Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Command used to disable NTP on an interface






2. UDP Port 514






3. DENY IP <Network ID> <Network WC Mask> ANY






4. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






5. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






6. Release Train Identifier






7. Provides nonrepudiation - ensuring that traffic is from a trusted party






8. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






9. 33400-34400






10. Layer 7






11. Uses SSL port 443






12. Public IP address before translation






13. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






14. Plaintext






15. Authentication Header (AH) and Encapsulated Security Payload (ESP)






16. TCP Port 22






17. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






18. Interim Build Number






19. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






20. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






21. This server is used for querying a host about its logged in users






22. Provides a checksum - ensuring traffic has not been modified along it's path






23. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






24. Command to disable BOOTP Server






25. TCP Port 80






26. What Transport Mode is used for






27. Access - Distribution - Core






28. Forces the user to enter both a valid username and password






29. ESP - SSH - SSL/TLP






30. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






31. UDP Port 1701






32. Refers to the addresses on the public internet






33. Broadcast


34. Local IP address before translation






35. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






36. Command to disable CDP on a router






37. Layer 7






38. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






39. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






40. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






41. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






42. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






43. Access-list <number> <deny | permit> source source-wildcard log






44. None - uses attached application protocol's port






45. 0x33 or 51






46. 2000-2699






47. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






48. Two - one Inbound or Evaluated and one Outbound or Reflected






49. Protocol used to keep their time-of-day clocks accurate and in sync






50. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers