Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses only host keys to authenticate systems






2. Privilege levels that can have passwords assigned to them






3. Refers to the organization's private network






4. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






5. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






6. Command used to disable the ICMP message Host Unreachable






7. Interim Build Number






8. 1300-1999






9. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






10. DNS Poisoning






11. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






12. Commands to disable Finger Server






13. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






14. DENY IP 127.0.0.0 0.255.255.255 ANY






15. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






16. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






17. Two - one Inbound or Evaluated and one Outbound or Reflected






18. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






19. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






20. Command used to disable the ICMP message Redirect






21. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






22. Release Number






23. Protects against repeating of secure sessions






24. Command to disable CDP on a router






25. Uses SSL port 443






26. TCP Port 80






27. Plaintext






28. Refers to addresses used on the organization's private network






29. 0x33 or 51






30. UDP Port 514






31. Minor Version






32. Layer 3






33. Router to Router Denial of Service






34. Refers to the addresses on the public internet






35. Provides confidentiality - so it cannot be read by unauthorized parties






36. This server is used for querying a host about its logged in users






37. Can discover vulnerabilities - network stats - and firewall discovery






38. Access-list <number> <deny | permit> source source-wildcard log






39. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






40. Ip access-list <standard | extended> name - permit TCP any any established






41. ESP - SSH - SSL/TLP






42. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






43. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






44. Provides a checksum - ensuring traffic has not been modified along it's path






45. Users - Host PC's - IP Addresses






46. Public IP address after translation






47. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






48. War dialing






49. Access - Distribution - Core






50. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet