Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






2. Two FIN bits or one RST bit






3. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






4. Time can be changed - Routing Table can be killed






5. DENY IP <Network ID> <Network WC Mask> ANY






6. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






7. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






8. What Tunnel Mode is used for






9. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


10. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






11. Protocol used to keep their time-of-day clocks accurate and in sync






12. Allows the source IP host to specify a route through the IP network






13. Command to disable TCP small server on a router






14. Geolocational positioning






15. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






16. Provides confidentiality - so it cannot be read by unauthorized parties






17. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






18. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






19. Command to disable UDP small server on a router






20. 0x33 or 51






21. Can obtain CIDR and router ID






22. Buffer Overflow






23. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






24. The host can specify which route to take - which bypasses security






25. Access - Distribution - Core






26. UDP Port 1701






27. 0x2F - or 47






28. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






29. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






30. Layer 3






31. UDP Port 514






32. Startup-config can be deleted - copied - changed






33. The environment - catastrophic events an unauthorized access






34. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






35. Two - one Inbound or Evaluated and one Outbound or Reflected






36. Major Version






37. Layer 3






38. Command used to disable NTP on an interface






39. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






40. Users - Host PC's - IP Addresses






41. 0-99






42. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






43. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






44. Transport and Tunnel






45. 2000-2699






46. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






47. Command used to disable the ICMP message Address Mask Reply






48. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






49. Privilege levels that can have passwords assigned to them






50. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream