Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Plaintext






2. What Tunnel Mode is used for






3. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






4. Public IP address before translation






5. 1300-1999






6. Protocol used to keep their time-of-day clocks accurate and in sync






7. Can copy - poison - corrupt - or delete the IOS






8. Router to Router Denial of Service






9. Smurf attacks - can enumerate the network






10. Privilege level that is restricted to basic level operations






11. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






12. Ip access-list <standard | extended> name - permit TCP any any established






13. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






14. Layer 7






15. What Inside and Outside refer to in NAT






16. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






17. 0x2F - or 47






18. Transport and Tunnel






19. Protects against repeating of secure sessions






20. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






21. Refers to the addresses on the public internet






22. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






23. Provides confidentiality - so it cannot be read by unauthorized parties






24. TCP and UDP Port 161






25. Command used to disable the ICMP message Address Mask Reply






26. Uses server and host keys to authenticate systems






27. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






28. Allows the source IP host to specify a route through the IP network






29. These ACLs filter by network or host IP address and only filter on source






30. Refers to addresses used on the organization's private network






31. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






32. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






33. Rebuild Number






34. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


35. Mode where only the payload of the IP packet is encrypted and/or authenticated






36. 0x33 or 51






37. Command used to disable NTP on an interface






38. Access - Distribution - Core






39. Uses SSL port 443






40. None - uses attach application protocol's layer






41. 33400-34400






42. Can stop spoofed IP addresses






43. DENY IP 224.0.0.0 15.255.255.255 ANY






44. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






45. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






46. Traffic is passed in plaintext






47. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






48. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


49. Commands to disable Finger Server






50. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser