Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. Command to disable CDP on a router






3. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






4. DENY TCP ANY HOST <IP Address> EQ 23






5. 2000-2699






6. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






7. 0x33 or 51






8. Layer 7






9. Four TCP/UDP Small Server commands recommended to disable






10. Local IP address before translation






11. Command used to disable the ICMP message Host Unreachable






12. Interim Build Number






13. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






14. DENY IP <Network ID> <Network WC Mask> ANY






15. Command used to disable NTP on an interface






16. DENY IP 127.0.0.0 0.255.255.255 ANY






17. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






18. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






19. Provides nonrepudiation - ensuring that traffic is from a trusted party






20. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






21. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






22. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






23. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






24. Release Number






25. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


26. Command used to disable HTTP Server






27. 0x2F - or 47






28. 0-99






29. Command to disable UDP small server on a router






30. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






31. This server is used for querying a host about its logged in users






32. Privilege level that is restricted to basic level operations






33. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






34. Allows the source IP host to specify a route through the IP network






35. DENY IP 224.0.0.0 15.255.255.255 ANY






36. TCP Port 22






37. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






38. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






39. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






40. Refers to addresses used on the organization's private network






41. Ip access-list <standard | extended> name - permit TCP any any established






42. Uses only host keys to authenticate systems






43. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






44. What Local and Global refer to in NAT






45. Access - Distribution - Core






46. What Tunnel Mode is used for






47. PERMIT TCP ANY ANY ESTABLISHED






48. Layer 3






49. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






50. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>