Test your basic knowledge |

Router Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Router threat that involves the unauthorized viewing and collection of network traffic; usually accomplished with a packet sniffing program






2. 0-99






3. A method of bypassing firewall or proxy restrictions by making the firewall think that it is getting traffic from a web browser






4. Access - Distribution - Core






5. Users - Host PC's - IP Addresses






6. This server is used for querying a host about its logged in users






7. Command to disable BOOTP Server






8. ACK and RST






9. Public IP address before translation






10. Privilege level that has Global administration capabilities






11. Breaks LAN security perimeter extends LAN to Layer 2






12. Rewrites the and/or destination IP address of IP packets as they pass through a router or firewall from private to public addresses






13. Device - Hostname - IOS - IP Address - Ports - Model






14. DENY IP HOST <Inbound IP Address> HOST <Inbound IP Address>






15. Geolocational positioning






16. Attack that involves a multitude of compromised system attack a single target - denying service to it by exploiting one 'master' system that communicates with other 'zombie' systems






17. Release Train Identifier






18. Layer 3






19. Protocol that allows data to be exchanged using a secure channel between two computers via encryption






20. UDP Port 514






21. None - uses attached application protocol's port






22. Tunnel Mode Protocol provides integrity - authentication - and non-repudiation and operates directly on top of IP






23. Commands to disable Finger Server






24. This layer controls user and workgroup acess to the Internetwork resources at the local level using segmentation of networks to create separate collision domains - AKA an organization's trusted network






25. 2000-2699






26. Form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address by using different ports; limited to ~64 -000 hosts






27. Proprietary - used by Cisco routers and switches use to identify each other on LAN and WAN segments






28. Privilege level that restricts users to five commands (enable - disable - exit - help quit)






29. TCP and UDP Port 162






30. What Local and Global refer to in NAT






31. Can copy - poison - corrupt - or delete the IOS






32. Two - one Inbound or Evaluated and one Outbound or Reflected






33. Four TCP/UDP Small Server commands recommended to disable






34. Refers to the organization's private network






35. Routing mode depended on by uRPF in order to function






36. TCP and UDP Port 161






37. The host can specify which route to take - which bypasses security






38. Must be made at global config mode - created from CON/VTY session or text file - read top to bottom - applied at the interface and only one ACL per direction - per protocol - per interface






39. UDP Port 1701






40. Layer 7






41. Attack that involves sending a large amount of UDP Echo packets to a subnet's broadcast address with a spoofed source IP address from that subnet






42. 0x33 or 51






43. Can discover vulnerabilities - network stats - and firewall discovery






44. Uses SSL port 443






45. Layer 7






46. Block spoofed IP packets - block loopback packets - block IP multicast if unused - block ICMP redirects - Block telnet if not used






47. Translates multiple local addresses to a pool of global addresses by having the firewall select the first available global address; retains the global address for the duration of the connection






48. Uses server and host keys to authenticate systems






49. Local and Remote






50. Refers to addresses used on the organization's private network