Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The host can specify which route to take - which bypasses security






2. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






3. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






4. Layer 3






5. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






6. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






7. Startup-config can be deleted - copied - changed






8. Command to disable BOOTP Server






9. DNS Poisoning






10. Transport and Tunnel






11. Layer 3






12. DENY IP 127.0.0.0 0.255.255.255 ANY






13. Can obtain CIDR and router ID






14. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






15. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






16. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






17. Can discover vulnerabilities - network stats - and firewall discovery






18. This server is used for querying a host about its logged in users






19. Can copy - poison - corrupt - or delete the IOS






20. Privilege levels that can have passwords assigned to them






21. Uses SSL port 443






22. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






23. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


24. Router threat where access by an entity or individual other than authorized users






25. What Inside and Outside refer to in NAT






26. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






27. 0x32 - or 50






28. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






29. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






30. ACK and RST






31. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






32. Commands to disable Finger Server






33. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


34. ESP - SSH - SSL/TLP






35. Users - Host PC's - IP Addresses






36. Protocol used to keep their time-of-day clocks accurate and in sync






37. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






38. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






39. Layer 7






40. DENY TCP ANY HOST <IP Address> EQ 23






41. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






42. Major Version






43. Local and Remote






44. Release Train Identifier






45. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






46. 0x33 or 51






47. UDP Port 1701






48. Forces the user to enter both a valid username and password






49. War dialing






50. Access - Distribution - Core