SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Standard that outlines wireless personal area network (WPAN) technologies.
802.15
Simplex: One direction.
VoIP
Commonly used in Internet.
2. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
Packet Switching
Dynamic Packet Filtering
ThickNet - aka 10base5.
3. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
802.16
Noise
ARP Poisoning
Distributed Environment Challenge
4. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Wireless Application Protocol (WAP)
T3
OSI Layer 1: Physical
Synchronous Communication
5. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
LLC (Logical Link Control - 802.2)
Asynchronous Transfer Mode (ATM)
Simplex: One direction.
TCP
6. This network technology determines which system will send data based on which one has the token.
Bastion Host
Token Passing
Isochronous Communication Processes
Source Routing
7. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Cable Modem
UDP
Permanent Virtual Circuit (PVC)
Classless inter-domain routing (CIDR)
8. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Metropolitan Area Network (MAN)
Star Topology
802.11i
Switch
9. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Wireless Application Protocol (WAP)
Switch
Subnetting
IPv6
10. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Temporal Key Integrity Protocol (TKIP)
Network Address Translator (NAT)
Permanent Virtual Circuit (PVC)
Proxy Firewall
11. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Stateful Firewall
Frame Relay
Packet Filtering Firewall
Application Proxy vs. Circuit Level
12. Wireless standard that will improve security of wireless communication
802.11i
OSI Layer 6: Presentation
VLAN
Fiber Distributed Data Interface (FDDI)
13. New variant to traditional email spam on VoIP networks.
Spam over Internet Telephony (SPIT)
Point-To-Point Tunneling Protocol (PPTP)
Distributed Environment Challenge
Dual-Homed Firewall
14. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
UDP
802.16
OSI Layer 7: Application
Digital Subscriber Line (DSL)
15. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Proxy Firewall
Source Routing
OSI Data encapsulation
SPIM
16. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Multistation Access Unit (MAU)
Wide Area Network (WAN)
OSI Layer 3: Network Layer
Asynchronous Transfer Mode (ATM)
17. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
ARP Poisoning
Frame Relay
Switched Virtual Circuit (SVC)
Digital Subscriber Line (DSL)
18. Wireless communication that distributes individual signals across the allocated frequencies.
Shared Key Authentication (SKA)
Pulse Code Modulation (PCM)
FDDI-2
Spread Spectrum
19. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
10baseT
Ethernet (802.3)
DOS attacks from flooding
Virtual Private Network (VPN)
20. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Spread Spectrum
Committed Information Rate (CIR)
VoIP
Frequency Hopping Spread Spectrum (FHSS)
21. Set of rules that dictates how computer communicate over networks.
IPv6
Serial Line Internet Protocol (SLIP)
Definition of Protocol
Frame Relay
22. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Fiber-optic Cables
IPSec
Source Routing
Classless inter-domain routing (CIDR)
23. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Virtual Private Network (VPN)
OSI Layer 5: Session Layer
Packet Switching
802.11
24. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
SPIM
Point-To-Point (PPP)
ICMP (Internet Control Message Protocol)
Tree Topology
25. Type of wireless security standard that uses AES in CBC mode.
CBC-MAC Protocol (CCMP)
ThinNet - aka 10base2
Subnetting
Extensible Authentication Protocol (EAP)
26. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Integrated Services Digital Network (ISDN)
Carrier sense multiple access with collision detection (CSMA/CD)
Commonly used in logical bus - Ethernet - token ring.
Packet Switching
27. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Spread Spectrum
Fiber-optic Cables
Frequency Hopping Spread Spectrum (FHSS)
Network Address Translator (NAT)
28. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Application Proxy vs. Circuit Level
Simplex: One direction.
UDP
Dynamic Packet Filtering
29. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Carrier sense multiple access with collision detection (CSMA/CD)
Integrated Services Digital Network (ISDN)
Packet Filtering Firewall
Dynamic Packet Filtering
30. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Synchronous Data Link Control (SDLC)
Dedicated Links
Integrated Services Digital Network (ISDN)
Repeaters
31. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Multi-protocol Label Switching
Commonly used in Ethernet.
ARP (Address Resolution Protocol)
Screened Sub-Net
32. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Attenuation
Asynchronous Transfer Mode (ATM)
Channel Service Unit/Data Service Unit (CSU/DSU)
ThinNet - aka 10base2
33. Type of topology where computers all are connected to each other - which provides redundancy.
Commonly used in Internet.
ThickNet - aka 10base5.
Token Ring (802.5)
Attenuation
34. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
OSI Data encapsulation
Committed Information Rate (CIR)
802.15
Full-Duplex
35. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Multilevel Switching
Iterated Association
Extensible Authentication Protocol (EAP)
Commonly used in Ethernet.
36. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Dedicated Links
802.11b
OSI Layer 6: Presentation
X.25
37. Identifys a WLAN. Can be used to segment environments into different WLANS.
Wireless Application Protocol (WAP)
Service Set ID (SSID)
Iterated Association
OSI Layer 1: Physical
38. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Subnetting
Trunk Lines
Twisted Pair Cables
IPSec
39. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
Open Relay
Isochronous Communication Processes
Screened Sub-Net
40. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Attenuation
Packet Filtering Firewall
ThickNet - aka 10base5.
Password Authentication Protocol (PAP)
41. Problems: Requires more expense in cabling and extra effort to track down cable faults.
802.15
Mesh Topology
OSI Layer 6: Presentation
Proxy Firewall Strengths
42. In a token ring network - each computer is connected to this - which acts as a central hub.
Digital Subscriber Line (DSL)
Multistation Access Unit (MAU)
Commonly used in logical bus - Ethernet - token ring.
DNS (Domain Name System)
43. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Fiber-optic Cables
Bus Topology
ICMP (Internet Control Message Protocol)
Temporal Key Integrity Protocol (TKIP)
44. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Remote Access Servers
Commonly used in FDDI.
Tree Topology
Open Relay
45. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Private Branch Exchange (PBX)
Frame Relay
Attenuation
Ring Topology
46. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Proxy Firewall
Wireless Application Protocol (WAP)
Challenge Handshake Authentication Protocol (CHAP)
Multilevel Switching
47. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Plenum-rated Cables
Full-Duplex
Asynchronous Communication
T1
48. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Commonly used in Internet.
Tree Topology
Router
Shared Key Authentication (SKA)
49. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Cable Modem
Router
IPSec
T3
50. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Password Authentication Protocol (PAP)
ICMP (Internet Control Message Protocol)
Direct Sequence Spread Spectrum (DSSS)
Permanent Virtual Circuit (PVC)