Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






2. DENY IP ANY HOST <Broadcast Address>






3. 2000-2699






4. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






5. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






6. Major Version






7. Allows the source IP host to specify a route through the IP network






8. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






9. Local IP address before translation






10. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






11. Interim Build Number






12. Uses server and host keys to authenticate systems






13. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






14. Ip access-list <standard | extended> name - permit TCP any any established






15. Command to disable UDP small server on a router






16. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






17. DENY IP 224.0.0.0 15.255.255.255 ANY






18. The host can specify which route to take - which bypasses security






19. Can stop spoofed IP addresses






20. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






21. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






22. Enterprise


23. 0x2F - or 47






24. Smurf attacks - can enumerate the network






25. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






26. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






27. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






28. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






29. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






30. DNS Poisoning






31. Authentication Header (AH) and Encapsulated Security Payload (ESP)






32. Traffic is passed in plaintext






33. Two FIN bits or one RST bit






34. What Transport Mode is used for






35. Routing mode depended on by uRPF in order to function






36. Transport and Tunnel






37. These ACLs filter by network or host IP address and only filter on source






38. Commands to disable Finger Server






39. Provides a checksum - ensuring traffic has not been modified along it's path






40. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






41. DENY TCP ANY HOST <IP Address> EQ 23






42. Privilege levels that can have passwords assigned to them






43. Protocol used to keep their time-of-day clocks accurate and in sync






44. Time can be changed - Routing Table can be killed






45. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






46. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






47. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






48. ESP - SSH - SSL/TLP






49. What Tunnel Mode is used for






50. Plaintext