Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






2. Startup-config can be deleted - copied - changed






3. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






4. Layer 3






5. Local IP address before translation






6. War dialing






7. Command used to disable the ICMP message Host Unreachable






8. Transport and Tunnel






9. Authentication Header (AH) and Encapsulated Security Payload (ESP)






10. Can discover vulnerabilities - network stats - and firewall discovery






11. Router to Router Denial of Service






12. None - uses attached application protocol's port






13. Command to disable BOOTP Server






14. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






15. Refers to the addresses on the public internet






16. This server is used for querying a host about its logged in users






17. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


18. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






19. Public IP address before translation






20. Command used to disable the ICMP message Address Mask Reply






21. Buffer Overflow






22. Layer 3






23. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






24. DENY IP 224.0.0.0 15.255.255.255 ANY






25. Plaintext






26. Uses SSL port 443






27. These ACLs filter by network or host IP address and only filter on source






28. Interim Build Number






29. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


30. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






31. Routing mode depended on by uRPF in order to function






32. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






33. What Local and Global refer to in NAT






34. Access-list <number> <deny | permit> source source-wildcard log






35. Layer 7






36. Release Number






37. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






38. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






39. Access - Distribution - Core






40. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






41. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. Layer 5






43. Command used to disable the ICMP message Redirect






44. Commands to disable Finger Server






45. Release Train Identifier






46. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






47. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






48. Public IP address after translation






49. Layer 3






50. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network