Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






2. Public IP address after translation






3. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






4. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






5. Buffer Overflow






6. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






7. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






8. 1300-1999






9. TCP Port 80






10. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






11. Release Number






12. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






13. No Known Vulnerability






14. Layer 3






15. Mode where only the payload of the IP packet is encrypted and/or authenticated






16. DENY IP ANY HOST <Broadcast Address>






17. Authentication Header (AH) and Encapsulated Security Payload (ESP)






18. Two - one Inbound or Evaluated and one Outbound or Reflected






19. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






20. What Inside and Outside refer to in NAT






21. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






22. Uses SSL port 443






23. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






24. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






25. Private IP address after translation






26. Provides a checksum - ensuring traffic has not been modified along it's path






27. Command used to disable HTTP Server






28. Provides nonrepudiation - ensuring that traffic is from a trusted party






29. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






30. Breaks LAN security perimeter extends LAN to Layer 2






31. Four TCP/UDP Small Server commands recommended to disable






32. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






33. Layer 5






34. TCP and UDP Port 162






35. 33400-34400






36. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






37. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






38. Command used to disable the ICMP message Redirect






39. DENY IP <Network ID> <Network WC Mask> ANY






40. Can stop spoofed IP addresses






41. DENY IP 224.0.0.0 15.255.255.255 ANY






42. Access - Distribution - Core






43. Privilege levels that can have passwords assigned to them






44. Command to disable UDP small server on a router






45. Release Train Identifier






46. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






47. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






49. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






50. 2000-2699