Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






2. ACK and RST






3. Public IP address before translation






4. Major Version






5. None - uses attached application protocol's port






6. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






7. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






8. Can obtain CIDR and router ID






9. None - uses attach application protocol's layer






10. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






11. Command to disable TCP small server on a router






12. UDP Port 1701






13. Time can be changed - Routing Table can be killed






14. Uses only host keys to authenticate systems






15. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






16. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






17. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






18. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






19. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






20. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


21. DENY TCP ANY HOST <IP Address> EQ 23






22. Router threat where access by an entity or individual other than authorized users






23. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






24. Command used to disable the ICMP message Redirect






25. 33400-34400






26. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






27. Minor Version






28. DENY IP 224.0.0.0 15.255.255.255 ANY






29. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


30. Command used to disable the ICMP message Address Mask Reply






31. Ip access-list <standard | extended> name - permit TCP any any established






32. What Local and Global refer to in NAT






33. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






34. 0x32 - or 50






35. Layer 7






36. Two - one Inbound or Evaluated and one Outbound or Reflected






37. Layer 7






38. Smurf attacks - can enumerate the network






39. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






40. The environment - catastrophic events an unauthorized access






41. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






42. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






43. Can discover vulnerabilities - network stats - and firewall discovery






44. What Tunnel Mode is used for






45. Plaintext






46. Privilege level that is restricted to basic level operations






47. Mode where only the payload of the IP packet is encrypted and/or authenticated






48. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


49. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






50. Interim Build Number