. Router to Router Denial of Service






6. TCP and UDP Port 162






7. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






8. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






9. 2000-2699






10. The environment - catastrophic events an unauthorized access






11. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






12. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






13. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






14. Rebuild Number






15. TCP and UDP Port 161






16. Can obtain CIDR and router ID






17. Public IP address before translation






18. None - uses attach application protocol's layer






19. Layer 3






20. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






21. Breaks LAN security perimeter extends LAN to Layer 2






22. Command used to disable the ICMP message Redirect






23. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






24. Uses SSL port 443






25. PERMIT TCP ANY ANY ESTABLISHED






26. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






27. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






28. Refers to addresses used on the organization's private network






29. What Tunnel Mode is used for






30. Provides confidentiality - so it cannot be read by unauthorized parties






31. War dialing






32. Release Train Identifier






33. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






34. None - uses attached application protocol's port






35. DENY IP 224.0.0.0 15.255.255.255 ANY






36. TCP Port 80






37. Mode where only the payload of the IP packet is encrypted and/or authenticated






38. Plaintext






39. Allows the source IP host to specify a route through the IP network






40. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






41. Traffic is passed in plaintext






42. Command to disable UDP small server on a router






43. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






44. Protects against repeating of secure sessions






45. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






46. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






47. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






48. The host can specify which route to take - which bypasses security






49. This server is used for querying a host about its logged in users






50. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP