Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mode where only the payload of the IP packet is encrypted and/or authenticated






2. Local IP address before translation






3. Commands to disable Finger Server






4. Command used to disable the ICMP message Address Mask Reply






5. Transport and Tunnel






6. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






7. DENY TCP ANY HOST <IP Address> EQ 23






8. TCP Port 80






9. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






10. 0x2F - or 47






11. Router threat that involves a hacker inserting a spoofed TCP/IP packet into a stream - thereby enabling commands to be executed on the remote host






12. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






13. Access - Distribution - Core






14. Command used to disable the ICMP message Host Unreachable






15. Allows the source IP host to specify a route through the IP network






16. Lists interfaces - routing table - ARP table - physical and network addresses - time last booted






17. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






18. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






19. Breaks LAN security perimeter extends LAN to Layer 2






20. The host can specify which route to take - which bypasses security






21. 2000-2699






22. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






23. Can copy - poison - corrupt - or delete the IOS






24. 2000-2699






25. Also known as Configuration Auto-Loading - allows routers to load their startup configuration from the network






26. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






27. Can obtain CIDR and router ID






28. Service Provider


29. Time can be changed - Routing Table can be killed






30. Traffic is passed in plaintext






31. War dialing






32. Smurf attacks - can enumerate the network






33. Top of the hierarchy - responsible for transporting large amounts of traffic both reliably and quickly and switching traffic as fast as possible throughout the internet






34. Plaintext






35. Cisco default tunneling protocol that uses multicast addressing without encryption and is designed to encapsulate a wide variety of network layer packets inside IP tunneling packets






36. The environment - catastrophic events an unauthorized access






37. Router threat that refers to willful attempts to cause such disruptions by overwhelming the targeted system with improperly formatted traffic






38. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






39. Local and Remote






40. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






41. Router threat where access by an entity or individual other than authorized users






42. Private IP address after translation






43. Public IP address before translation






44. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






45. Privilege level that has Global administration capabilities






46. Rebuild Number






47. Attack that involves sending a packet to the router with the same IP address in the source and destination address fields - as well as the same port number in the source and destination port field - causing a denial of service






48. Router threat that occurs when an attacker manipulates IP packets to falsify IP addresses - causing network disruptions as the router attempts to process the packet






49. Two FIN bits or one RST bit






50. Router to Router Denial of Service