SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Identifys a WLAN. Can be used to segment environments into different WLANS.
Cable Modem
Service Set ID (SSID)
LLC (Logical Link Control - 802.2)
Layers in the TCP/IP Model
2. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
OSI Layer 3: Network Layer
Loki Attack
Distributed Environment Challenge
802.11
3. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
ICMP (Internet Control Message Protocol)
X.25
Cable Modem
VLAN
4. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
CBC-MAC Protocol (CCMP)
IGMP
ThinNet - aka 10base2
Fiber Distributed Data Interface (FDDI)
5. Standard that outlines wireless personal area network (WPAN) technologies.
ICMP (Internet Control Message Protocol)
Integrated Services Digital Network (ISDN)
802.15
Source Routing
6. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Dedicated Links
Synchronous Communication
Subnetting
Twisted Pair Cables
7. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
DNS (Domain Name System)
ICMP (Internet Control Message Protocol)
Circuit Switching
Frame Relay
8. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Extensible Authentication Protocol (EAP)
Cable Modem
Fiber Distributed Data Interface (FDDI)
Application Proxy Firewall
9. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Switch
ThickNet - aka 10base5.
Layers in the OSI Model
Attenuation
10. Protocol that translates a MAC address into an IP address.
Reverse Address Resolution Protocol (RARP )
Cable Modem
T1
Virtual Private Network (VPN)
11. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Frame Relay
Kernel Proxy Firewall
Multi-protocol Label Switching
Digital Subscriber Line (DSL)
12. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
T3
Session Initiation Protocol (SIP)
Switched Virtual Circuit (SVC)
Multilevel Switching
13. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Private Branch Exchange (PBX)
IGMP
Mesh Topology
802.11b
14. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Kernel Proxy Firewall
Virtual Private Network (VPN)
Multistation Access Unit (MAU)
Noise
15. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Frequency Hopping Spread Spectrum (FHSS)
Shared Key Authentication (SKA)
Stateful Firewall
Token Passing
16. Type of cabling problem signals from one wire crossing over to another wire.
Crosstalk
Proxy Firewall
Cable Modem
Star Topology
17. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Channel Service Unit/Data Service Unit (CSU/DSU)
Half-Duplex
Packet Switching
Coaxial Cables
18. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Commonly used in FDDI.
OSI Layer 7: Application
Wireless Application Protocol (WAP)
Bridge
19. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Port Numbers
Switched Virtual Circuit (SVC)
Kernel Proxy Firewall
Synchronous Data Link Control (SDLC)
20. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Layers in the TCP/IP Model
Asynchronous Transfer Mode (ATM)
Trunk Lines
Synchronous Communication
21. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Stateful Firewall
Commonly used in logical bus - Ethernet - token ring.
Synchronous Communication
Asynchronous Transfer Mode (ATM)
22. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Wireless Application Protocol (WAP)
Packet Filtering Firewall
Subnetting
IGMP
23. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
ThinNet - aka 10base2
Spread Spectrum
Coaxial Cables
Spam over Internet Telephony (SPIT)
24. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
FDDI-2
Commonly used in Ethernet.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
OSI Data encapsulation
25. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Remote Access Servers
Packet Filtering Firewall
802.11b
Token Passing
26. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
OSI Layer 3: Network Layer
Kernel Proxy Firewall
Application Proxy vs. Circuit Level
Switched Virtual Circuit (SVC)
27. Standard that addresses wireless MAN technologies.
Multistation Access Unit (MAU)
Packet Filtering Firewall
Crosstalk
802.16
28. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Session Initiation Protocol (SIP)
TCP
Isochronous Communication Processes
OSI Layer 3: Network Layer
29. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Kernel Proxy Firewall
Port Numbers
Router
802.15
30. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
Channel Service Unit/Data Service Unit (CSU/DSU)
Asynchronous Transfer Mode (ATM)
Repeaters
31. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Frame Relay
Packet Switching
Synchronous Data Link Control (SDLC)
IGMP
32. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Synchronous Communication
Layer 2 Tunneling Protocol (L2TP)
Bus Topology
Digital Subscriber Line (DSL)
33. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Crosstalk
Coaxial Cables
IPSec
Virtual Private Network (VPN)
34. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
IPSec
Packet Filtering Firewall
Ring Topology
Integrated Services Digital Network (ISDN)
35. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Layers in the TCP/IP Model
FDDI-2
Switched Virtual Circuit (SVC)
Ring Topology
36. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Wireless Application Protocol (WAP)
OSI Layer 5: Session Layer
Distributed Environment Challenge
Subnetting
37. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Private Branch Exchange (PBX)
Reverse Address Resolution Protocol (RARP )
IPSec
Iterated Association
38. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Mesh Topology
Permanent Virtual Circuit (PVC)
Commonly used in logical bus - Ethernet - token ring.
Dynamic Packet Filtering
39. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
SOCKS Firewall
FDDI-2
Challenge Handshake Authentication Protocol (CHAP)
40. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Isochronous Communication Processes
SOCKS Firewall
X.25
Token Passing
41. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Challenge Handshake Authentication Protocol (CHAP)
Direct Sequence Spread Spectrum (DSSS)
Token Passing
Kernel Proxy Firewall
42. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Screened Sub-Net
Proxy Firewall Strengths
Password Authentication Protocol (PAP)
X.25
43. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Classless inter-domain routing (CIDR)
Layer 2 Tunneling Protocol (L2TP)
Isochronous Communication Processes
ICMP (Internet Control Message Protocol)
44. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Open Relay
Multi-protocol Label Switching
ThinNet - aka 10base2
Fiber Distributed Data Interface (FDDI)
45. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Carrier sense multiple access with collision detection (CSMA/CD)
Packet Filtering Firewall
Commonly used in FDDI.
OSI Layer 5: Session Layer
46. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Frame Relay
DNS (Domain Name System)
SOCKS Firewall
Wireless Application Protocol (WAP)
47. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Digital Subscriber Line (DSL)
Point-To-Point (PPP)
Cable Modem
Synchronous Communication
48. Protocol that increases address size from 32 bits to 128 bits
VLAN
IPv6
Commonly used in FDDI.
Commonly used in logical bus - Ethernet - token ring.
49. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Attenuation
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Remote Access Servers
DNS (Domain Name System)
50. Type of wireless security standard that uses AES in CBC mode.
Frame Relay
CBC-MAC Protocol (CCMP)
Pulse Code Modulation (PCM)
Multilevel Switching