Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 0-99






2. Two FIN bits or one RST bit






3. DENY IP ANY HOST <Broadcast Address>






4. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






5. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






6. Command to disable UDP small server on a router






7. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






8. PERMIT TCP ANY ANY ESTABLISHED






9. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






10. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






11. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






12. DENY IP 224.0.0.0 15.255.255.255 ANY






13. Uses SSL port 443






14. Authentication Header (AH) and Encapsulated Security Payload (ESP)






15. Layer 7






16. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






17. Release Number






18. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






19. War dialing






20. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






21. Refers to the organization's private network






22. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






23. DNS Poisoning






24. 0x32 - or 50






25. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






26. Geolocational positioning






27. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






28. Release Train Identifier






29. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






30. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






31. Command to disable TCP small server on a router






32. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






33. Provides confidentiality - so it cannot be read by unauthorized parties






34. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






35. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






36. TCP Port 22






37. What Transport Mode is used for






38. Privilege level that has Global administration capabilities






39. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






40. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






41. 33400-34400






42. Layer 5






43. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






44. Private IP address after translation






45. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






46. DENY IP 127.0.0.0 0.255.255.255 ANY






47. UDP Port 514






48. Command to disable BOOTP Server






49. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






50. Uses server and host keys to authenticate systems






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests