SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Bus Topology
Classless inter-domain routing (CIDR)
Switch
10baseT
2. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Screened Host Firewall
10baseT
Stateful Firewall
Half-Duplex
3. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
802.11a
Metropolitan Area Network (MAN)
802.15
Dynamic Packet Filtering
4. Both directions - both applications can send information at a time. Session Layer Communication Modes
Serial Line Internet Protocol (SLIP)
Full-Duplex
Application Proxy Firewall
Commonly used in Internet.
5. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Network Address Translator (NAT)
Stateful Firewall
LLC (Logical Link Control - 802.2)
Synchronous Data Link Control (SDLC)
6. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Blue Boxing
Synchronous Communication
Twisted Pair Cables
Attenuation
7. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Trunk Lines
Point-To-Point (PPP)
Mesh Topology
Tree Topology
8. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
802.11a
CBC-MAC Protocol (CCMP)
Source Routing
802.16
9. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
802.15
OSI Layer 2: Data Link Layer
Reverse Address Resolution Protocol (RARP )
UDP
10. Wireless communication that distributes individual signals across the allocated frequencies.
Dedicated Links
Spread Spectrum
Point-To-Point Tunneling Protocol (PPTP)
Multi-protocol Label Switching
11. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Carrier sense multiple access with collision detection (CSMA/CD)
Session Initiation Protocol (SIP)
Direct Sequence Spread Spectrum (DSSS)
X.25
12. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Channel Service Unit/Data Service Unit (CSU/DSU)
Half-Duplex
Bluejacking
Star Topology
13. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Cable Modem
Full-Duplex
Spread Spectrum
OSI Layer 4: Transport Layer
14. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Circuit Level Proxy Firewall
Multistation Access Unit (MAU)
LLC (Logical Link Control - 802.2)
Token Passing
15. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Switched Virtual Circuit (SVC)
Multilevel Switching
Metropolitan Area Network (MAN)
Dual-Homed Firewall
16. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Proxy Firewall Strengths
T1
Service Set ID (SSID)
VLAN
17. Type of topology where computers all are connected to each other - which provides redundancy.
Wired Equivalent Privacy (WEP)
UDP
Commonly used in Internet.
Commonly used in Ethernet.
18. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Synchronous Optical Networks (SONETS)
DNS (Domain Name System)
Frame Relay
Star Topology
19. Type of network layout that separates and group computers logically.
802.11a
VLAN
Commonly used in Internet.
802.16
20. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Asynchronous Communication
Bastion Host
Loki Attack
Commonly used in FDDI.
21. Spam over IM
Screened Host Firewall
Crosstalk
SPIM
T3
22. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
OSI Layer 3: Network Layer
Password Authentication Protocol (PAP)
Serial Line Internet Protocol (SLIP)
23. New variant to traditional email spam on VoIP networks.
Application Proxy vs. Circuit Level
Bridge
Spam over Internet Telephony (SPIT)
Circuit Level Proxy Firewall
24. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
ThickNet - aka 10base5.
High Level Data Link Control (HLDC)
Packet Filtering Firewall
T3
25. Type of firewall that lies between the perimeter router and and LAN.
Wide Area Network (WAN)
High Level Data Link Control (HLDC)
Screened Host Firewall
Wired Equivalent Privacy (WEP)
26. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in logical bus - Ethernet - token ring.
Layers in the TCP/IP Model
ICMP (Internet Control Message Protocol)
Serial Line Internet Protocol (SLIP)
27. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Router
VLAN
ThinNet - aka 10base2
802.11a
28. SMTP server that is configured for sending email from any source to and destination.
Open Relay
Screened Sub-Net
Wide Area Network (WAN)
Circuit Switching
29. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Wired Equivalent Privacy (WEP)
Point-To-Point Tunneling Protocol (PPTP)
802.11
802.11a
30. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Screened Sub-Net
Synchronous Optical Networks (SONETS)
Trunk Lines
Coaxial Cables
31. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
802.11b
SPIM
DOS attacks from flooding
OSI Layer 5: Session Layer
32. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Packet Switching
DNS (Domain Name System)
Multi-protocol Label Switching
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
33. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
ICMP (Internet Control Message Protocol)
ARP Poisoning
Commonly used in logical bus - Ethernet - token ring.
34. Set of rules that dictates how computer communicate over networks.
Definition of Protocol
Challenge Handshake Authentication Protocol (CHAP)
OSI Layer 5: Session Layer
Permanent Virtual Circuit (PVC)
35. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Spread Spectrum
Dedicated Links
Layer 2 Tunneling Protocol (L2TP)
Private Branch Exchange (PBX)
36. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Layers in the TCP/IP Model
Wired Equivalent Privacy (WEP)
TCP
OSI Layer 1: Physical
37. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Stateful Firewall
Router
Metropolitan Area Network (MAN)
Password Authentication Protocol (PAP)
38. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Frequency Hopping Spread Spectrum (FHSS)
Metropolitan Area Network (MAN)
802.11
Distributed Environment Challenge
39. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Trunk Lines
Coaxial Cables
Layers in the OSI Model
802.16
40. Wireless standard that will improve security of wireless communication
802.11i
Layer 2 Tunneling Protocol (L2TP)
UDP
Noise
41. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Half-Duplex
Pulse Code Modulation (PCM)
Frame Relay
Bluejacking
42. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Carrier sense multiple access with collision detection (CSMA/CD)
Application Proxy vs. Circuit Level
Session Initiation Protocol (SIP)
Proxy Firewall Strengths
43. In the OSI layer 5 - these are the types of what?
Simplex: One direction.
Definition of Protocol
Packet Filtering Firewall
Carrier sense multiple access with collision detection (CSMA/CD)
44. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
FDDI-2
802.16
Twisted Pair Cables
Wired Equivalent Privacy (WEP)
45. This network technology determines which system will send data based on which one has the token.
Screened Host Firewall
Application Proxy Firewall
Token Passing
OSI Layer 2: Data Link Layer
46. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Point-To-Point Tunneling Protocol (PPTP)
Plenum-rated Cables
ARP (Address Resolution Protocol)
IGMP
47. Communication devices that determine synchronization scheme before data transmission.
Ethernet (802.3)
Isochronous Communication Processes
Synchronous Communication
Commonly used in logical bus - Ethernet - token ring.
48. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Frequency Hopping Spread Spectrum (FHSS)
Token Passing
Packet Filtering Firewall
Direct Sequence Spread Spectrum (DSSS)
49. In a token ring network - each computer is connected to this - which acts as a central hub.
Distributed Environment Challenge
Multistation Access Unit (MAU)
LLC (Logical Link Control - 802.2)
Open System Authentication (OSA)
50. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Port Numbers
Application Proxy Firewall
Ethernet (802.3)
Classless inter-domain routing (CIDR)