Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Release Number






2. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






3. Command to disable BOOTP Server






4. Commands to disable Finger Server






5. DENY IP 224.0.0.0 15.255.255.255 ANY






6. 0-99






7. UDP Port 1701






8. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






9. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






10. What Tunnel Mode is used for






11. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






12. DENY TCP ANY HOST <IP Address> EQ 23






13. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






14. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






15. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






16. Buffer Overflow






17. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






18. Privilege level that is restricted to basic level operations






19. Ip access-list <standard | extended> name - permit TCP any any established






20. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






21. Allows the source IP host to specify a route through the IP network






22. Provides confidentiality - so it cannot be read by unauthorized parties






23. What Inside and Outside refer to in NAT






24. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






25. Interim Build Number






26. Device - Hostname - IOS - IP Address - Ports - Model






27. ACK and RST






28. Users - Host PC's - IP Addresses






29. Can copy - poison - corrupt - or delete the IOS






30. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






31. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






32. 0x32 - or 50






33. None - uses attached application protocol's port






34. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






35. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


36. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






37. Command used to disable the ICMP message Address Mask Reply






38. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






39. ESP - SSH - SSL/TLP






40. Layer 3






41. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. Layer 5






43. Mode where only the payload of the IP packet is encrypted and/or authenticated






44. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






45. Command to disable UDP small server on a router






46. Minor Version






47. Traffic is passed in plaintext






48. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






49. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






50. Refers to the addresses on the public internet