Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ESP - SSH - SSL/TLP






2. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






3. Permits a host on one LAN segment to initiate a physical broadcast on a different LAN segment






4. Data link layer protocol used for tunneling network traffic between two peers over an existing network - often used with IPsec to secure packets






5. What Inside and Outside refer to in NAT






6. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






7. Protocol used to keep their time-of-day clocks accurate and in sync






8. What Local and Global refer to in NAT






9. Uses only host keys to authenticate systems






10. 2000-2699






11. Command used to disable the ICMP message Redirect






12. Enterprise

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


13. TCP and UDP Port 162






14. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






15. The environment - catastrophic events an unauthorized access






16. Command to disable UDP small server on a router






17. Service Provider

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


18. Protects against repeating of secure sessions






19. TCP Port 80






20. This server is used for querying a host about its logged in users






21. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






22. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






23. An alternative for both standard and extended ACLs that allow you to refer to an ACL by a descriptive name instead of a number






24. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






25. Plaintext






26. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






27. Command used to disable the ICMP message Host Unreachable






28. Technology

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. Refers to the organization's private network






30. TCP Port 22






31. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






32. UDP Port 1701






33. Two - one Inbound or Evaluated and one Outbound or Reflected






34. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






35. Dialer List - Routing Maps - Dynamic Routing Protocols - Controlling Remote Access - NAT'ing - Traffic Filtering






36. Minor Version






37. DENY TCP ANY HOST <IP Address> EQ 23






38. Layer 7






39. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






40. DNS Poisoning






41. DENY IP 127.0.0.0 0.255.255.255 ANY






42. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






43. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






44. Privilege levels that can have passwords assigned to them






45. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






46. TCP and UDP Port 161






47. Public IP address before translation






48. What Tunnel Mode is used for






49. Can copy - poison - corrupt - or delete the IOS






50. Startup-config can be deleted - copied - changed