Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






2. Can copy - poison - corrupt - or delete the IOS






3. Privilege level that has Global administration capabilities






4. Release Number






5. TCP and UDP Port 161






6. Layer 3






7. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






8. ACK and RST






9. 2000-2699






10. ESP - SSH - SSL/TLP






11. Can obtain CIDR and router ID






12. Router threat where access by an entity or individual other than authorized users






13. Four TCP/UDP Small Server commands recommended to disable






14. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






15. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






16. Layer 3






17. Local and Remote






18. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






19. PERMIT TCP ANY ANY ESTABLISHED






20. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






21. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






22. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






23. Public IP address before translation






24. DENY IP ANY HOST <Broadcast Address>






25. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






26. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






27. 33400-34400






28. 1300-1999






29. Command to disable UDP small server on a router






30. Plaintext






31. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






32. Provides a checksum - ensuring traffic has not been modified along it's path






33. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






34. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






35. Access-list <number> <deny | permit> source source-wildcard log






36. None - uses attach application protocol's layer






37. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






38. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






39. TCP Port 22






40. Router to Router Denial of Service






41. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






42. These ACLs filter by network or host IP address and only filter on source






43. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






44. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






45. Refers to addresses used on the organization's private network






46. 0x33 or 51






47. Can stop spoofed IP addresses






48. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


49. Uses only host keys to authenticate systems






50. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183