Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides nonrepudiation - ensuring that traffic is from a trusted party






2. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






3. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






4. What Inside and Outside refer to in NAT






5. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






6. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






7. Layer 5






8. Layer 7






9. Layer 3






10. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






11. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments






12. TCP Port 22






13. Rebuild Number






14. None - uses attach application protocol's layer






15. 1300-1999






16. Uses SSL port 443






17. Forces the user to enter both a valid username and password






18. Privilege levels that can have passwords assigned to them






19. Layer 7






20. Traffic is passed in plaintext






21. Provides confidentiality - so it cannot be read by unauthorized parties






22. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






23. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






24. Can discover vulnerabilities - network stats - and firewall discovery






25. Command used to disable NTP on an interface






26. No Known Vulnerability






27. Interim Build Number






28. Plaintext






29. Major Version






30. War dialing






31. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






32. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






33. The environment - catastrophic events an unauthorized access






34. PERMIT TCP ANY ANY ESTABLISHED






35. Command to disable CDP on a router






36. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






37. Local and Remote






38. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


39. Command to disable TCP small server on a router






40. Allows the source IP host to specify a route through the IP network






41. Uses only host keys to authenticate systems






42. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






43. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






44. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






45. Startup-config can be deleted - copied - changed






46. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






47. 2000-2699






48. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






49. Release Train Identifier






50. Router threat where access by an entity or individual other than authorized users