Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






2. DENY IP 127.0.0.0 0.255.255.255 ANY






3. Refers to the organization's private network






4. The host can specify which route to take - which bypasses security






5. UDP Port 1701






6. Layer 3






7. Command used to disable HTTP Server






8. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






9. Buffer Overflow






10. PERMIT TCP ANY ANY ESTABLISHED






11. Can obtain CIDR and router ID






12. DENY IP 224.0.0.0 15.255.255.255 ANY






13. Can copy - poison - corrupt - or delete the IOS






14. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






15. Router threat where access by an entity or individual other than authorized users






16. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






17. Refers to addresses used on the organization's private network






18. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






19. Uses only host keys to authenticate systems






20. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






21. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






22. Traffic is passed in plaintext






23. No Known Vulnerability






24. Local and Remote






25. Forces the user to enter both a valid username and password






26. Command to disable TCP small server on a router






27. None - uses attached application protocol's port






28. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






29. 2000-2699






30. Layer 7






31. TCP and UDP Port 161






32. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






33. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






34. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






35. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






36. The environment - catastrophic events an unauthorized access






37. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






38. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






39. Major Version






40. TCP Port 22






41. Public IP address before translation






42. Two FIN bits or one RST bit






43. Access-list <number> <deny | permit> source source-wildcard log






44. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






46. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






47. DENY IP <Network ID> <Network WC Mask> ANY






48. DENY TCP ANY HOST <IP Address> EQ 23






49. Private IP address after translation






50. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address