Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. None - uses attached application protocol's port






2. TCP and UDP Port 162






3. DENY IP 127.0.0.0 0.255.255.255 ANY






4. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






5. Privilege level that has Global administration capabilities






6. Rebuild Number






7. 2000-2699






8. Router to Router Denial of Service






9. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






10. 0x33 or 51






11. No Known Vulnerability






12. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






13. Interim Build Number






14. Breaks LAN security perimeter extends LAN to Layer 2






15. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






16. Authentication Header (AH) and Encapsulated Security Payload (ESP)






17. The host can specify which route to take - which bypasses security






18. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






19. Refers to addresses used on the organization's private network






20. Can discover vulnerabilities - network stats - and firewall discovery






21. PERMIT TCP ANY ANY ESTABLISHED






22. Command to disable BOOTP Server






23. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






24. Four TCP/UDP Small Server commands recommended to disable






25. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






26. 2000-2699






27. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






28. Provides nonrepudiation - ensuring that traffic is from a trusted party






29. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






30. Command used to disable HTTP Server






31. Provides a checksum - ensuring traffic has not been modified along it's path






32. Uses server and host keys to authenticate systems






33. War dialing






34. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






35. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






36. Protects against repeating of secure sessions






37. Access - Distribution - Core






38. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






39. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






40. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






41. Refers to addresses used on the organization's private network






42. 0x2F - or 47






43. DENY IP <Network ID> <Network WC Mask> ANY






44. Release Train Identifier






45. UDP Port 514






46. Minor Version






47. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






48. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






49. Service Provider


50. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet