Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two - one Inbound or Evaluated and one Outbound or Reflected






2. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






3. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






4. DNS Poisoning






5. Privilege level that has Global administration capabilities






6. 0-99






7. Command used to disable NTP on an interface






8. Refers to addresses used on the organization's private network






9. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






10. Command to disable UDP small server on a router






11. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






12. Command used to disable HTTP Server






13. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






14. TCP and UDP Port 162






15. Release Train Identifier






16. 0x33 or 51






17. Four TCP/UDP Small Server commands recommended to disable






18. Layer 3






19. Router to Router Denial of Service






20. The host can specify which route to take - which bypasses security






21. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






22. Can stop spoofed IP addresses






23. Public IP address after translation






24. DENY IP ANY HOST <Broadcast Address>






25. Two FIN bits or one RST bit






26. Uses server and host keys to authenticate systems






27. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






28. What Tunnel Mode is used for






29. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






30. Access-list <number> <deny | permit> source source-wildcard log






31. Rebuild Number






32. Protocol used to keep their time-of-day clocks accurate and in sync






33. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






34. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






35. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






36. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






37. 0x32 - or 50






38. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






39. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






40. Users - Host PC's - IP Addresses






41. Layer 7






42. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






43. This server is used for querying a host about its logged in users






44. Minor Version






45. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






46. Provides confidentiality - so it cannot be read by unauthorized parties






47. The environment - catastrophic events an unauthorized access






48. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






49. Provides nonrepudiation - ensuring that traffic is from a trusted party






50. Uses SSL port 443