Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Four TCP/UDP Small Server commands recommended to disable






2. TCP Port 22






3. Users - Host PC's - IP Addresses






4. What Tunnel Mode is used for






5. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






6. These ACLs filter by network or host IP address and only filter on source






7. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






8. Command to disable CDP on a router






9. Startup-config can be deleted - copied - changed






10. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






11. Layer 3






12. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






13. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






14. Forces the user to enter both a valid username and password






15. Provides confidentiality - so it cannot be read by unauthorized parties






16. 0x2F - or 47






17. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






18. Privilege level that is restricted to basic level operations






19. What Local and Global refer to in NAT






20. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






21. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






22. Commands to disable Finger Server






23. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






24. TCP and UDP Port 162






25. PERMIT TCP ANY ANY ESTABLISHED






26. Privilege level that has Global administration capabilities






27. 33400-34400






28. War dialing






29. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






30. Can copy - poison - corrupt - or delete the IOS






31. Traffic is passed in plaintext






32. None - uses attached application protocol's port






33. Access - Distribution - Core






34. Command used to disable the ICMP message Redirect






35. Layer 5






36. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






37. Time can be changed - Routing Table can be killed






38. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






39. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






40. Rebuild Number






41. ESP - SSH - SSL/TLP






42. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






43. Release Train Identifier






44. Geolocational positioning






45. What Transport Mode is used for






46. Public IP address after translation






47. DNS Poisoning






48. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






49. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






50. UDP Port 514