Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Access-list <number> <deny | permit> source source-wildcard log






2. Layer 7






3. UDP Port 1701






4. Device - Hostname - IOS - IP Address - Ports - Model






5. Rebuild Number






6. The environment - catastrophic events an unauthorized access






7. Command to disable UDP small server on a router






8. Privilege level that has Global administration capabilities






9. Command used to disable the ICMP message Redirect






10. What Tunnel Mode is used for






11. 2000-2699






12. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






13. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






14. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






15. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






16. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






17. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






18. Local IP address before translation






19. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






20. Privilege level that is restricted to basic level operations






21. 0x32 - or 50






22. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






23. Ip access-list <standard | extended> name - permit TCP any any established






24. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






25. None - uses attach application protocol's layer






26. Layer 5






27. Command used to disable the ICMP message Address Mask Reply






28. Protects against repeating of secure sessions






29. TCP and UDP Port 162






30. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






31. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






32. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


33. The host can specify which route to take - which bypasses security






34. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






35. Breaks LAN security perimeter extends LAN to Layer 2






36. 0x2F - or 47






37. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






38. None - uses attached application protocol's port






39. Private IP address after translation






40. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






41. DENY IP 224.0.0.0 15.255.255.255 ANY






42. What Local and Global refer to in NAT






43. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






44. Public IP address before translation






45. Four TCP/UDP Small Server commands recommended to disable






46. DENY IP ANY HOST <Broadcast Address>






47. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






48. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






49. DNS Poisoning






50. UDP Port 514