Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Access-list <number> <deny | permit> source source-wildcard log






2. Protects against repeating of secure sessions






3. Local IP address before translation






4. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






5. Traffic is passed in plaintext






6. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






7. Can stop spoofed IP addresses






8. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






9. Refers to the addresses on the public internet






10. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






11. 1300-1999






12. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






13. DNS Poisoning






14. Command to disable UDP small server on a router






15. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






16. None - uses attach application protocol's layer






17. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






18. Layer 3






19. Privilege level that is restricted to basic level operations






20. Layer 3






21. TCP Port 80






22. UDP Port 1701






23. Protocol used to keep their time-of-day clocks accurate and in sync






24. Provides confidentiality - so it cannot be read by unauthorized parties






25. Two FIN bits or one RST bit






26. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






27. DENY IP 224.0.0.0 15.255.255.255 ANY






28. What Local and Global refer to in NAT






29. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






30. Two - one Inbound or Evaluated and one Outbound or Reflected






31. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






32. Broadcast


33. Layer 5






34. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






35. Release Number






36. Command used to disable HTTP Server






37. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






38. 0x33 or 51






39. This server is used for querying a host about its logged in users






40. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






41. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






42. Provides nonrepudiation - ensuring that traffic is from a trusted party






43. 0-99






44. PERMIT TCP ANY ANY ESTABLISHED






45. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






46. What Inside and Outside refer to in NAT






47. Router threat where access by an entity or individual other than authorized users






48. Command to disable TCP small server on a router






49. Interim Build Number






50. Breaks LAN security perimeter extends LAN to Layer 2