Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






2. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






3. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






4. Users - Host PC's - IP Addresses






5. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






6. Commands to disable Finger Server






7. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






8. Refers to addresses used on the organization's private network






9. None - uses attach application protocol's layer






10. Two FIN bits or one RST bit






11. Layer 7






12. Forces the user to enter both a valid username and password






13. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






14. 2000-2699






15. Uses server and host keys to authenticate systems






16. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






17. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






18. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






19. Can stop spoofed IP addresses






20. Private IP address after translation






21. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






22. TCP and UDP Port 161






23. DENY TCP ANY HOST <IP Address> EQ 23






24. Plaintext






25. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






26. Routing mode depended on by uRPF in order to function






27. Uses only host keys to authenticate systems






28. TCP and UDP Port 162






29. 33400-34400






30. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






31. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






32. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






33. Local and Remote






34. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






35. 0x2F - or 47






36. UDP Port 1701






37. Four TCP/UDP Small Server commands recommended to disable






38. Time can be changed - Routing Table can be killed






39. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






40. Uses SSL port 443






41. Traffic is passed in plaintext






42. Layer 5






43. Router threat where access by an entity or individual other than authorized users






44. Layer 3






45. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






46. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






47. Broadcast


48. Layer 7






49. What Tunnel Mode is used for






50. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment