Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DENY IP 224.0.0.0 15.255.255.255 ANY






2. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






3. Transport and Tunnel






4. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






5. Access-list <number> <deny | permit> source source-wildcard log






6. Users - Host PC's - IP Addresses






7. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






8. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






9. Refers to addresses used on the organization's private network






10. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






11. Traffic is passed in plaintext






12. Smurf attacks - can enumerate the network






13. Authentication Header (AH) and Encapsulated Security Payload (ESP)






14. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






15. ESP - SSH - SSL/TLP






16. Can discover vulnerabilities - network stats - and firewall discovery






17. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






18. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


19. 0x32 - or 50






20. 0x33 or 51






21. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






22. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






23. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






24. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






25. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






26. Command to disable TCP small server on a router






27. Provides nonrepudiation - ensuring that traffic is from a trusted party






28. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






29. Breaks LAN security perimeter extends LAN to Layer 2






30. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


31. Privilege levels that can have passwords assigned to them






32. Interim Build Number






33. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






34. Mode where only the payload of the IP packet is encrypted and/or authenticated






35. Forces the user to enter both a valid username and password






36. 0-99






37. Command to disable BOOTP Server






38. UDP Port 514






39. Command used to disable HTTP Server






40. Commands to disable Finger Server






41. Refers to addresses used on the organization's private network






42. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


43. Privilege level that has Global administration capabilities






44. Router to Router Denial of Service






45. ACK and RST






46. TCP and UDP Port 161






47. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






48. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






49. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






50. Device - Hostname - IOS - IP Address - Ports - Model