Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






2. UDP Port 1701






3. Routing mode depended on by uRPF in order to function






4. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






5. Forces the user to enter both a valid username and password






6. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






7. These ACLs filter by network or host IP address and only filter on source






8. Command used to disable the ICMP message Address Mask Reply






9. Provides nonrepudiation - ensuring that traffic is from a trusted party






10. Layer 7






11. TCP and UDP Port 161






12. TCP and UDP Port 162






13. Interim Build Number






14. Breaks LAN security perimeter extends LAN to Layer 2






15. Command used to disable NTP on an interface






16. Two - one Inbound or Evaluated and one Outbound or Reflected






17. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






18. War dialing






19. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






20. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






21. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






22. TCP Port 80






23. Protects against repeating of secure sessions






24. Smurf attacks - can enumerate the network






25. Can copy - poison - corrupt - or delete the IOS






26. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






27. Command used to disable the ICMP message Redirect






28. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






29. Traffic is passed in plaintext






30. Release Number






31. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


32. Command to disable CDP on a router






33. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






34. Private IP address after translation






35. PERMIT TCP ANY ANY ESTABLISHED






36. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






37. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






38. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






39. Users - Host PC's - IP Addresses






40. 0-99






41. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






42. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






43. Buffer Overflow






44. Privilege level that is restricted to basic level operations






45. What Transport Mode is used for






46. The host can specify which route to take - which bypasses security






47. UDP Port 514






48. Privilege levels that can have passwords assigned to them






49. Minor Version






50. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host