Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Interim Build Number






2. The host can specify which route to take - which bypasses security






3. Local IP address before translation






4. Rebuild Number






5. Smurf attacks - can enumerate the network






6. ACK and RST






7. 2000-2699






8. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






9. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






10. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






11. Startup-config can be deleted - copied - changed






12. Access-list <number> <deny | permit> source source-wildcard log






13. Routing mode depended on by uRPF in order to function






14. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






15. Release Number






16. Local and Remote






17. Public IP address after translation






18. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






19. DNS Poisoning






20. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






21. Can stop spoofed IP addresses






22. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






23. TCP and UDP Port 161






24. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






25. Uses SSL port 443






26. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






27. Protects against repeating of secure sessions






28. DENY IP 224.0.0.0 15.255.255.255 ANY






29. 33400-34400






30. Access - Distribution - Core






31. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






32. Layer 7






33. Forces the user to enter both a valid username and password






34. Authentication Header (AH) and Encapsulated Security Payload (ESP)






35. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






36. War dialing






37. Command to disable BOOTP Server






38. Layer 3






39. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






40. TCP Port 80






41. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






42. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






43. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


44. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






45. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






46. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






47. Uses only host keys to authenticate systems






48. Commands to disable Finger Server






49. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


50. ESP - SSH - SSL/TLP