Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can copy - poison - corrupt - or delete the IOS






2. Time can be changed - Routing Table can be killed






3. Traffic is passed in plaintext






4. Users - Host PC's - IP Addresses






5. Uses SSL port 443






6. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


7. Privilege level that has Global administration capabilities






8. Refers to the organization's private network






9. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






10. TCP and UDP Port 161






11. TCP and UDP Port 162






12. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






13. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


14. Can discover vulnerabilities - network stats - and firewall discovery






15. Transport and Tunnel






16. Command to disable TCP small server on a router






17. Privilege level that is restricted to basic level operations






18. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






19. Smurf attacks - can enumerate the network






20. UDP Port 514






21. War dialing






22. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






23. Minor Version






24. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






25. Protocol used to keep their time-of-day clocks accurate and in sync






26. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






27. Access-list <number> <deny | permit> source source-wildcard log






28. DENY IP 224.0.0.0 15.255.255.255 ANY






29. 2000-2699






30. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






31. Interim Build Number






32. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






33. TCP Port 80






34. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






35. Plaintext






36. Command used to disable the ICMP message Address Mask Reply






37. Startup-config can be deleted - copied - changed






38. Router threat where access by an entity or individual other than authorized users






39. Command to disable CDP on a router






40. Layer 7






41. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






42. DENY IP 127.0.0.0 0.255.255.255 ANY






43. Can obtain CIDR and router ID






44. Release Train Identifier






45. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






46. Provides confidentiality - so it cannot be read by unauthorized parties






47. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






48. PERMIT TCP ANY ANY ESTABLISHED






49. Forces the user to enter both a valid username and password






50. TCP Port 22