Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 3






2. Access - Distribution - Core






3. Provides a checksum - ensuring traffic has not been modified along it's path






4. Layer 7






5. Router to Router Denial of Service






6. The host can specify which route to take - which bypasses security






7. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






8. Layer 5






9. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






10. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






11. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






12. Mode where only the payload of the IP packet is encrypted and/or authenticated






13. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






14. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






15. Users - Host PC's - IP Addresses






16. Breaks LAN security perimeter extends LAN to Layer 2






17. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






18. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






19. Startup-config can be deleted - copied - changed






20. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






21. 2000-2699






22. Protocol used to keep their time-of-day clocks accurate and in sync






23. Two - one Inbound or Evaluated and one Outbound or Reflected






24. Uses only host keys to authenticate systems






25. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






26. Four TCP/UDP Small Server commands recommended to disable






27. DENY IP 127.0.0.0 0.255.255.255 ANY






28. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






29. Router threat where access by an entity or individual other than authorized users






30. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


31. Provides nonrepudiation - ensuring that traffic is from a trusted party






32. ACK and RST






33. Release Train Identifier






34. Refers to addresses used on the organization's private network






35. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






36. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






37. Interim Build Number






38. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






39. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


40. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






41. TCP Port 22






42. UDP Port 1701






43. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






44. Rebuild Number






45. Access-list <number> <deny | permit> source source-wildcard log






46. Geolocational positioning






47. Can stop spoofed IP addresses






48. Device - Hostname - IOS - IP Address - Ports - Model






49. Two FIN bits or one RST bit






50. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number