Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






2. Router to Router Denial of Service






3. Users - Host PC's - IP Addresses






4. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






5. 0-99






6. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






7. No Known Vulnerability






8. What Tunnel Mode is used for






9. Layer 3






10. Access - Distribution - Core






11. Privilege levels that can have passwords assigned to them






12. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






13. Protects against repeating of secure sessions






14. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






15. Transport and Tunnel






16. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






17. 1300-1999






18. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






19. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






20. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






21. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






22. Major Version






23. Smurf attacks - can enumerate the network






24. Router threat where access by an entity or individual other than authorized users






25. Layer 5






26. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






27. Access-list <number> <deny | permit> source source-wildcard log






28. Local IP address before translation






29. DNS Poisoning






30. Can stop spoofed IP addresses






31. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






32. Command to disable CDP on a router






33. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






34. Refers to addresses used on the organization's private network






35. Mode where only the payload of the IP packet is encrypted and/or authenticated






36. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






37. What Local and Global refer to in NAT






38. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






39. Minor Version






40. Four TCP/UDP Small Server commands recommended to disable






41. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






42. Command to disable UDP small server on a router






43. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






44. Ip access-list <standard | extended> name - permit TCP any any established






45. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






46. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






47. Layer 3






48. Rebuild Number






49. Authentication Header (AH) and Encapsulated Security Payload (ESP)






50. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS