Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






2. Can copy - poison - corrupt - or delete the IOS






3. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






4. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






5. 2000-2699






6. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






7. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






8. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






9. Router to Router Denial of Service






10. Plaintext






11. Command to disable CDP on a router






12. Provides a checksum - ensuring traffic has not been modified along it's path






13. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






14. Layer 3






15. Local and Remote






16. What Transport Mode is used for






17. Command to disable UDP small server on a router






18. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






19. Device - Hostname - IOS - IP Address - Ports - Model






20. Allows the source IP host to specify a route through the IP network






21. Protects against repeating of secure sessions






22. Minor Version






23. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






24. Uses only host keys to authenticate systems






25. Two FIN bits or one RST bit






26. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






27. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






28. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






29. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






30. Smurf attacks - can enumerate the network






31. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






32. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






33. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


34. DENY TCP ANY HOST <IP Address> EQ 23






35. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






36. Routing mode depended on by uRPF in order to function






37. Privilege levels that can have passwords assigned to them






38. Transport and Tunnel






39. Can obtain CIDR and router ID






40. None - uses attached application protocol's port






41. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






42. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






43. What Tunnel Mode is used for






44. Access - Distribution - Core






45. Private IP address after translation






46. What Inside and Outside refer to in NAT






47. No Known Vulnerability






48. Provides confidentiality - so it cannot be read by unauthorized parties






49. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






50. Command used to disable the ICMP message Redirect