Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






2. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






3. TCP Port 22






4. Can obtain CIDR and router ID






5. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






6. War dialing






7. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






8. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






9. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






10. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






11. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






12. The environment - catastrophic events an unauthorized access






13. Privilege level that is restricted to basic level operations






14. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






15. Mode where only the payload of the IP packet is encrypted and/or authenticated






16. Refers to the organization's private network






17. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






18. ACK and RST






19. The host can specify which route to take - which bypasses security






20. Command to disable CDP on a router






21. Major Version






22. This server is used for querying a host about its logged in users






23. Layer 5






24. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


25. Command to disable UDP small server on a router






26. Uses server and host keys to authenticate systems






27. These ACLs filter by network or host IP address and only filter on source






28. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






29. Uses only host keys to authenticate systems






30. Smurf attacks - can enumerate the network






31. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






32. Startup-config can be deleted - copied - changed






33. 33400-34400






34. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






35. Protects against repeating of secure sessions






36. 2000-2699






37. Plaintext






38. Interim Build Number






39. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






40. Release Number






41. Layer 3






42. Layer 7






43. Private IP address after translation






44. Command used to disable NTP on an interface






45. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


46. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


47. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






48. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






49. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






50. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user