Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Transport and Tunnel






2. TCP and UDP Port 161






3. Uses SSL port 443






4. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






5. What Local and Global refer to in NAT






6. Protocol used to keep their time-of-day clocks accurate and in sync






7. Ip access-list <standard | extended> name - permit TCP any any established






8. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






9. TCP Port 80






10. DENY TCP ANY HOST <IP Address> EQ 23






11. None - uses attach application protocol's layer






12. UDP Port 514






13. Layer 5






14. Routing mode depended on by uRPF in order to function






15. Minor Version






16. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






17. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






18. Access - Distribution - Core






19. PERMIT TCP ANY ANY ESTABLISHED






20. None - uses attached application protocol's port






21. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






22. Startup-config can be deleted - copied - changed






23. ESP - SSH - SSL/TLP






24. Privilege level that has Global administration capabilities






25. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






26. Router to Router Denial of Service






27. Layer 7






28. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






29. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


30. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






31. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






32. What Tunnel Mode is used for






33. UDP Port 1701






34. Two - one Inbound or Evaluated and one Outbound or Reflected






35. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






36. Command to disable TCP small server on a router






37. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






38. 2000-2699






39. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






40. Command used to disable HTTP Server






41. Command to disable BOOTP Server






42. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






43. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






44. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






45. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






46. Plaintext






47. DENY IP ANY HOST <Broadcast Address>






48. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






49. Rebuild Number






50. No Known Vulnerability