Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Rebuild Number






2. None - uses attached application protocol's port






3. Access-list <number> <deny | permit> source source-wildcard log






4. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






5. Protocol used to keep their time-of-day clocks accurate and in sync






6. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






7. What Local and Global refer to in NAT






8. Can stop spoofed IP addresses






9. 0-99






10. Forces the user to enter both a valid username and password






11. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






12. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






13. Local and Remote






14. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






15. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






16. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






17. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






18. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






19. Commands to disable Finger Server






20. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






21. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






22. Major Version






23. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






24. Startup-config can be deleted - copied - changed






25. War dialing






26. UDP Port 514






27. Can copy - poison - corrupt - or delete the IOS






28. What Transport Mode is used for






29. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






30. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






31. Release Number






32. Mode where only the payload of the IP packet is encrypted and/or authenticated






33. Public IP address after translation






34. PERMIT TCP ANY ANY ESTABLISHED






35. Refers to addresses used on the organization's private network






36. TCP Port 22






37. Command to disable UDP small server on a router






38. TCP Port 80






39. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






40. DENY IP ANY HOST <Broadcast Address>






41. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






42. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






43. Can discover vulnerabilities - network stats - and firewall discovery






44. 0x32 - or 50






45. Public IP address before translation






46. Transport and Tunnel






47. Layer 7






48. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






49. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






50. Two FIN bits or one RST bit