Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






2. Can discover vulnerabilities - network stats - and firewall discovery






3. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






4. Can stop spoofed IP addresses






5. Refers to the addresses on the public internet






6. Geolocational positioning






7. Local and Remote






8. Local IP address before translation






9. Public IP address after translation






10. 1300-1999






11. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






12. Refers to the organization's private network






13. Router to Router Denial of Service






14. Layer 7






15. What Local and Global refer to in NAT






16. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






17. Two FIN bits or one RST bit






18. Minor Version






19. Privilege level that has Global administration capabilities






20. 2000-2699






21. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






22. The host can specify which route to take - which bypasses security






23. Privilege levels that can have passwords assigned to them






24. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






25. PERMIT TCP ANY ANY ESTABLISHED






26. Provides a checksum - ensuring traffic has not been modified along it's path






27. Startup-config can be deleted - copied - changed






28. Allows the source IP host to specify a route through the IP network






29. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






30. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






31. 0x2F - or 47






32. Router threat where access by an entity or individual other than authorized users






33. Layer 5






34. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


35. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






36. Ip access-list <standard | extended> name - permit TCP any any established






37. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






38. TCP and UDP Port 162






39. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






40. Release Train Identifier






41. Software that blocks packets from unreachable hosts - thus allowing only reachable external hosts to initiate connections to a host on an internal network






42. Command used to disable the ICMP message Redirect






43. Uses SSL port 443






44. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






45. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






46. 0-99






47. Provides confidentiality - so it cannot be read by unauthorized parties






48. UDP Port 514






49. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






50. Layer 3