Test your basic knowledge |

CISSP Telecom And Network Security

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Spam over IM






2. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.






3. New variant to traditional email spam on VoIP networks.






4. Both directions - both applications can send information at a time. Session Layer Communication Modes






5. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.






6. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.






7. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.






8. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.






9. In a token ring network - each computer is connected to this - which acts as a central hub.






10. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.






11. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.






12. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.






13. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.






14. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.






15. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.






16. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.






17. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.






18. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la






19. Problems: Central device is a single point of failure.






20. Type of wireless security standard that uses AES in CBC mode.






21. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).






22. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.






23. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.






24. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.






25. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).






26. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'






27. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.






28. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.






29. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.






30. Communication devices that determine synchronization scheme before data transmission.






31. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.






32. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.






33. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.






34. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.






35. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.






36. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.






37. Protocol that increases address size from 32 bits to 128 bits






38. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.






39. Protocol that is best-effort - connectionless - and does not sent acknowledgements.






40. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.






41. Type of network layout that is a large geographical region connecting more that one LAN.






42. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.






43. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.






44. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.






45. Type of firewall that lies between the perimeter router and and LAN.






46. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.






47. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.






48. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.






49. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.






50. This network technology determines which system will send data based on which one has the token.