Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 3






2. Accounts without passwords - Type 7 encryption - account privilege higher than 1 - able to be fingered






3. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






4. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


5. Routing mode depended on by uRPF in order to function






6. Layer 3






7. No Known Vulnerability






8. Layer 3






9. TCP and UDP Port 162






10. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






11. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






12. Command to disable UDP small server on a router






13. Refers to addresses used on the organization's private network






14. Refers to the addresses on the public internet






15. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






16. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






17. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






18. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






19. Uses server and host keys to authenticate systems






20. Protocol used to keep their time-of-day clocks accurate and in sync






21. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


22. Uses SSL port 443






23. Refers to addresses used on the organization's private network






24. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






25. Release Train Identifier






26. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






27. Privilege level that has Global administration capabilities






28. Protects against repeating of secure sessions






29. Can obtain CIDR and router ID






30. 0x33 or 51






31. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






32. TCP Port 22






33. Two FIN bits or one RST bit






34. Four TCP/UDP Small Server commands recommended to disable






35. Provides nonrepudiation - ensuring that traffic is from a trusted party






36. 0x32 - or 50






37. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






38. Transport and Tunnel






39. The environment - catastrophic events an unauthorized access






40. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






41. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






42. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






43. Buffer Overflow






44. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






45. Local and Remote






46. Time can be changed - Routing Table can be killed






47. Command to disable CDP on a router






48. War dialing






49. Privilege levels that can have passwords assigned to them






50. When a router acts as an intermediary for ARP queries on selected interfaces and enabling transparent access between multiple LAN segments