Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DENY IP 224.0.0.0 15.255.255.255 ANY






2. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






3. Major Version






4. UDP Port 514






5. Interim Build Number






6. Layer 7






7. UDP Port 1701






8. Layer 3






9. What Transport Mode is used for






10. Command to disable BOOTP Server






11. Startup-config can be deleted - copied - changed






12. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






13. Router threat where access by an entity or individual other than authorized users






14. Refers to addresses used on the organization's private network






15. What Inside and Outside refer to in NAT






16. Can copy - poison - corrupt - or delete the IOS






17. Two - one Inbound or Evaluated and one Outbound or Reflected






18. DNS Poisoning






19. Command used to disable HTTP Server






20. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






21. Can stop spoofed IP addresses






22. 0x33 or 51






23. Uses SSL port 443






24. Forces the user to enter both a valid username and password






25. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


26. Commands to disable Finger Server






27. Provides a checksum - ensuring traffic has not been modified along it's path






28. Protects against repeating of secure sessions






29. Can obtain CIDR and router ID






30. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






31. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






32. Device - Hostname - IOS - IP Address - Ports - Model






33. Ip access-list <standard | extended> name - permit TCP any any established






34. Router to Router Denial of Service






35. Uses only host keys to authenticate systems






36. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






37. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


38. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






39. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






40. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






41. Layer 5






42. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






43. No Known Vulnerability






44. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






45. Command to disable UDP small server on a router






46. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






47. Can discover vulnerabilities - network stats - and firewall discovery






48. Refers to the addresses on the public internet






49. Allows the source IP host to specify a route through the IP network






50. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems