Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 33400-34400






2. TCP and UDP Port 162






3. Commands to disable Finger Server






4. Buffer Overflow






5. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






6. Uses only host keys to authenticate systems






7. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






8. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


9. No Known Vulnerability






10. DENY IP 127.0.0.0 0.255.255.255 ANY






11. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






12. UDP Port 1701






13. Privilege levels that can have passwords assigned to them






14. Command used to disable the ICMP message Address Mask Reply






15. 0x2F - or 47






16. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






17. Four TCP/UDP Small Server commands recommended to disable






18. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






19. Geolocational positioning






20. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






21. TCP and UDP Port 161






22. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






23. Layer 3






24. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






25. Routing mode depended on by uRPF in order to function






26. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






27. Public IP address before translation






28. Access - Distribution - Core






29. Forces the user to enter both a valid username and password






30. Uses server and host keys to authenticate systems






31. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


32. Refers to addresses used on the organization's private network






33. Release Number






34. DENY IP <Network ID> <Network WC Mask> ANY






35. Release Train Identifier






36. Layer 3






37. Transport and Tunnel






38. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






39. Device - Hostname - IOS - IP Address - Ports - Model






40. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






41. Layer 7






42. TCP Port 80






43. Protocol used to keep their time-of-day clocks accurate and in sync






44. Startup-config can be deleted - copied - changed






45. Privilege level that is restricted to basic level operations






46. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


47. Breaks LAN security perimeter extends LAN to Layer 2






48. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






49. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






50. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP