Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






2. DENY IP 127.0.0.0 0.255.255.255 ANY






3. Layer 5






4. Release Train Identifier






5. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






6. TCP and UDP Port 162






7. 0x33 or 51






8. What Local and Global refer to in NAT






9. Refers to addresses used on the organization's private network






10. DNS Poisoning






11. Can discover vulnerabilities - network stats - and firewall discovery






12. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






13. Router threat where access by an entity or individual other than authorized users






14. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






15. Rebuild Number






16. DENY IP <Network ID> <Network WC Mask> ANY






17. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






18. The environment - catastrophic events an unauthorized access






19. Command to disable TCP small server on a router






20. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






21. Layer 3






22. Time can be changed - Routing Table can be killed






23. Four TCP/UDP Small Server commands recommended to disable






24. Layer 7






25. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






26. Allows the source IP host to specify a route through the IP network






27. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






28. 33400-34400






29. Layer 3






30. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






31. Traffic is passed in plaintext






32. Provides nonrepudiation - ensuring that traffic is from a trusted party






33. Routing mode depended on by uRPF in order to function






34. Commands to disable Finger Server






35. Provides confidentiality - so it cannot be read by unauthorized parties






36. Command used to disable the ICMP message Address Mask Reply






37. No Known Vulnerability






38. What Transport Mode is used for






39. Protects against repeating of secure sessions






40. Local IP address before translation






41. Users - Host PC's - IP Addresses






42. Refers to the organization's private network






43. Plaintext






44. PERMIT TCP ANY ANY ESTABLISHED






45. Authentication Header (AH) and Encapsulated Security Payload (ESP)






46. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






47. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






49. Tunnel Mode Protocol provides confidentiality - along with authentication and integrity protection with encryption






50. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations