Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






2. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






3. Mode where only the payload of the IP packet is encrypted and/or authenticated






4. Layer 5






5. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






6. Layer 7






7. ESP - SSH - SSL/TLP






8. War dialing






9. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






10. Commands to disable Finger Server






11. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






12. Two FIN bits or one RST bit






13. What Inside and Outside refer to in NAT






14. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






15. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






16. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






17. Router to Router Denial of Service






18. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






19. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






20. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






21. Command used to disable the ICMP message Host Unreachable






22. DENY TCP ANY HOST <IP Address> EQ 23






23. Command to disable UDP small server on a router






24. Command used to disable HTTP Server






25. None - uses attached application protocol's port






26. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






27. Interim Build Number






28. Public IP address after translation






29. Command used to disable the ICMP message Redirect






30. Protocol used to keep their time-of-day clocks accurate and in sync






31. Forces the user to enter both a valid username and password






32. Refers to the addresses on the public internet






33. Startup-config can be deleted - copied - changed






34. Traffic is passed in plaintext






35. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






36. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






37. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






38. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






39. 0x2F - or 47






40. Layer 3






41. Privilege level that has Global administration capabilities






42. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






43. No Known Vulnerability






44. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






45. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






46. These ACLs filter by network or host IP address and only filter on source






47. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. Time can be changed - Routing Table can be killed






49. Ip access-list <standard | extended> name - permit TCP any any established






50. Breaks LAN security perimeter extends LAN to Layer 2