Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Plaintext






2. Authentication Header (AH) and Encapsulated Security Payload (ESP)






3. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






4. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


5. TCP Port 22






6. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






7. Mode where the entire packet is encrypted and/or authenticated - requiring a new IP packet to be encapsulated






8. Provides a checksum - ensuring traffic has not been modified along it's path






9. Local and Remote






10. Can discover vulnerabilities - network stats - and firewall discovery






11. Buffer Overflow






12. 1300-1999






13. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


14. Major Version






15. 0x33 or 51






16. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






17. DENY IP ANY HOST <Broadcast Address>






18. 33400-34400






19. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






20. Access - Distribution - Core






21. Layer 5






22. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






23. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






24. Public IP address before translation






25. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






26. 2000-2699






27. What Local and Global refer to in NAT






28. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






29. Uses SSL port 443






30. Access-list <number> <deny | permit> source source-wildcard log






31. 2000-2699






32. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






33. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






34. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






35. These ACLs filter by network or host IP address and only filter on source






36. Mode where only the payload of the IP packet is encrypted and/or authenticated






37. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






38. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






39. Private IP address after translation






40. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






41. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






42. Four TCP/UDP Small Server commands recommended to disable






43. Forces the user to enter both a valid username and password






44. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






45. Protects against repeating of secure sessions






46. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






47. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






48. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






49. Breaks LAN security perimeter extends LAN to Layer 2






50. DNS Poisoning