Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






2. UDP Port 1701






3. Router threat where access by an entity or individual other than authorized users






4. Traffic is passed in plaintext






5. Uses server and host keys to authenticate systems






6. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






7. Geolocational positioning






8. Command used to disable HTTP Server






9. What Transport Mode is used for






10. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






11. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






12. Two FIN bits or one RST bit






13. Mode where only the payload of the IP packet is encrypted and/or authenticated






14. 33400-34400






15. The environment - catastrophic events an unauthorized access






16. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






17. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


18. What Tunnel Mode is used for






19. TCP Port 80






20. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






21. Layer 3






22. Interim Build Number






23. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






24. ACK and RST






25. Private IP address after translation






26. Uses only host keys to authenticate systems






27. UDP Port 514






28. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






29. Layer 5






30. DENY TCP ANY HOST <IP Address> EQ 23






31. Command used to disable the ICMP message Redirect






32. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






33. 2000-2699






34. TCP and UDP Port 162






35. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






36. Privilege level that is restricted to basic level operations






37. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






38. Refers to addresses used on the organization's private network






39. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






40. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






41. Device - Hostname - IOS - IP Address - Ports - Model






42. 1300-1999






43. Can stop spoofed IP addresses






44. This server is used for querying a host about its logged in users






45. Command used to disable the ICMP message Address Mask Reply






46. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






47. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






48. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






49. DENY IP 224.0.0.0 15.255.255.255 ANY






50. Layer 3