Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






2. Command to disable UDP small server on a router






3. Router threat that includes manipulating router updates to cause traffic to flow to unauthorized destinations






4. 0x33 or 51






5. Access-list <number <deny | permit> source source-wildcard source-qualifier destination dest-wildcard dest-qualifier <log | log-input>






6. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






7. Allows for a one-to-one translation of local to global addresses; used by web servers and mail servers so that users can connect to them via their global address






8. Layer 5






9. Commands to disable Finger Server






10. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






11. Refers to the organization's private network






12. Transport and Tunnel






13. TCP Port 80






14. Protects against repeating of secure sessions






15. Mode where only the payload of the IP packet is encrypted and/or authenticated






16. 2000-2699






17. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






18. Buffer Overflow






19. Release Number






20. TCP and UDP Port 162






21. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






22. Access-list <number> <deny | permit> source source-wildcard log






23. 0-99






24. Command to disable BOOTP Server






25. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






26. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






27. Router threat where access by an entity or individual other than authorized users






28. Four TCP/UDP Small Server commands recommended to disable






29. What Transport Mode is used for






30. Attack that involves transmitting a volume of connections that cannot be completed at the destination - causing the queue to fill up and denying service to legitimate user






31. Allows the source IP host to specify a route through the IP network






32. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






33. Local IP address before translation






34. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






35. Routing mode depended on by uRPF in order to function






36. PERMIT TCP ANY ANY ESTABLISHED






37. Device - Hostname - IOS - IP Address - Ports - Model






38. What Inside and Outside refer to in NAT






39. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


40. Two - one Inbound or Evaluated and one Outbound or Reflected






41. Software that passively monitors the connection requests flowing through the router; if a connection fails - the software sends a Reset to the server to clear up its state






42. ESP - SSH - SSL/TLP






43. Release Train Identifier






44. War dialing






45. The communication layer between the two other layers and provides network security - including ACLs - firewalls - any general public access servers and address translation; also known as the isolation LAN or DMZ






46. Privilege level that has Global administration capabilities






47. Attack that involves sending a large amount of ICMP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






48. Datagram protocol used by some hosts to load their operating system over the network via a central repository of IOS software






49. 2000-2699






50. Forces the user to enter both a valid username and password