Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What Transport Mode is used for






2. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






3. Rebuild Number






4. Can stop spoofed IP addresses






5. Can discover vulnerabilities - network stats - and firewall discovery






6. Transport and Tunnel






7. Command used to disable NTP on an interface






8. Refers to addresses used on the organization's private network






9. Command to disable BOOTP Server






10. Four TCP/UDP Small Server commands recommended to disable






11. TCP only - used to filter inbound traffic while allowing return TCP sessions - can be spoofed by attackers and cannot be used with Active FTP






12. Local and Remote






13. DENY TCP ANY HOST <IP Address> EQ 23






14. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






15. Public IP address after translation






16. ESP - SSH - SSL/TLP






17. Ip access-list <standard | extended> name - permit TCP any any established






18. Protects against repeating of secure sessions






19. Cryptographic protocols that provide secure communications on the Internet for such thing as WWW - email - faxing - IM - and other data transfers






20. A suite of protocols for securing Internet Protocol communications by authenticating and/or encrypting each IP packet in a data stream






21. TCP and UDP Port 161






22. Release Number






23. These ACLs filter by network or host IP addresses andspecific protocol type or port numbers - filters by source and destination






24. 1300-1999






25. Authentication Header (AH) and Encapsulated Security Payload (ESP)






26. A secure alternative to telnet for remote administration that supported in Enterprise versions of Cisco IOS






27. Major Version






28. Major Version - Minor Version - Release - Interim Build - Release Train Identifier






29. Private IP address after translation






30. When one network protocol called the payload protocol is encapsulated within a different delivery network - or provide a secure path through an untrusted network






31. Allows packets to be filtered based on upper-layer session information - only uses extended temporary ACL's and must be named - applied on border routers






32. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






33. Provides nonrepudiation - ensuring that traffic is from a trusted party






34. DENY IP <Network ID> <Network WC Mask> ANY






35. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






36. Ip accesslist extended <name1> - permit IP any any reflect <filename> - ip accesslist extended <name2> - evaluate <filename> - int f0/0 - ip access-group <name1> out - ip access-group <name2> in






37. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






38. Release Train Identifier






39. Refers to the organization's private network






40. TCP Port 80






41. Uses server and host keys to authenticate systems






42. Broadcast

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


43. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






44. Access - Distribution - Core






45. Can copy - poison - corrupt - or delete the IOS






46. An extension of static mapping which allows for one global address to be mapped to multiple inside addresses; can be used for websites with multiple back end servers






47. Buffer Overflow






48. These ACLs filter by network or host IP address and only filter on source






49. Helps to mitigate problems that are caused by the introduction of malformed or spoofed IP source addresses into a network by discarding packets lacking a verifiable IP source address






50. Time can be changed - Routing Table can be killed