SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Bluejacking
VLAN
Session Initiation Protocol (SIP)
ThickNet - aka 10base5.
2. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Commonly used in Internet.
TCP
10baseT
Packet Filtering Firewall
3. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
OSI Layer 4: Transport Layer
SOCKS Firewall
Virtual Private Network (VPN)
DNS (Domain Name System)
4. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Bastion Host
Circuit Switching
802.11a
Layers in the OSI Model
5. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
IPSec
Blue Boxing
LLC (Logical Link Control - 802.2)
Switched Virtual Circuit (SVC)
6. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
OSI Layer 2: Data Link Layer
Asynchronous Transfer Mode (ATM)
802.15
Router
7. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Layers in the TCP/IP Model
IPSec
Committed Information Rate (CIR)
Asynchronous Communication
8. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Network Address Translator (NAT)
Frame Relay
Half-Duplex
VoIP
9. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Dynamic Packet Filtering
Digital Subscriber Line (DSL)
Packet Filtering Firewall
Router
10. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Definition of Protocol
Private Branch Exchange (PBX)
Synchronous Communication
OSI Layer 6: Presentation
11. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Committed Information Rate (CIR)
DNS (Domain Name System)
Switch
ICMP (Internet Control Message Protocol)
12. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Fiber Distributed Data Interface (FDDI)
Crosstalk
Port Numbers
Session Initiation Protocol (SIP)
13. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Application Proxy Firewall
Attenuation
Circuit Switching
Commonly used in Ethernet.
14. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Subnetting
Open System Authentication (OSA)
Direct Sequence Spread Spectrum (DSSS)
DNS (Domain Name System)
15. SMTP server that is configured for sending email from any source to and destination.
Switched Virtual Circuit (SVC)
Token Ring (802.5)
Open Relay
FDDI-2
16. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Network Address Translator (NAT)
Permanent Virtual Circuit (PVC)
Circuit Level Proxy Firewall
OSI Layer 2: Data Link Layer
17. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
CBC-MAC Protocol (CCMP)
Proxy Firewall Strengths
Iterated Association
802.11b
18. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Virtual Private Network (VPN)
Committed Information Rate (CIR)
Screened Host Firewall
Private Branch Exchange (PBX)
19. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
OSI Data encapsulation
VLAN
Fiber Distributed Data Interface (FDDI)
Frame Relay
20. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
Metropolitan Area Network (MAN)
High Level Data Link Control (HLDC)
Proxy Firewall
10baseT
21. Type of firewall that lies between the perimeter router and and LAN.
Circuit Level Proxy Firewall
Full-Duplex
Screened Host Firewall
10baseT
22. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Switch
Remote Access Servers
OSI Layer 2: Data Link Layer
Carrier sense multiple access with collision detection (CSMA/CD)
23. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
VoIP
Dual-Homed Firewall
OSI Layer 7: Application
Half-Duplex
24. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Classless inter-domain routing (CIDR)
Password Authentication Protocol (PAP)
Temporal Key Integrity Protocol (TKIP)
Circuit Level Proxy Firewall
25. Communication devices that determine synchronization scheme before data transmission.
802.11i
Layers in the OSI Model
Synchronous Communication
Switch
26. Malware attack that sends commands inside of an ICMP packet.
Password Authentication Protocol (PAP)
Loki Attack
Tree Topology
Isochronous Communication Processes
27. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
OSI Data encapsulation
DOS attacks from flooding
Iterated Association
Digital Subscriber Line (DSL)
28. In the OSI layer 5 - these are the types of what?
Switched Virtual Circuit (SVC)
Simplex: One direction.
Direct Sequence Spread Spectrum (DSSS)
Loki Attack
29. Type of cabling problem signals from one wire crossing over to another wire.
Crosstalk
Simplex: One direction.
Blue Boxing
Fiber-optic Cables
30. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Kernel Proxy Firewall
Screened Sub-Net
X.25
Subnetting
31. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
OSI Layer 3: Network Layer
Network Address Translator (NAT)
Asynchronous Transfer Mode (ATM)
ICMP (Internet Control Message Protocol)
32. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Isochronous Communication Processes
Frequency Hopping Spread Spectrum (FHSS)
Proxy Firewall
Packet Switching
33. Both directions - both applications can send information at a time. Session Layer Communication Modes
Channel Service Unit/Data Service Unit (CSU/DSU)
Distributed Environment Challenge
ThinNet - aka 10base2
Full-Duplex
34. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
TCP
Crosstalk
OSI Layer 2: Data Link Layer
802.11
35. Type of topology where computers all are connected to each other - which provides redundancy.
Switch
Commonly used in Internet.
IGMP
DOS attacks from flooding
36. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Synchronous Optical Networks (SONETS)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Channel Service Unit/Data Service Unit (CSU/DSU)
Wide Area Network (WAN)
37. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Noise
FDDI-2
Multi-protocol Label Switching
Bus Topology
38. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Classless inter-domain routing (CIDR)
Coaxial Cables
Asynchronous Transfer Mode (ATM)
Circuit Switching
39. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Repeaters
Committed Information Rate (CIR)
Switched Virtual Circuit (SVC)
Challenge Handshake Authentication Protocol (CHAP)
40. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Bridge
Dual-Homed Firewall
Virtual Private Network (VPN)
802.15
41. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Half-Duplex
X.25
OSI Layer 1: Physical
Bridge
42. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
OSI Data encapsulation
T3
Stateful Firewall
Session Initiation Protocol (SIP)
43. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Tree Topology
FDDI-2
Switch
Bridge
44. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Iterated Association
Router
Metropolitan Area Network (MAN)
Commonly used in FDDI.
45. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Full-Duplex
Coaxial Cables
Mesh Topology
Packet Filtering Firewall
46. New variant to traditional email spam on VoIP networks.
Serial Line Internet Protocol (SLIP)
Spam over Internet Telephony (SPIT)
802.11b
Dynamic Packet Filtering
47. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
802.16
Token Passing
Synchronous Optical Networks (SONETS)
OSI Layer 3: Network Layer
48. Set of rules that dictates how computer communicate over networks.
Integrated Services Digital Network (ISDN)
Circuit Switching
Definition of Protocol
TCP
49. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Circuit Level Proxy Firewall
Trunk Lines
Layers in the OSI Model
Blue Boxing
50. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Bastion Host
Switched Virtual Circuit (SVC)
Star Topology
Cable Modem
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests