Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






2. This server is used for querying a host about its logged in users






3. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






4. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


5. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






6. The host can specify which route to take - which bypasses security






7. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






8. Command to disable UDP small server on a router






9. What Transport Mode is used for






10. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






11. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






12. Plaintext






13. TCP Port 22






14. Routing mode depended on by uRPF in order to function






15. Interim Build Number






16. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


17. Release Number






18. 0x2F - or 47






19. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






20. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






21. Layer 7






22. UDP Port 1701






23. Four TCP/UDP Small Server commands recommended to disable






24. Private IP address after translation






25. Uses SSL port 443






26. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






27. Can copy - poison - corrupt - or delete the IOS






28. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. Minor Version






30. Provides nonrepudiation - ensuring that traffic is from a trusted party






31. Can discover vulnerabilities - network stats - and firewall discovery






32. 2000-2699






33. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






34. PERMIT TCP ANY ANY ESTABLISHED






35. Release Train Identifier






36. What Inside and Outside refer to in NAT






37. Transport and Tunnel






38. Authentication Header (AH) and Encapsulated Security Payload (ESP)






39. Local and Remote






40. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






41. Can stop spoofed IP addresses






42. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






43. Access - Distribution - Core






44. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






45. Public IP address before translation






46. Command to disable BOOTP Server






47. Two FIN bits or one RST bit






48. Startup-config can be deleted - copied - changed






49. Ip access-list <standard | extended> name - permit TCP any any established






50. These ACLs filter by network or host IP address and only filter on source