Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






2. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






3. DNS Poisoning






4. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






5. What Local and Global refer to in NAT






6. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






7. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






8. Privilege level that has Global administration capabilities






9. DENY IP 127.0.0.0 0.255.255.255 ANY






10. Command to disable TCP small server on a router






11. UDP Port 1701






12. Command used to disable the ICMP message Address Mask Reply






13. Router to Router Denial of Service






14. Users - Host PC's - IP Addresses






15. Breaks LAN security perimeter extends LAN to Layer 2






16. Refers to the organization's private network






17. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






18. Privilege level that is restricted to basic level operations






19. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






20. Commands to disable Finger Server






21. Uses server and host keys to authenticate systems






22. Two - one Inbound or Evaluated and one Outbound or Reflected






23. Provides a checksum - ensuring traffic has not been modified along it's path






24. Public IP address after translation






25. 2000-2699






26. Layer 7






27. DENY IP <Network ID> <Network WC Mask> ANY






28. Public IP address before translation






29. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






30. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






31. Forces the user to enter both a valid username and password






32. Command used to disable the ICMP message Host Unreachable






33. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






34. Can copy - poison - corrupt - or delete the IOS






35. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






36. DENY TCP ANY HOST <IP Address> EQ 23






37. Layer 5






38. None - uses attached application protocol's port






39. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


40. Access - Distribution - Core






41. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






42. 1300-1999






43. Two FIN bits or one RST bit






44. Transport and Tunnel






45. Plaintext






46. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






47. Mode where only the payload of the IP packet is encrypted and/or authenticated






48. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






49. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






50. Rebuild Number