Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can copy - poison - corrupt - or delete the IOS






2. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


3. What Inside and Outside refer to in NAT






4. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






5. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






6. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






7. Release Number






8. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






9. 1300-1999






10. Rebuild Number






11. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






12. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






13. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






14. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






15. Two - one Inbound or Evaluated and one Outbound or Reflected






16. Layer 3






17. Four TCP/UDP Small Server commands recommended to disable






18. These ACLs filter by network or host IP address and only filter on source






19. Time can be changed - Routing Table can be killed






20. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






21. Command to disable TCP small server on a router






22. Two FIN bits or one RST bit






23. Router threat where access by an entity or individual other than authorized users






24. Uses server and host keys to authenticate systems






25. Public IP address before translation






26. Command used to disable the ICMP message Host Unreachable






27. Local IP address before translation






28. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






29. Command used to disable the ICMP message Redirect






30. Users - Host PC's - IP Addresses






31. War dialing






32. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






33. ESP - SSH - SSL/TLP






34. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






35. Command used to disable HTTP Server






36. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






37. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






38. Provides a checksum - ensuring traffic has not been modified along it's path






39. Forces the user to enter both a valid username and password






40. Minor Version






41. Provides nonrepudiation - ensuring that traffic is from a trusted party






42. TCP and UDP Port 162






43. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






44. DENY IP 127.0.0.0 0.255.255.255 ANY






45. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






46. Private IP address after translation






47. Ip access-list <standard | extended> name - permit TCP any any established






48. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






49. 0x32 - or 50






50. Layer 7