SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This network technology determines which system will send data based on which one has the token.
Token Passing
802.15
IPv6
Wireless Application Protocol (WAP)
2. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Router
ICMP (Internet Control Message Protocol)
Commonly used in logical bus - Ethernet - token ring.
Service Set ID (SSID)
3. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Commonly used in Internet.
Screened Sub-Net
Definition of Protocol
Port Numbers
4. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Fiber Distributed Data Interface (FDDI)
Layer 2 Tunneling Protocol (L2TP)
Stateful Firewall
Noise
5. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
10baseT
Direct Sequence Spread Spectrum (DSSS)
ICMP (Internet Control Message Protocol)
Attenuation
6. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Permanent Virtual Circuit (PVC)
Private Branch Exchange (PBX)
Virtual Private Network (VPN)
T1
7. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Asynchronous Communication
T3
Remote Access Servers
Layer 2 Tunneling Protocol (L2TP)
8. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
High Level Data Link Control (HLDC)
Permanent Virtual Circuit (PVC)
802.11a
Star Topology
9. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Layers in the TCP/IP Model
Subnetting
ARP Poisoning
Open System Authentication (OSA)
10. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Packet Switching
Channel Service Unit/Data Service Unit (CSU/DSU)
Full-Duplex
Multilevel Switching
11. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Integrated Services Digital Network (ISDN)
Circuit Level Proxy Firewall
ICMP (Internet Control Message Protocol)
Spread Spectrum
12. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Plenum-rated Cables
SOCKS Firewall
Blue Boxing
Channel Service Unit/Data Service Unit (CSU/DSU)
13. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
High Level Data Link Control (HLDC)
Committed Information Rate (CIR)
Synchronous Communication
802.11a
14. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
Definition of Protocol
Digital Subscriber Line (DSL)
OSI Layer 7: Application
Bridge
15. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Layers in the TCP/IP Model
VLAN
Synchronous Data Link Control (SDLC)
SPIM
16. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
ARP (Address Resolution Protocol)
Plenum-rated Cables
Tree Topology
Layers in the TCP/IP Model
17. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Service Set ID (SSID)
Open System Authentication (OSA)
Wired Equivalent Privacy (WEP)
DOS attacks from flooding
18. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
Stateful Firewall
Extensible Authentication Protocol (EAP)
TCP
19. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Fiber-optic Cables
Multilevel Switching
Proxy Firewall
Dynamic Packet Filtering
20. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Remote Access Servers
Loki Attack
10baseT
802.11
21. SMTP server that is configured for sending email from any source to and destination.
Port Numbers
Open System Authentication (OSA)
Open Relay
Bus Topology
22. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Circuit Switching
Wireless Application Protocol (WAP)
Kernel Proxy Firewall
OSI Layer 5: Session Layer
23. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Layers in the TCP/IP Model
Bastion Host
OSI Layer 5: Session Layer
ThinNet - aka 10base2
24. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Application Proxy Firewall
ARP (Address Resolution Protocol)
Twisted Pair Cables
DNS (Domain Name System)
25. Wireless standard that will improve security of wireless communication
Multi-protocol Label Switching
ThickNet - aka 10base5.
802.11i
Direct Sequence Spread Spectrum (DSSS)
26. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Wide Area Network (WAN)
Dynamic Packet Filtering
802.11b
Half-Duplex
27. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Screened Sub-Net
Bus Topology
Iterated Association
Crosstalk
28. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Layer 2 Tunneling Protocol (L2TP)
Metropolitan Area Network (MAN)
Frequency Hopping Spread Spectrum (FHSS)
Plenum-rated Cables
29. Spam over IM
SPIM
IPv6
Screened Host Firewall
FDDI-2
30. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Router
Synchronous Optical Networks (SONETS)
OSI Layer 1: Physical
Shared Key Authentication (SKA)
31. Standard that outlines wireless personal area network (WPAN) technologies.
10baseT
802.15
Kernel Proxy Firewall
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
32. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
802.11a
T3
Serial Line Internet Protocol (SLIP)
ThinNet - aka 10base2
33. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Metropolitan Area Network (MAN)
Application Proxy Firewall
Spread Spectrum
Cable Modem
34. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
802.11
Fiber-optic Cables
Full-Duplex
Fiber Distributed Data Interface (FDDI)
35. Communication devices that determine synchronization scheme before data transmission.
Port Numbers
SOCKS Firewall
Committed Information Rate (CIR)
Synchronous Communication
36. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Committed Information Rate (CIR)
Bastion Host
Synchronous Data Link Control (SDLC)
Digital Subscriber Line (DSL)
37. New variant to traditional email spam on VoIP networks.
Metropolitan Area Network (MAN)
802.11
Synchronous Communication
Spam over Internet Telephony (SPIT)
38. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Wireless Application Protocol (WAP)
Frame Relay
Half-Duplex
Loki Attack
39. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
ThickNet - aka 10base5.
Open Relay
Coaxial Cables
Session Initiation Protocol (SIP)
40. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ThinNet - aka 10base2
Twisted Pair Cables
Half-Duplex
Definition of Protocol
41. Problems: Central device is a single point of failure.
Star Topology
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
OSI Layer 6: Presentation
Virtual Private Network (VPN)
42. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Token Ring (802.5)
Asynchronous Communication
Remote Access Servers
Synchronous Optical Networks (SONETS)
43. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
UDP
Ethernet (802.3)
802.11
Wireless Application Protocol (WAP)
44. Standard that addresses wireless MAN technologies.
Proxy Firewall
802.16
Cable Modem
Token Passing
45. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Blue Boxing
Switch
Mesh Topology
OSI Layer 2: Data Link Layer
46. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
TCP
ICMP (Internet Control Message Protocol)
Remote Access Servers
Serial Line Internet Protocol (SLIP)
47. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Simplex: One direction.
Repeaters
Packet Filtering Firewall
48. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
TCP
Virtual Private Network (VPN)
Token Passing
Commonly used in FDDI.
49. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
Packet Filtering Firewall
OSI Layer 7: Application
802.16
50. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Source Routing
Packet Switching
OSI Data encapsulation
802.11b