Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Command to disable UDP small server on a router






2. Refers to addresses used on the organization's private network






3. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






4. Command to disable BOOTP Server






5. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






6. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






7. Authentication Header (AH) and Encapsulated Security Payload (ESP)






8. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






9. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






10. 0x33 or 51






11. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






12. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






13. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






14. Interim Build Number






15. DENY IP 127.0.0.0 0.255.255.255 ANY






16. Public IP address before translation






17. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






18. What Transport Mode is used for






19. Provides a checksum - ensuring traffic has not been modified along it's path






20. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






21. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






22. DENY TCP ANY HOST <IP Address> EQ 23






23. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






24. Command used to disable the ICMP message Host Unreachable






25. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






26. Major Version






27. Layer 3






28. Can obtain CIDR and router ID






29. The environment - catastrophic events an unauthorized access






30. 0x32 - or 50






31. Privilege level that is restricted to basic level operations






32. Router threat where access by an entity or individual other than authorized users






33. What Inside and Outside refer to in NAT






34. Private IP address after translation






35. Minor Version






36. Local and Remote






37. What Tunnel Mode is used for






38. Refers to addresses used on the organization's private network






39. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






40. Smurf attacks - can enumerate the network






41. Command to disable TCP small server on a router






42. Allows the source IP host to specify a route through the IP network






43. Can copy - poison - corrupt - or delete the IOS






44. Command used to disable HTTP Server






45. Transport and Tunnel






46. TCP Port 22






47. ACK and RST






48. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






49. Four TCP/UDP Small Server commands recommended to disable






50. Layer 7