Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. None - uses attach application protocol's layer






2. 0x33 or 51






3. Authentication Header (AH) and Encapsulated Security Payload (ESP)






4. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






5. 2000-2699






6. 2000-2699






7. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






8. Command to disable BOOTP Server






9. TCP Port 80






10. UDP Port 514






11. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






12. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






13. Provides nonrepudiation - ensuring that traffic is from a trusted party






14. Can obtain CIDR and router ID






15. PERMIT TCP ANY ANY ESTABLISHED






16. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






17. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






18. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






19. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






20. Router to Router Denial of Service






21. 33400-34400






22. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






23. Uses only host keys to authenticate systems






24. Layer 3






25. Startup-config can be deleted - copied - changed






26. Command used to disable the ICMP message Host Unreachable






27. The environment - catastrophic events an unauthorized access






28. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






29. Protects against repeating of secure sessions






30. Access-list <number> <deny | permit> source source-wildcard log






31. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






32. Command used to disable NTP on an interface






33. No Known Vulnerability






34. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






35. 1300-1999






36. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






37. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






38. Minor Version






39. Interim Build Number






40. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






41. Two - one Inbound or Evaluated and one Outbound or Reflected






42. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






43. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






44. Command to disable UDP small server on a router






45. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






46. Command to disable TCP small server on a router






47. Refers to addresses used on the organization's private network






48. Uses server and host keys to authenticate systems






49. Protocol used to keep their time-of-day clocks accurate and in sync






50. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered