Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






2. Can stop spoofed IP addresses






3. Time can be changed - Routing Table can be killed






4. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






5. Plaintext






6. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






7. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






8. DENY IP ANY HOST <Broadcast Address>






9. Smurf attacks - can enumerate the network






10. Refers to addresses used on the organization's private network






11. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






12. Uses SSL port 443






13. Command to disable TCP small server on a router






14. Authentication Header (AH) and Encapsulated Security Payload (ESP)






15. ACK and RST






16. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






17. TCP Port 22






18. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






19. The environment - catastrophic events an unauthorized access






20. Privilege level that is restricted to basic level operations






21. Access-list <number> <deny | permit> source source-wildcard log






22. This server is used for querying a host about its logged in users






23. Device - Hostname - IOS - IP Address - Ports - Model






24. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






25. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






26. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






27. DENY IP 127.0.0.0 0.255.255.255 ANY






28. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






29. Buffer Overflow






30. Layer 7






31. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






32. TCP and UDP Port 161






33. Users - Host PC's - IP Addresses






34. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






35. Local IP address before translation






36. Startup-config can be deleted - copied - changed






37. Router threat where access by an entity or individual other than authorized users






38. ESP - SSH - SSL/TLP






39. 33400-34400






40. Interim Build Number






41. TCP Port 80






42. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






43. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






44. Refers to the organization's private network






45. Command used to disable the ICMP message Redirect






46. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






47. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






48. Local and Remote






49. Layer 5






50. Forces the user to enter both a valid username and password