Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






2. TCP Port 80






3. Ip access-list <standard | extended> name - permit TCP any any established






4. Mode where only the payload of the IP packet is encrypted and/or authenticated






5. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






6. Privilege level that is restricted to basic level operations






7. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






8. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






9. Command used to disable the ICMP message Host Unreachable






10. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






11. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






12. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






13. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






14. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






15. Uses SSL port 443






16. UDP Port 1701






17. Transport and Tunnel






18. Traffic is passed in plaintext






19. 0x32 - or 50






20. Router to Router Denial of Service






21. 0x33 or 51






22. Can copy - poison - corrupt - or delete the IOS






23. Can discover vulnerabilities - network stats - and firewall discovery






24. Breaks LAN security perimeter extends LAN to Layer 2






25. 33400-34400






26. Public IP address before translation






27. Interim Build Number






28. DNS Poisoning






29. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






30. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






31. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






32. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






33. 2000-2699






34. Device - Hostname - IOS - IP Address - Ports - Model






35. Local and Remote






36. Time can be changed - Routing Table can be killed






37. Command used to disable NTP on an interface






38. Provides confidentiality - so it cannot be read by unauthorized parties






39. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






40. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






41. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






42. 2000-2699






43. Uses server and host keys to authenticate systems






44. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






45. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






46. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






47. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






48. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






49. Layer 7






50. PERMIT TCP ANY ANY ESTABLISHED