SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Ring Topology
Network Address Translator (NAT)
Application Proxy Firewall
Bridge
2. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
ICMP (Internet Control Message Protocol)
Bluejacking
T1
Asynchronous Communication
3. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Shared Key Authentication (SKA)
Commonly used in logical bus - Ethernet - token ring.
Service Set ID (SSID)
Half-Duplex
4. Network segment name for a DMZ created by two physical firewalls.
TCP
Bluejacking
Screened Sub-Net
Screened Host Firewall
5. New variant to traditional email spam on VoIP networks.
Carrier sense multiple access with collision detection (CSMA/CD)
802.11b
Spam over Internet Telephony (SPIT)
Layer 2 Tunneling Protocol (L2TP)
6. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
High Level Data Link Control (HLDC)
DOS attacks from flooding
Synchronous Optical Networks (SONETS)
10baseT
7. Type of cabling problem signals from one wire crossing over to another wire.
Virtual Private Network (VPN)
OSI Layer 5: Session Layer
Crosstalk
Multistation Access Unit (MAU)
8. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Packet Filtering Firewall
OSI Layer 3: Network Layer
FDDI-2
Application Proxy Firewall
9. Wireless standard that will improve security of wireless communication
Commonly used in Internet.
SPIM
802.11i
802.11
10. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Ethernet (802.3)
DNS (Domain Name System)
Point-To-Point Tunneling Protocol (PPTP)
OSI Layer 7: Application
11. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
IPv6
Challenge Handshake Authentication Protocol (CHAP)
Open System Authentication (OSA)
Frame Relay
12. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Serial Line Internet Protocol (SLIP)
Plenum-rated Cables
Token Ring (802.5)
Synchronous Communication
13. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
SOCKS Firewall
Blue Boxing
UDP
Fiber Distributed Data Interface (FDDI)
14. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Token Passing
Permanent Virtual Circuit (PVC)
Channel Service Unit/Data Service Unit (CSU/DSU)
Layers in the TCP/IP Model
15. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
DOS attacks from flooding
UDP
Cable Modem
Reverse Address Resolution Protocol (RARP )
16. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Wireless Application Protocol (WAP)
Proxy Firewall Strengths
Multistation Access Unit (MAU)
OSI Layer 2: Data Link Layer
17. In a token ring network - each computer is connected to this - which acts as a central hub.
TCP
Shared Key Authentication (SKA)
Multistation Access Unit (MAU)
Bridge
18. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Commonly used in FDDI.
Asynchronous Communication
Challenge Handshake Authentication Protocol (CHAP)
OSI Layer 4: Transport Layer
19. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Private Branch Exchange (PBX)
Bastion Host
Dedicated Links
Challenge Handshake Authentication Protocol (CHAP)
20. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
OSI Layer 3: Network Layer
Wired Equivalent Privacy (WEP)
TCP
Network Address Translator (NAT)
21. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
ARP Poisoning
TCP
IPSec
Screened Sub-Net
22. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Digital Subscriber Line (DSL)
Packet Filtering Firewall
TCP
Application Proxy Firewall
23. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Private Branch Exchange (PBX)
Layers in the TCP/IP Model
Virtual Private Network (VPN)
Committed Information Rate (CIR)
24. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
SOCKS Firewall
Asynchronous Transfer Mode (ATM)
Subnetting
IPSec
25. Type of wireless security standard that uses AES in CBC mode.
Permanent Virtual Circuit (PVC)
Frame Relay
Spread Spectrum
CBC-MAC Protocol (CCMP)
26. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Half-Duplex
802.11a
Proxy Firewall
Packet Filtering Firewall
27. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Frame Relay
Session Initiation Protocol (SIP)
802.11a
FDDI-2
28. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
DOS attacks from flooding
Channel Service Unit/Data Service Unit (CSU/DSU)
Layers in the OSI Model
Carrier sense multiple access with collision detection (CSMA/CD)
29. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Frame Relay
Dedicated Links
Kernel Proxy Firewall
Simplex: One direction.
30. Identifys a WLAN. Can be used to segment environments into different WLANS.
Service Set ID (SSID)
Synchronous Communication
OSI Layer 2: Data Link Layer
DNS (Domain Name System)
31. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
Distributed Environment Challenge
802.16
CBC-MAC Protocol (CCMP)
32. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Classless inter-domain routing (CIDR)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
802.11a
ICMP (Internet Control Message Protocol)
33. Communication devices that determine synchronization scheme before data transmission.
ARP (Address Resolution Protocol)
Blue Boxing
Bus Topology
Synchronous Communication
34. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Frame Relay
Dedicated Links
Synchronous Optical Networks (SONETS)
OSI Layer 5: Session Layer
35. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Session Initiation Protocol (SIP)
Blue Boxing
Switch
Proxy Firewall Strengths
36. Type of network layout that separates and group computers logically.
Spread Spectrum
VLAN
Direct Sequence Spread Spectrum (DSSS)
Wired Equivalent Privacy (WEP)
37. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Packet Filtering Firewall
Subnetting
Half-Duplex
Synchronous Data Link Control (SDLC)
38. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Token Ring (802.5)
OSI Layer 7: Application
Carrier sense multiple access with collision detection (CSMA/CD)
Wired Equivalent Privacy (WEP)
39. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
OSI Layer 4: Transport Layer
ThickNet - aka 10base5.
Distributed Environment Challenge
Packet Filtering Firewall
40. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Mesh Topology
Temporal Key Integrity Protocol (TKIP)
Dedicated Links
ARP Poisoning
41. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
OSI Layer 3: Network Layer
Ethernet (802.3)
Digital Subscriber Line (DSL)
Switched Virtual Circuit (SVC)
42. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
IPSec
Packet Filtering Firewall
Commonly used in logical bus - Ethernet - token ring.
Isochronous Communication Processes
43. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Virtual Private Network (VPN)
Temporal Key Integrity Protocol (TKIP)
ARP (Address Resolution Protocol)
OSI Layer 5: Session Layer
44. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Commonly used in logical bus - Ethernet - token ring.
Circuit Level Proxy Firewall
Subnetting
OSI Layer 1: Physical
45. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Stateful Firewall
Wired Equivalent Privacy (WEP)
SOCKS Firewall
X.25
46. Both directions - only one application can send information at a time
802.11b
Subnetting
OSI Data encapsulation
Half-Duplex
47. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
OSI Layer 7: Application
Token Passing
Screened Sub-Net
Layers in the TCP/IP Model
48. Standard that addresses wireless MAN technologies.
Layers in the TCP/IP Model
802.16
Wireless Application Protocol (WAP)
SOCKS Firewall
49. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Ethernet (802.3)
IPSec
Layers in the TCP/IP Model
Channel Service Unit/Data Service Unit (CSU/DSU)
50. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Carrier sense multiple access with collision detection (CSMA/CD)
Session Initiation Protocol (SIP)
802.11i
Switched Virtual Circuit (SVC)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests