SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Twisted Pair Cables
Proxy Firewall
Ring Topology
Commonly used in Ethernet.
2. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Dynamic Packet Filtering
ARP Poisoning
Session Initiation Protocol (SIP)
OSI Layer 3: Network Layer
3. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Pulse Code Modulation (PCM)
IPSec
Frame Relay
UDP
4. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Challenge Handshake Authentication Protocol (CHAP)
Digital Subscriber Line (DSL)
Virtual Private Network (VPN)
Port Numbers
5. Spam over IM
Subnetting
Bridge
SPIM
Synchronous Data Link Control (SDLC)
6. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Remote Access Servers
T3
DOS attacks from flooding
Asynchronous Transfer Mode (ATM)
7. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
OSI Layer 3: Network Layer
802.16
Integrated Services Digital Network (ISDN)
Password Authentication Protocol (PAP)
8. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
LLC (Logical Link Control - 802.2)
ICMP (Internet Control Message Protocol)
Definition of Protocol
Stateful Firewall
9. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
IPv6
T1
ThickNet - aka 10base5.
Channel Service Unit/Data Service Unit (CSU/DSU)
10. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
ICMP (Internet Control Message Protocol)
TCP
Network Address Translator (NAT)
OSI Data encapsulation
11. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Switch
Iterated Association
Bastion Host
Dynamic Packet Filtering
12. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
Dynamic Packet Filtering
UDP
Proxy Firewall
Port Numbers
13. Both directions - both applications can send information at a time. Session Layer Communication Modes
Trunk Lines
Proxy Firewall
Switch
Full-Duplex
14. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Session Initiation Protocol (SIP)
ThickNet - aka 10base5.
TCP
Commonly used in logical bus - Ethernet - token ring.
15. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Permanent Virtual Circuit (PVC)
Ring Topology
Switch
OSI Data encapsulation
16. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Noise
TCP
Dynamic Packet Filtering
Proxy Firewall
17. Set of rules that dictates how computer communicate over networks.
Reverse Address Resolution Protocol (RARP )
Definition of Protocol
Fiber Distributed Data Interface (FDDI)
Layers in the OSI Model
18. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Frequency Hopping Spread Spectrum (FHSS)
ICMP (Internet Control Message Protocol)
Asynchronous Transfer Mode (ATM)
Half-Duplex
19. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Trunk Lines
Virtual Private Network (VPN)
Carrier sense multiple access with collision detection (CSMA/CD)
10baseT
20. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
Asynchronous Transfer Mode (ATM)
Commonly used in Ethernet.
Integrated Services Digital Network (ISDN)
21. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Packet Filtering Firewall
Isochronous Communication Processes
Subnetting
Metropolitan Area Network (MAN)
22. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Layer 2 Tunneling Protocol (L2TP)
802.11
802.11i
Crosstalk
23. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
802.11a
OSI Layer 7: Application
Extensible Authentication Protocol (EAP)
Channel Service Unit/Data Service Unit (CSU/DSU)
24. Problems: Central device is a single point of failure.
Star Topology
Ring Topology
Digital Subscriber Line (DSL)
OSI Layer 2: Data Link Layer
25. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Synchronous Optical Networks (SONETS)
Commonly used in FDDI.
OSI Layer 1: Physical
OSI Layer 6: Presentation
26. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
802.16
Wired Equivalent Privacy (WEP)
802.11a
Layer 2 Tunneling Protocol (L2TP)
27. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
OSI Data encapsulation
ICMP (Internet Control Message Protocol)
IPv6
Challenge Handshake Authentication Protocol (CHAP)
28. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Frame Relay
IPv6
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Multi-protocol Label Switching
29. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Kernel Proxy Firewall
Packet Switching
Fiber Distributed Data Interface (FDDI)
Commonly used in Ethernet.
30. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
TCP
Classless inter-domain routing (CIDR)
SOCKS Firewall
VoIP
31. Communication devices that determine synchronization scheme before data transmission.
Temporal Key Integrity Protocol (TKIP)
Synchronous Communication
Tree Topology
Private Branch Exchange (PBX)
32. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Permanent Virtual Circuit (PVC)
Twisted Pair Cables
ARP (Address Resolution Protocol)
Digital Subscriber Line (DSL)
33. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
DOS attacks from flooding
Screened Sub-Net
Wired Equivalent Privacy (WEP)
Token Ring (802.5)
34. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
T1
Fiber Distributed Data Interface (FDDI)
Iterated Association
35. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Packet Filtering Firewall
Layer 2 Tunneling Protocol (L2TP)
Network Address Translator (NAT)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
36. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Router
Simplex: One direction.
10baseT
Token Ring (802.5)
37. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Point-To-Point (PPP)
Synchronous Data Link Control (SDLC)
ThinNet - aka 10base2
Shared Key Authentication (SKA)
38. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Blue Boxing
Serial Line Internet Protocol (SLIP)
FDDI-2
Application Proxy Firewall
39. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Fiber-optic Cables
Dual-Homed Firewall
Iterated Association
Port Numbers
40. Protocol for allowing multi-cast (one to many) communication
Application Proxy vs. Circuit Level
IGMP
Coaxial Cables
Frequency Hopping Spread Spectrum (FHSS)
41. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
OSI Layer 1: Physical
Dual-Homed Firewall
SOCKS Firewall
IGMP
42. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
LLC (Logical Link Control - 802.2)
Extensible Authentication Protocol (EAP)
Bridge
Tree Topology
43. Protocol that translates a MAC address into an IP address.
Switch
Application Proxy Firewall
Proxy Firewall
Reverse Address Resolution Protocol (RARP )
44. New variant to traditional email spam on VoIP networks.
Wired Equivalent Privacy (WEP)
10baseT
Spam over Internet Telephony (SPIT)
Open Relay
45. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Circuit Level Proxy Firewall
CBC-MAC Protocol (CCMP)
Definition of Protocol
Commonly used in Ethernet.
46. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Attenuation
Isochronous Communication Processes
802.11i
Proxy Firewall Strengths
47. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Source Routing
Serial Line Internet Protocol (SLIP)
Synchronous Data Link Control (SDLC)
VoIP
48. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Coaxial Cables
IPSec
Synchronous Data Link Control (SDLC)
Distributed Environment Challenge
49. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Ring Topology
Switched Virtual Circuit (SVC)
Screened Sub-Net
Proxy Firewall Strengths
50. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Switch
High Level Data Link Control (HLDC)
Twisted Pair Cables
Application Proxy Firewall