Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Startup-config can be deleted - copied - changed






2. Plaintext






3. Refers to addresses used on the organization's private network






4. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






5. Command used to disable the ICMP message Address Mask Reply






6. ESP - SSH - SSL/TLP






7. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






8. Can discover vulnerabilities - network stats - and firewall discovery






9. Two FIN bits or one RST bit






10. These ACLs filter by network or host IP address and only filter on source






11. UDP Port 1701






12. TCP and UDP Port 162






13. Geolocational positioning






14. Ip access-list <standard | extended> name - permit TCP any any established






15. Device - Hostname - IOS - IP Address - Ports - Model






16. Enterprise


17. Uses only host keys to authenticate systems






18. Major Version






19. Command to disable TCP small server on a router






20. DENY IP 224.0.0.0 15.255.255.255 ANY






21. Traffic is passed in plaintext






22. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






23. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






24. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






25. DENY IP ANY HOST <Broadcast Address>






26. Release Train Identifier






27. Local IP address before translation






28. Rebuild Number






29. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






30. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






31. What Tunnel Mode is used for






32. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






33. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






34. Protects against repeating of secure sessions






35. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






36. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






37. 0x33 or 51






38. Service Provider


39. Privilege level that is restricted to basic level operations






40. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






41. Protocol used to keep their time-of-day clocks accurate and in sync






42. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






43. Layer 7






44. Can copy - poison - corrupt - or delete the IOS






45. TCP and UDP Port 161






46. Layer 3






47. Privilege level that has Global administration capabilities






48. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






49. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






50. DENY IP <Network ID> <Network WC Mask> ANY