Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 33400-34400






2. Refers to addresses used on the organization's private network






3. Refers to the organization's private network






4. Traffic is passed in plaintext






5. Local IP address before translation






6. 2000-2699






7. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


8. No Known Vulnerability






9. Can copy - poison - corrupt - or delete the IOS






10. DNS Poisoning






11. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






12. Layer 3






13. Time can be changed - Routing Table can be killed






14. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






15. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






16. TCP and UDP Port 161






17. What Tunnel Mode is used for






18. Privilege level that has Global administration capabilities






19. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






20. Access - Distribution - Core






21. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






22. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


23. Provides confidentiality - so it cannot be read by unauthorized parties






24. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






25. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






26. Command used to disable NTP on an interface






27. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






28. DENY IP <Network ID> <Network WC Mask> ANY






29. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






30. 2000-2699






31. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






32. The environment - catastrophic events an unauthorized access






33. 1300-1999






34. Refers to the addresses on the public internet






35. DENY IP 127.0.0.0 0.255.255.255 ANY






36. ESP - SSH - SSL/TLP






37. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






38. Breaks LAN security perimeter extends LAN to Layer 2






39. Router to Router Denial of Service






40. TCP Port 80






41. Command used to disable HTTP Server






42. Transport and Tunnel






43. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






44. Smurf attacks - can enumerate the network






45. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






46. Layer 7






47. None - uses attached application protocol's port






48. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






49. Routing mode depended on by uRPF in order to function






50. What Local and Global refer to in NAT