Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Major Version






2. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






3. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






4. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






5. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






6. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






7. Can stop spoofed IP addresses






8. Access - Distribution - Core






9. DENY IP 127.0.0.0 0.255.255.255 ANY






10. Geolocational positioning






11. Provides a checksum - ensuring traffic has not been modified along it's path






12. Privilege levels that can have passwords assigned to them






13. Command used to disable the ICMP message Host Unreachable






14. Smurf attacks - can enumerate the network






15. Local IP address before translation






16. PERMIT TCP ANY ANY ESTABLISHED






17. Mode where only the payload of the IP packet is encrypted and/or authenticated






18. Uses SSL port 443






19. The host can specify which route to take - which bypasses security






20. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


21. ESP - SSH - SSL/TLP






22. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






23. Routing mode depended on by uRPF in order to function






24. Local and Remote






25. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






26. Authentication Header (AH) and Encapsulated Security Payload (ESP)






27. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






28. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






29. Layer 3






30. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






31. Device - Hostname - IOS - IP Address - Ports - Model






32. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






33. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






34. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






35. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






36. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


37. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






38. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






39. 0x2F - or 47






40. Access-list <number> <deny | permit> source source-wildcard log






41. Layer 3






42. UDP Port 514






43. 33400-34400






44. Provides confidentiality - so it cannot be read by unauthorized parties






45. Refers to addresses used on the organization's private network






46. Privilege level that is restricted to basic level operations






47. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






48. Plaintext






49. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






50. DENY IP 224.0.0.0 15.255.255.255 ANY