SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Router Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 0-99
Lower IP Standard ACL Range
Train Identifier 'B'
Train Identifier 'T'
Standard ACL format
2. Two FIN bits or one RST bit
L2TP Identifier
Requirements for Reflexive TCP to be removed
Access List Rules
no ip mask-reply
3. DENY IP ANY HOST <Broadcast Address>
ACL to block a Smurf Attack or Fraggle Attack
Outside Local Address
IPSec AH Operating Layer
Inside Local Address
4. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers
TCP Load Distribution
Encapsulation Security Payload (ESP)
Integrity Validation
Privilege Levels 2-13
5. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered
Third Part of the IOS Version
Extended ACL format
User Account Vulnerabilites
SSH2
6. Command to disable UDP small server on a router
SSH Operating Layer
AUX Vulnerability
no service udp-small-servers
no ip http server
7. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ
Distribution Layer
no ip mask-reply
ACL to block a Land Attack
Common uses of Access Lists
8. PERMIT TCP ANY ANY ESTABLISHED
SSH2
Core Layer
Session Hijacking
ACL to block TCP SYN Attack
9. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses
Network Address Translation (NAT)
Authenticating Peers
no ip mask-reply
Layer 2 Tunneling Protocol (L2TP)
10. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet
Extended ACL format
Inside
Extended IP ACLs
Fraggle Attack
11. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network
Network Time Protocol (NTP)
Devices
Tunneling
Sixth (Optional) Part of the IOS Version
12. DENY IP 224.0.0.0 15.255.255.255 ANY
SSH1
HTTPS Strength
L2TP Identifier
ACL to block IP multicast
13. Uses SSL port 443
HTTP Tunneling
HTTPS Strength
Proxy ARP Vulnerabilities
Tunneling
14. Authentication Header (AH) and Encapsulated Security Payload (ESP)
Two Protocols of Tunnel Mode
AUX Vulnerability
ntp disable
BOOTP
15. Layer 7
no ip mask-reply
SNMP
Core Layer
HTTP Operating Layer
16. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in
TCP Intercept Watch Mode
Syntax for Reflexive ACLs
Train Identifier 'S'
Higher IP Standard ACL Range
17. Release Number
Local Addresses
ESP Identifier
Third Part of the IOS Version
ESP Operating Layer
18. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface
Rerouting
Third Part of the IOS Version
GRE Operating Layer
Access List Rules
19. War dialing
AUX Vulnerability
SSH
HTTP Identifier
Higher IP Extended ACL Range
20. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host
HTTP Identifier
ESP Operating Layer
Session Hijacking
IP Mask Reply Vulnerabilities
21. Refers to the organization's private network
BOOTP Vulnerabilities
Unicast Reverse-Path Forwarding (uRPF)
L2TP Operating Layer
Inside
22. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment
IP Direct Broadcast Vulnerabilties
Transport Mode
CDP Vulnerabilities
IP Directed Broadcast
23. DNS Poisoning
Generic Routing Encapsulation (GRE)
Inside
DNS Lookup Vulnerability
Rerouting
24. 0x32 - or 50
ntp disable
ESP Identifier
AUX Vulnerability
Land Attack
25. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments
Extended ACL format
Cisco Discovery Protocol (CDP)
Authentication Header (AH)
ACL to block IP multicast
26. Geolocational positioning
ACL to block IP multicast
Two Modes of IPSec
ACL to block a Land Attack
TCP/UDP Daytime Vulnerability
27. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service
Network-to-Network Communications
Distribution Layer
Integrity Validation
Land Attack
28. Release Train Identifier
Train Idenifier 'E'
Inside
Two Protocols of Tunnel Mode
Fifth Part of the IOS Version
29. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets
Layer 2 Tunneling Protocol (L2TP)
TCP Load Distribution
AUX Vulnerability
no service tcp-small-servers
30. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>
Extended ACL format
Networks
ESP Operating Layer
Anti-Replay
31. Command to disable TCP small server on a router
UDP Traceroute Port Range
Secure Shell (SSH)
IP Mask Reply Vulnerabilities
no service tcp-small-servers
32. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations
Rerouting
ACL to block incoming loopback packets
Proxy ARP Vulnerabilities
Static NAT
33. Provides confidentiality - so it cannot be read by unauthorized parties
NTP Vulnerabilities
Encrypting Traffic
HTTP Operating Layer
L2TP Identifier
34. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic
Denial of Service (DoS)
TCP/UDP Discard Vulnerability
NTP Vulnerabilities
Distribution Layer
35. Protocol that allows data to be exchanged using a secure channel between two computers via encryption
Secure Shell (SSH)
login local
Proxy ARP Vulnerabilities
Rerouting
36. TCP Port 22
IP Unreachable Vulnerabilities
Static NAT
ACL to block IP multicast
SSH Identifier
37. What Transport Mode is used for
Smurf Attack
SSH1
BOOTP
Host-to-Host Communications
38. Privilege level that has Global administration capabilities
Privilege Level 15
SNMP Vulnerabilities
Outside
Tunneling
39. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets
Generic Routing Encapsulation (GRE)
TCP Intercept Watch Mode
Cisco Express Forwarding (CEF)
Extended IP ACLs
40. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network
HTTPS Strength
Two Modes of IPSec
TCP/UDP Echo Vulnerability
TCP Intercept
41. 33400-34400
Global Addresses
UDP Traceroute Port Range
Privilege Level 0
no ip http server
42. Layer 5
L2TP Operating Layer
Local Addresses
Standard IP ACLs
Lower IP Extended ACL Range
43. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser
Land Attack
ESP Operating Layer
First Part of IOS Version
HTTP Tunneling
44. Private IP address after translation
SSH Operating Layer
syslog
CDP Vulnerabilities
Inside Global Address
45. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption
Outside Local Address
Distribution Layer
Encapsulation Security Payload (ESP)
Encrypting Traffic
46. DENY IP 127.0.0.0 0.255.255.255 ANY
L2TP Identifier
ACL to block incoming loopback packets
User Account Vulnerabilites
Third Part of the IOS Version
47. UDP Port 514
Transport Layer Security (TLS) and Secure Sockets Layer (SSL)
Privilege Level 15
syslog
DNS Lookup Vulnerability
48. Command to disable BOOTP Server
Boot Network
inger Server
ACL to block a Land Attack
no ip bootp server
49. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination
Privilege Levels 2-13
SSH
Extended IP ACLs
echo - chargen - discard - daytime
50. Uses server and host keys to authenticate systems
Cisco Discovery Protocol (CDP)
SSH1
HTTP Tunneling
BOOTP
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests