Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TCP and UDP Port 162






2. Can stop spoofed IP addresses






3. Ip access-list <standard | extended> name - permit TCP any any established






4. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






5. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


6. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






7. Provides nonrepudiation - ensuring that traffic is from a trusted party






8. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


9. Buffer Overflow






10. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






11. Refers to the organization's private network






12. Traffic is passed in plaintext






13. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






14. Transport and Tunnel






15. Interim Build Number






16. Layer 3






17. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






18. None - uses attached application protocol's port






19. Routing mode depended on by uRPF in order to function






20. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


21. Refers to addresses used on the organization's private network






22. Minor Version






23. Can copy - poison - corrupt - or delete the IOS






24. Two FIN bits or one RST bit






25. What Local and Global refer to in NAT






26. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






27. Rebuild Number






28. 33400-34400






29. Refers to addresses used on the organization's private network






30. Local IP address before translation






31. Users - Host PC's - IP Addresses






32. Layer 7






33. This server is used for querying a host about its logged in users






34. 1300-1999






35. No Known Vulnerability






36. TCP and UDP Port 161






37. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






38. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






39. Smurf attacks - can enumerate the network






40. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






41. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






42. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






43. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






44. What Tunnel Mode is used for






45. 0x2F - or 47






46. Protects against repeating of secure sessions






47. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






48. DENY TCP ANY HOST <IP Address> EQ 23






49. ESP - SSH - SSL/TLP






50. Layer 7