Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Buffer Overflow






2. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






3. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






4. Smurf attacks - can enumerate the network






5. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






6. Can copy - poison - corrupt - or delete the IOS






7. Command used to disable the ICMP message Address Mask Reply






8. Refers to the organization's private network






9. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






10. Command used to disable NTP on an interface






11. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






12. Can stop spoofed IP addresses






13. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






14. 33400-34400






15. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






16. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






17. Plaintext






18. What Local and Global refer to in NAT






19. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






20. Device - Hostname - IOS - IP Address - Ports - Model






21. What Tunnel Mode is used for






22. PERMIT TCP ANY ANY ESTABLISHED






23. Interim Build Number






24. Uses only host keys to authenticate systems






25. DENY IP ANY HOST <Broadcast Address>






26. This server is used for querying a host about its logged in users






27. 0x2F - or 47






28. Command to disable CDP on a router






29. Command used to disable the ICMP message Redirect






30. Refers to addresses used on the organization's private network






31. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






32. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






33. 0x32 - or 50






34. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






35. Local IP address before translation






36. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






37. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






38. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


39. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






40. Minor Version






41. Private IP address after translation






42. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






43. ESP - SSH - SSL/TLP






44. Transport and Tunnel






45. What Transport Mode is used for






46. DENY IP <Network ID> <Network WC Mask> ANY






47. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






48. Command used to disable the ICMP message Host Unreachable






49. UDP Port 1701






50. TCP Port 22