Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






2. Four TCP/UDP Small Server commands recommended to disable






3. 0x32 - or 50






4. Traffic is passed in plaintext






5. ACK and RST






6. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






7. Release Train Identifier






8. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


9. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






10. Transport and Tunnel






11. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






12. DNS Poisoning






13. TCP and UDP Port 161






14. Refers to the organization's private network






15. Layer 7






16. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






17. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






18. Privilege levels that can have passwords assigned to them






19. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






20. Forces the user to enter both a valid username and password






21. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






22. Interim Build Number






23. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






24. PERMIT TCP ANY ANY ESTABLISHED






25. Refers to addresses used on the organization's private network






26. Can copy - poison - corrupt - or delete the IOS






27. Users - Host PC's - IP Addresses






28. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






29. Breaks LAN security perimeter extends LAN to Layer 2






30. What Inside and Outside refer to in NAT






31. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






32. 1300-1999






33. Ip access-list <standard | extended> name - permit TCP any any established






34. Refers to the addresses on the public internet






35. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






36. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






37. What Transport Mode is used for






38. Privilege level that is restricted to basic level operations






39. Layer 3






40. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






41. Local and Remote






42. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






43. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






44. Can discover vulnerabilities - network stats - and firewall discovery






45. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


46. None - uses attach application protocol's layer






47. Command used to disable the ICMP message Address Mask Reply






48. Can stop spoofed IP addresses






49. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






50. DENY IP 224.0.0.0 15.255.255.255 ANY