Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses server and host keys to authenticate systems






2. Geolocational positioning






3. Local and Remote






4. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






5. Users - Host PC's - IP Addresses






6. Transport and Tunnel






7. Interim Build Number






8. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






9. ESP - SSH - SSL/TLP






10. Command used to disable HTTP Server






11. Layer 3






12. Uses SSL port 443






13. Allows the source IP host to specify a route through the IP network






14. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






15. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






16. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






17. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






18. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






19. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






20. Protocol used to keep their time-of-day clocks accurate and in sync






21. What Local and Global refer to in NAT






22. These ACLs filter by network or host IP address and only filter on source






23. Startup-config can be deleted - copied - changed






24. Uses only host keys to authenticate systems






25. Rebuild Number






26. Traffic is passed in plaintext






27. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






28. Forces the user to enter both a valid username and password






29. The environment - catastrophic events an unauthorized access






30. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






31. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






32. Time can be changed - Routing Table can be killed






33. Refers to addresses used on the organization's private network






34. Device - Hostname - IOS - IP Address - Ports - Model






35. 0x2F - or 47






36. Layer 7






37. Command used to disable NTP on an interface






38. Plaintext






39. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


40. Smurf attacks - can enumerate the network






41. Commands to disable Finger Server






42. Refers to the addresses on the public internet






43. Public IP address after translation






44. 2000-2699






45. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






46. Layer 5






47. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






48. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






49. Ip access-list <standard | extended> name - permit TCP any any established






50. Local IP address before translation