Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What Inside and Outside refer to in NAT






2. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






3. 2000-2699






4. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






5. Command to disable CDP on a router






6. Forces the user to enter both a valid username and password






7. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


8. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






9. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






10. Layer 7






11. Privilege level that is restricted to basic level operations






12. TCP and UDP Port 161






13. Breaks LAN security perimeter extends LAN to Layer 2






14. Users - Host PC's - IP Addresses






15. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






16. 2000-2699






17. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






18. Command used to disable the ICMP message Address Mask Reply






19. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






20. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






21. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






22. What Local and Global refer to in NAT






23. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


24. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






25. Geolocational positioning






26. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


27. Mode where only the payload of the IP packet is encrypted and/or authenticated






28. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






29. Two FIN bits or one RST bit






30. 1300-1999






31. Authentication Header (AH) and Encapsulated Security Payload (ESP)






32. Routing mode depended on by uRPF in order to function






33. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






34. Uses SSL port 443






35. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






36. Minor Version






37. Command to disable UDP small server on a router






38. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






39. PERMIT TCP ANY ANY ESTABLISHED






40. The host can specify which route to take - which bypasses security






41. Rebuild Number






42. Release Number






43. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






44. None - uses attached application protocol's port






45. Privilege levels that can have passwords assigned to them






46. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






47. What Transport Mode is used for






48. War dialing






49. The environment - catastrophic events an unauthorized access






50. Privilege level that has Global administration capabilities