Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The host can specify which route to take - which bypasses security






2. Provides a checksum - ensuring traffic has not been modified along it's path






3. DENY IP ANY HOST <Broadcast Address>






4. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






5. Command used to disable the ICMP message Host Unreachable






6. TCP and UDP Port 161






7. Major Version






8. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






9. What Local and Global refer to in NAT






10. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






11. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






12. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






13. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






14. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






15. TCP Port 22






16. Layer 3






17. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






18. Layer 5






19. War dialing






20. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






21. 0x2F - or 47






22. Mode where only the payload of the IP packet is encrypted and/or authenticated






23. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






24. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






25. Interim Build Number






26. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






27. ESP - SSH - SSL/TLP






28. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






29. Release Train Identifier






30. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






31. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






32. Command used to disable NTP on an interface






33. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






34. Release Number






35. Command used to disable HTTP Server






36. Protocol used to keep their time-of-day clocks accurate and in sync






37. Protects against repeating of secure sessions






38. Ip access-list <standard | extended> name - permit TCP any any established






39. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






40. No Known Vulnerability






41. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






42. Privilege level that is restricted to basic level operations






43. These ACLs filter by network or host IP address and only filter on source






44. Provides nonrepudiation - ensuring that traffic is from a trusted party






45. 2000-2699






46. Minor Version






47. Authentication Header (AH) and Encapsulated Security Payload (ESP)






48. Four TCP/UDP Small Server commands recommended to disable






49. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






50. Local and Remote