Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






2. Privilege level that is restricted to basic level operations






3. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






4. DENY IP 224.0.0.0 15.255.255.255 ANY






5. TCP and UDP Port 161






6. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






7. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






8. Rebuild Number






9. Command used to disable the ICMP message Redirect






10. Uses only host keys to authenticate systems






11. Smurf attacks - can enumerate the network






12. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






13. Routing mode depended on by uRPF in order to function






14. War dialing






15. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






16. What Transport Mode is used for






17. Release Number






18. Plaintext






19. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


20. DENY IP 127.0.0.0 0.255.255.255 ANY






21. UDP Port 1701






22. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






23. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






24. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






25. 0x33 or 51






26. Refers to the addresses on the public internet






27. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






28. Refers to the organization's private network






29. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






30. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






31. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






32. Users - Host PC's - IP Addresses






33. Device - Hostname - IOS - IP Address - Ports - Model






34. None - uses attached application protocol's port






35. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






36. Provides nonrepudiation - ensuring that traffic is from a trusted party






37. Public IP address after translation






38. Router threat where access by an entity or individual other than authorized users






39. Refers to addresses used on the organization's private network






40. Uses server and host keys to authenticate systems






41. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






42. Major Version






43. Allows the source IP host to specify a route through the IP network






44. Command used to disable the ICMP message Host Unreachable






45. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






46. The host can specify which route to take - which bypasses security






47. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






48. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






49. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






50. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated