Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






2. 2000-2699






3. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






4. DENY TCP ANY HOST <IP Address> EQ 23






5. 2000-2699






6. DENY IP 224.0.0.0 15.255.255.255 ANY






7. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






8. TCP and UDP Port 161






9. Refers to the addresses on the public internet






10. Forces the user to enter both a valid username and password






11. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






12. Command used to disable the ICMP message Address Mask Reply






13. Can stop spoofed IP addresses






14. Uses SSL port 443






15. Local IP address before translation






16. None - uses attached application protocol's port






17. Command to disable BOOTP Server






18. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






19. Uses server and host keys to authenticate systems






20. PERMIT TCP ANY ANY ESTABLISHED






21. TCP Port 80






22. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






23. Layer 3






24. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






25. Privilege level that has Global administration capabilities






26. Transport and Tunnel






27. Major Version






28. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






29. Provides confidentiality - so it cannot be read by unauthorized parties






30. Traffic is passed in plaintext






31. Two FIN bits or one RST bit






32. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






33. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






34. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






35. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






36. Public IP address before translation






37. 0x32 - or 50






38. Provides nonrepudiation - ensuring that traffic is from a trusted party






39. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






40. Ip access-list <standard | extended> name - permit TCP any any established






41. Geolocational positioning






42. Two - one Inbound or Evaluated and one Outbound or Reflected






43. Command to disable TCP small server on a router






44. UDP Port 514






45. Can obtain CIDR and router ID






46. Layer 7






47. No Known Vulnerability






48. Command to disable UDP small server on a router






49. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






50. Layer 7