Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Refers to addresses used on the organization's private network






2. Major Version






3. Protects against repeating of secure sessions






4. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






5. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






6. Privilege levels that can have passwords assigned to them






7. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






8. Provides confidentiality - so it cannot be read by unauthorized parties






9. War dialing






10. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






11. Buffer Overflow






12. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






13. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


14. Interim Build Number






15. This server is used for querying a host about its logged in users






16. Command used to disable the ICMP message Host Unreachable






17. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






18. These ACLs filter by network or host IP address and only filter on source






19. 2000-2699






20. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






21. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






22. DENY IP <Network ID> <Network WC Mask> ANY






23. Can copy - poison - corrupt - or delete the IOS






24. No Known Vulnerability






25. PERMIT TCP ANY ANY ESTABLISHED






26. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






27. Two FIN bits or one RST bit






28. DENY IP 224.0.0.0 15.255.255.255 ANY






29. Layer 7






30. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






31. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






32. TCP Port 80






33. 0x2F - or 47






34. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






35. UDP Port 1701






36. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






37. Mode where only the payload of the IP packet is encrypted and/or authenticated






38. Time can be changed - Routing Table can be killed






39. Privilege level that is restricted to basic level operations






40. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






41. Transport and Tunnel






42. Protocol used to keep their time-of-day clocks accurate and in sync






43. DENY TCP ANY HOST <IP Address> EQ 23






44. Routing mode depended on by uRPF in order to function






45. 0x32 - or 50






46. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






47. Provides nonrepudiation - ensuring that traffic is from a trusted party






48. UDP Port 514






49. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






50. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183