Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






2. Uses SSL port 443






3. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






4. Uses only host keys to authenticate systems






5. Breaks LAN security perimeter extends LAN to Layer 2






6. Can discover vulnerabilities - network stats - and firewall discovery






7. Command to disable BOOTP Server






8. Layer 7






9. DENY IP 127.0.0.0 0.255.255.255 ANY






10. ESP - SSH - SSL/TLP






11. TCP and UDP Port 162






12. Forces the user to enter both a valid username and password






13. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






14. Can obtain CIDR and router ID






15. The host can specify which route to take - which bypasses security






16. Command used to disable the ICMP message Address Mask Reply






17. Protocol used to keep their time-of-day clocks accurate and in sync






18. 2000-2699






19. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






20. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






21. Access-list <number> <deny | permit> source source-wildcard log






22. Refers to the organization's private network






23. Command used to disable the ICMP message Redirect






24. What Inside and Outside refer to in NAT






25. Transport and Tunnel






26. UDP Port 514






27. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






28. Layer 3






29. The environment - catastrophic events an unauthorized access






30. Ip access-list <standard | extended> name - permit TCP any any established






31. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






32. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






33. Command used to disable NTP on an interface






34. ACK and RST






35. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






36. These ACLs filter by network or host IP address and only filter on source






37. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






38. None - uses attach application protocol's layer






39. Two FIN bits or one RST bit






40. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






41. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. Local IP address before translation






43. Plaintext






44. DENY TCP ANY HOST <IP Address> EQ 23






45. DENY IP <Network ID> <Network WC Mask> ANY






46. Device - Hostname - IOS - IP Address - Ports - Model






47. Geolocational positioning






48. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






49. PERMIT TCP ANY ANY ESTABLISHED






50. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream