SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Bridge
Blue Boxing
Simplex: One direction.
Tree Topology
2. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Frame Relay
Token Ring (802.5)
LLC (Logical Link Control - 802.2)
Subnetting
3. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Circuit Switching
Switch
802.11a
SOCKS Firewall
4. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Channel Service Unit/Data Service Unit (CSU/DSU)
ARP Poisoning
Fiber-optic Cables
Private Branch Exchange (PBX)
5. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
DOS attacks from flooding
Password Authentication Protocol (PAP)
Direct Sequence Spread Spectrum (DSSS)
Packet Filtering Firewall
6. Set of rules that dictates how computer communicate over networks.
Wired Equivalent Privacy (WEP)
Bastion Host
Multistation Access Unit (MAU)
Definition of Protocol
7. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Synchronous Data Link Control (SDLC)
Blue Boxing
Mesh Topology
Synchronous Optical Networks (SONETS)
8. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Synchronous Communication
Committed Information Rate (CIR)
Port Numbers
Dedicated Links
9. Standard that addresses wireless MAN technologies.
SPIM
ARP (Address Resolution Protocol)
802.16
802.11i
10. Standard that outlines wireless personal area network (WPAN) technologies.
OSI Layer 2: Data Link Layer
Integrated Services Digital Network (ISDN)
Switch
802.15
11. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Multilevel Switching
Multi-protocol Label Switching
Ring Topology
Switch
12. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
802.11
LLC (Logical Link Control - 802.2)
Commonly used in FDDI.
Frame Relay
13. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Repeaters
Extensible Authentication Protocol (EAP)
Port Numbers
Ring Topology
14. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Classless inter-domain routing (CIDR)
X.25
Challenge Handshake Authentication Protocol (CHAP)
Permanent Virtual Circuit (PVC)
15. New variant to traditional email spam on VoIP networks.
Wireless Application Protocol (WAP)
Spam over Internet Telephony (SPIT)
Layers in the OSI Model
Synchronous Communication
16. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Application Proxy vs. Circuit Level
Token Passing
Frame Relay
Bus Topology
17. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Session Initiation Protocol (SIP)
Bastion Host
Screened Sub-Net
Full-Duplex
18. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Simplex: One direction.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Definition of Protocol
ThinNet - aka 10base2
19. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
Router
Stateful Firewall
ARP (Address Resolution Protocol)
20. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
802.11a
Stateful Firewall
Commonly used in logical bus - Ethernet - token ring.
IGMP
21. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Bridge
802.11i
Serial Line Internet Protocol (SLIP)
Digital Subscriber Line (DSL)
22. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
High Level Data Link Control (HLDC)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
OSI Layer 4: Transport Layer
Bastion Host
23. Protocol that increases address size from 32 bits to 128 bits
Circuit Switching
IPv6
Router
Spam over Internet Telephony (SPIT)
24. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Switched Virtual Circuit (SVC)
Open Relay
Stateful Firewall
Session Initiation Protocol (SIP)
25. Both directions - only one application can send information at a time
Bluejacking
Temporal Key Integrity Protocol (TKIP)
Half-Duplex
Synchronous Optical Networks (SONETS)
26. Protocol that translates a MAC address into an IP address.
Serial Line Internet Protocol (SLIP)
Session Initiation Protocol (SIP)
Reverse Address Resolution Protocol (RARP )
Screened Sub-Net
27. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
Attenuation
Packet Filtering Firewall
OSI Layer 7: Application
Stateful Firewall
28. Type of wireless security standard that uses AES in CBC mode.
CBC-MAC Protocol (CCMP)
Packet Switching
Point-To-Point Tunneling Protocol (PPTP)
X.25
29. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Commonly used in Internet.
DNS (Domain Name System)
Twisted Pair Cables
Pulse Code Modulation (PCM)
30. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
Spread Spectrum
Committed Information Rate (CIR)
Password Authentication Protocol (PAP)
31. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Coaxial Cables
802.11b
Password Authentication Protocol (PAP)
Ethernet (802.3)
32. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Asynchronous Transfer Mode (ATM)
IPSec
802.11a
FDDI-2
33. Protocol for allowing multi-cast (one to many) communication
X.25
IGMP
Packet Filtering Firewall
Token Ring (802.5)
34. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Frame Relay
OSI Layer 1: Physical
SOCKS Firewall
Attenuation
35. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
OSI Layer 6: Presentation
OSI Layer 2: Data Link Layer
Wired Equivalent Privacy (WEP)
Dedicated Links
36. Type of network layout that is a large geographical region connecting more that one LAN.
Synchronous Communication
802.11
Wide Area Network (WAN)
Asynchronous Communication
37. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Carrier sense multiple access with collision detection (CSMA/CD)
Pulse Code Modulation (PCM)
Wireless Application Protocol (WAP)
ICMP (Internet Control Message Protocol)
38. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Packet Filtering Firewall
Frequency Hopping Spread Spectrum (FHSS)
Crosstalk
FDDI-2
39. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Commonly used in Ethernet.
Packet Filtering Firewall
Router
Spread Spectrum
40. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Packet Filtering Firewall
LLC (Logical Link Control - 802.2)
IGMP
UDP
41. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
OSI Layer 3: Network Layer
Layers in the TCP/IP Model
VoIP
Switched Virtual Circuit (SVC)
42. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Asynchronous Communication
OSI Layer 2: Data Link Layer
Extensible Authentication Protocol (EAP)
Synchronous Data Link Control (SDLC)
43. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Synchronous Optical Networks (SONETS)
Temporal Key Integrity Protocol (TKIP)
Proxy Firewall
Frequency Hopping Spread Spectrum (FHSS)
44. Type of firewall that lies between the perimeter router and and LAN.
Channel Service Unit/Data Service Unit (CSU/DSU)
Screened Host Firewall
Bus Topology
Star Topology
45. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
LLC (Logical Link Control - 802.2)
Committed Information Rate (CIR)
Token Ring (802.5)
Stateful Firewall
46. Both directions - both applications can send information at a time. Session Layer Communication Modes
Ethernet (802.3)
Extensible Authentication Protocol (EAP)
Proxy Firewall Strengths
Full-Duplex
47. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Pulse Code Modulation (PCM)
Bridge
Asynchronous Transfer Mode (ATM)
Synchronous Optical Networks (SONETS)
48. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Multistation Access Unit (MAU)
Proxy Firewall
Packet Filtering Firewall
Repeaters
49. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Bridge
Switch
Mesh Topology
Asynchronous Communication
50. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
OSI Layer 2: Data Link Layer
Channel Service Unit/Data Service Unit (CSU/DSU)
UDP
Bridge