Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mode where only the payload of the IP packet is encrypted and/or authenticated






2. Layer 3






3. TCP Port 22






4. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






5. DNS Poisoning






6. Local and Remote






7. Public IP address after translation






8. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






9. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






10. These ACLs filter by network or host IP address and only filter on source






11. Provides confidentiality - so it cannot be read by unauthorized parties






12. 0x2F - or 47






13. What Inside and Outside refer to in NAT






14. TCP Port 80






15. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






16. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






17. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






18. Forces the user to enter both a valid username and password






19. Routing mode depended on by uRPF in order to function






20. Refers to the organization's private network






21. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






22. 0-99






23. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






24. UDP Port 1701






25. DENY IP ANY HOST <Broadcast Address>






26. Buffer Overflow






27. Layer 7






28. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






29. Allows the source IP host to specify a route through the IP network






30. DENY IP <Network ID> <Network WC Mask> ANY






31. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






32. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






33. None - uses attach application protocol's layer






34. 0x33 or 51






35. Refers to addresses used on the organization's private network






36. No Known Vulnerability






37. Uses server and host keys to authenticate systems






38. Commands to disable Finger Server






39. DENY IP 127.0.0.0 0.255.255.255 ANY






40. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






41. What Local and Global refer to in NAT






42. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






43. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






44. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






45. Layer 5






46. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






47. What Tunnel Mode is used for






48. Protects against repeating of secure sessions






49. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






50. Command used to disable HTTP Server