SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Synchronous Communication
Ethernet (802.3)
802.15
Committed Information Rate (CIR)
2. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Open Relay
FDDI-2
802.11b
ICMP (Internet Control Message Protocol)
3. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Permanent Virtual Circuit (PVC)
Layers in the OSI Model
Session Initiation Protocol (SIP)
Challenge Handshake Authentication Protocol (CHAP)
4. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Switch
Carrier sense multiple access with collision detection (CSMA/CD)
Multi-protocol Label Switching
OSI Layer 5: Session Layer
5. Both directions - only one application can send information at a time
Shared Key Authentication (SKA)
Application Proxy Firewall
Wide Area Network (WAN)
Half-Duplex
6. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Asynchronous Transfer Mode (ATM)
Plenum-rated Cables
Iterated Association
Reverse Address Resolution Protocol (RARP )
7. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Repeaters
OSI Layer 1: Physical
Commonly used in FDDI.
FDDI-2
8. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Layers in the OSI Model
Bluejacking
TCP
Definition of Protocol
9. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Ring Topology
Packet Filtering Firewall
Multi-protocol Label Switching
Synchronous Communication
10. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Packet Filtering Firewall
Direct Sequence Spread Spectrum (DSSS)
Virtual Private Network (VPN)
Isochronous Communication Processes
11. Wireless standard that will improve security of wireless communication
802.11i
Commonly used in logical bus - Ethernet - token ring.
Private Branch Exchange (PBX)
Commonly used in Ethernet.
12. Protocol that increases address size from 32 bits to 128 bits
IPv6
Integrated Services Digital Network (ISDN)
802.15
Simplex: One direction.
13. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
IPv6
Ring Topology
CBC-MAC Protocol (CCMP)
Circuit Switching
14. Type of network layout that is a large geographical region connecting more that one LAN.
Remote Access Servers
Commonly used in logical bus - Ethernet - token ring.
OSI Data encapsulation
Wide Area Network (WAN)
15. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Frequency Hopping Spread Spectrum (FHSS)
OSI Layer 4: Transport Layer
Shared Key Authentication (SKA)
Screened Sub-Net
16. Wireless communication that distributes individual signals across the allocated frequencies.
Screened Sub-Net
UDP
Spread Spectrum
Plenum-rated Cables
17. Type of wireless security standard that uses AES in CBC mode.
Spread Spectrum
Switched Virtual Circuit (SVC)
Commonly used in logical bus - Ethernet - token ring.
CBC-MAC Protocol (CCMP)
18. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Spam over Internet Telephony (SPIT)
Token Passing
T1
Fiber-optic Cables
19. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
X.25
10baseT
Integrated Services Digital Network (ISDN)
Point-To-Point Tunneling Protocol (PPTP)
20. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Integrated Services Digital Network (ISDN)
Wireless Application Protocol (WAP)
OSI Layer 2: Data Link Layer
Frequency Hopping Spread Spectrum (FHSS)
21. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Cable Modem
Open System Authentication (OSA)
Wide Area Network (WAN)
Direct Sequence Spread Spectrum (DSSS)
22. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Wide Area Network (WAN)
Switched Virtual Circuit (SVC)
Extensible Authentication Protocol (EAP)
802.11b
23. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ThinNet - aka 10base2
Layer 2 Tunneling Protocol (L2TP)
Application Proxy vs. Circuit Level
Serial Line Internet Protocol (SLIP)
24. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Token Passing
Token Ring (802.5)
IPSec
802.11a
25. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Stateful Firewall
IGMP
Pulse Code Modulation (PCM)
802.11
26. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Packet Switching
Session Initiation Protocol (SIP)
DOS attacks from flooding
Simplex: One direction.
27. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
LLC (Logical Link Control - 802.2)
Crosstalk
Coaxial Cables
Reverse Address Resolution Protocol (RARP )
28. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Commonly used in Internet.
Frame Relay
Bridge
Fiber-optic Cables
29. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Application Proxy Firewall
Private Branch Exchange (PBX)
Simplex: One direction.
Frame Relay
30. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Reverse Address Resolution Protocol (RARP )
OSI Layer 3: Network Layer
Screened Sub-Net
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
31. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Distributed Environment Challenge
Coaxial Cables
Remote Access Servers
Extensible Authentication Protocol (EAP)
32. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Digital Subscriber Line (DSL)
ICMP (Internet Control Message Protocol)
Twisted Pair Cables
Token Ring (802.5)
33. Type of firewall that lies between the perimeter router and and LAN.
Router
Packet Filtering Firewall
Screened Host Firewall
Spam over Internet Telephony (SPIT)
34. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Stateful Firewall
TCP
Full-Duplex
OSI Layer 7: Application
35. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
SOCKS Firewall
DOS attacks from flooding
Dual-Homed Firewall
Challenge Handshake Authentication Protocol (CHAP)
36. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Service Set ID (SSID)
Extensible Authentication Protocol (EAP)
Wired Equivalent Privacy (WEP)
Frame Relay
37. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Noise
Frequency Hopping Spread Spectrum (FHSS)
Carrier sense multiple access with collision detection (CSMA/CD)
Ethernet (802.3)
38. Type of cabling problem signals from one wire crossing over to another wire.
Ring Topology
Crosstalk
DOS attacks from flooding
Layers in the OSI Model
39. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Packet Filtering Firewall
Channel Service Unit/Data Service Unit (CSU/DSU)
Bus Topology
Circuit Level Proxy Firewall
40. Both directions - both applications can send information at a time. Session Layer Communication Modes
Fiber Distributed Data Interface (FDDI)
Full-Duplex
Classless inter-domain routing (CIDR)
T1
41. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
802.11i
Digital Subscriber Line (DSL)
OSI Layer 2: Data Link Layer
Carrier sense multiple access with collision detection (CSMA/CD)
42. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
OSI Layer 2: Data Link Layer
Open System Authentication (OSA)
Router
Simplex: One direction.
43. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Commonly used in logical bus - Ethernet - token ring.
Virtual Private Network (VPN)
Dynamic Packet Filtering
OSI Layer 2: Data Link Layer
44. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
DOS attacks from flooding
Permanent Virtual Circuit (PVC)
X.25
Open System Authentication (OSA)
45. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Service Set ID (SSID)
Frequency Hopping Spread Spectrum (FHSS)
Wide Area Network (WAN)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
46. New variant to traditional email spam on VoIP networks.
Spam over Internet Telephony (SPIT)
ICMP (Internet Control Message Protocol)
Coaxial Cables
Multilevel Switching
47. Problems: Central device is a single point of failure.
Star Topology
Layers in the OSI Model
Multilevel Switching
Blue Boxing
48. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
ThinNet - aka 10base2
Circuit Level Proxy Firewall
Open Relay
UDP
49. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Commonly used in logical bus - Ethernet - token ring.
Serial Line Internet Protocol (SLIP)
Circuit Switching
CBC-MAC Protocol (CCMP)
50. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Frame Relay
Noise
802.11b
Circuit Level Proxy Firewall