Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






2. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






3. Layer 7






4. Major Version






5. 1300-1999






6. TCP Port 80






7. 2000-2699






8. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






9. Provides nonrepudiation - ensuring that traffic is from a trusted party






10. Local and Remote






11. Layer 3






12. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






13. Two FIN bits or one RST bit






14. Time can be changed - Routing Table can be killed






15. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






16. Can stop spoofed IP addresses






17. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






18. Private IP address after translation






19. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






20. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






21. 2000-2699






22. Command used to disable HTTP Server






23. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






24. What Tunnel Mode is used for






25. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


26. Can discover vulnerabilities - network stats - and firewall discovery






27. Layer 3






28. Public IP address before translation






29. Layer 5






30. DENY IP 224.0.0.0 15.255.255.255 ANY






31. Layer 3






32. DENY IP <Network ID> <Network WC Mask> ANY






33. UDP Port 1701






34. Command to disable UDP small server on a router






35. Release Train Identifier






36. Refers to the organization's private network






37. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






38. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






39. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






40. Startup-config can be deleted - copied - changed






41. Refers to addresses used on the organization's private network






42. None - uses attach application protocol's layer






43. DNS Poisoning






44. PERMIT TCP ANY ANY ESTABLISHED






45. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






46. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






47. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






48. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






49. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






50. Protects against repeating of secure sessions