Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TCP Port 80






2. Two FIN bits or one RST bit






3. No Known Vulnerability






4. Public IP address after translation






5. TCP and UDP Port 162






6. The host can specify which route to take - which bypasses security






7. Private IP address after translation






8. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






9. Privilege level that is restricted to basic level operations






10. None - uses attach application protocol's layer






11. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






12. Command to disable BOOTP Server






13. None - uses attached application protocol's port






14. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






15. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


16. Command used to disable HTTP Server






17. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






18. PERMIT TCP ANY ANY ESTABLISHED






19. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






20. Mode where only the payload of the IP packet is encrypted and/or authenticated






21. Two - one Inbound or Evaluated and one Outbound or Reflected






22. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






23. What Inside and Outside refer to in NAT






24. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






25. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






26. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






27. The environment - catastrophic events an unauthorized access






28. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






29. Release Number






30. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






31. ESP - SSH - SSL/TLP






32. War dialing






33. Command to disable CDP on a router






34. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






35. TCP Port 22






36. Commands to disable Finger Server






37. Can obtain CIDR and router ID






38. Refers to the addresses on the public internet






39. UDP Port 1701






40. 2000-2699






41. Layer 3






42. Layer 7






43. Release Train Identifier






44. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






45. Plaintext






46. Transport and Tunnel






47. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






49. Allows the source IP host to specify a route through the IP network






50. Privilege levels that can have passwords assigned to them