Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 7






2. Authentication Header (AH) and Encapsulated Security Payload (ESP)






3. Minor Version






4. Uses only host keys to authenticate systems






5. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






6. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






7. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






8. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






9. Interim Build Number






10. These ACLs filter by network or host IP address and only filter on source






11. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






12. 0-99






13. The host can specify which route to take - which bypasses security






14. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






15. Routing mode depended on by uRPF in order to function






16. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






17. Refers to the organization's private network






18. Command used to disable HTTP Server






19. 0x33 or 51






20. Startup-config can be deleted - copied - changed






21. Buffer Overflow






22. Command to disable UDP small server on a router






23. TCP and UDP Port 161






24. Uses server and host keys to authenticate systems






25. War dialing






26. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






27. Protocol used to keep their time-of-day clocks accurate and in sync






28. Command used to disable the ICMP message Redirect






29. Layer 3






30. ESP - SSH - SSL/TLP






31. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






32. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






33. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


34. Refers to addresses used on the organization's private network






35. Transport and Tunnel






36. Provides a checksum - ensuring traffic has not been modified along it's path






37. None - uses attached application protocol's port






38. Public IP address before translation






39. Release Number






40. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






41. Time can be changed - Routing Table can be killed






42. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






43. Provides nonrepudiation - ensuring that traffic is from a trusted party






44. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






45. TCP Port 22






46. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






47. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






48. No Known Vulnerability






49. Mode where only the payload of the IP packet is encrypted and/or authenticated






50. 0x2F - or 47