Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Startup-config can be deleted - copied - changed






2. Local IP address before translation






3. Protocol used to keep their time-of-day clocks accurate and in sync






4. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






5. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






6. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






7. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






8. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






9. Command used to disable the ICMP message Host Unreachable






10. None - uses attach application protocol's layer






11. Service Provider


12. Layer 7






13. 33400-34400






14. Command used to disable the ICMP message Address Mask Reply






15. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






16. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






17. Command to disable BOOTP Server






18. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






19. 2000-2699






20. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






21. 1300-1999






22. Geolocational positioning






23. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






24. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






25. The environment - catastrophic events an unauthorized access






26. Command to disable CDP on a router






27. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






28. ACK and RST






29. 0x33 or 51






30. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






31. Can copy - poison - corrupt - or delete the IOS






32. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






33. Local and Remote






34. What Transport Mode is used for






35. Release Train Identifier






36. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






37. Technology


38. Four TCP/UDP Small Server commands recommended to disable






39. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






40. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






41. Broadcast


42. Command used to disable HTTP Server






43. DENY IP 127.0.0.0 0.255.255.255 ANY






44. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






45. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






46. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






47. Transport and Tunnel






48. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






49. Ip access-list <standard | extended> name - permit TCP any any established






50. Provides a checksum - ensuring traffic has not been modified along it's path