Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Router to Router Denial of Service






2. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






3. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


4. Command to disable TCP small server on a router






5. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






6. Provides nonrepudiation - ensuring that traffic is from a trusted party






7. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






8. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






9. Breaks LAN security perimeter extends LAN to Layer 2






10. 1300-1999






11. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






12. 33400-34400






13. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






14. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






15. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






16. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






17. PERMIT TCP ANY ANY ESTABLISHED






18. Layer 3






19. Refers to the addresses on the public internet






20. DENY IP 224.0.0.0 15.255.255.255 ANY






21. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






22. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






23. Layer 5






24. Local IP address before translation






25. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


26. DENY TCP ANY HOST <IP Address> EQ 23






27. DNS Poisoning






28. 2000-2699






29. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






30. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






31. The host can specify which route to take - which bypasses security






32. None - uses attach application protocol's layer






33. Routing mode depended on by uRPF in order to function






34. Layer 3






35. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






36. Layer 7






37. Two FIN bits or one RST bit






38. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






39. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






40. UDP Port 514






41. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






42. Geolocational positioning






43. Local and Remote






44. 0x32 - or 50






45. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






46. Smurf attacks - can enumerate the network






47. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






49. Time can be changed - Routing Table can be killed






50. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted