SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
DNS (Domain Name System)
Packet Filtering Firewall
Pulse Code Modulation (PCM)
2. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Circuit Switching
Token Passing
Subnetting
OSI Data encapsulation
3. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Star Topology
OSI Layer 2: Data Link Layer
ThinNet - aka 10base2
Carrier sense multiple access with collision detection (CSMA/CD)
4. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
ThinNet - aka 10base2
Dual-Homed Firewall
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Synchronous Data Link Control (SDLC)
5. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Application Proxy Firewall
Asynchronous Communication
Packet Filtering Firewall
10baseT
6. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
DOS attacks from flooding
Trunk Lines
ARP (Address Resolution Protocol)
SPIM
7. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Layers in the OSI Model
Synchronous Optical Networks (SONETS)
Challenge Handshake Authentication Protocol (CHAP)
Metropolitan Area Network (MAN)
8. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Password Authentication Protocol (PAP)
ARP Poisoning
OSI Layer 5: Session Layer
Ring Topology
9. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Fiber-optic Cables
Open Relay
Multilevel Switching
Packet Filtering Firewall
10. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
High Level Data Link Control (HLDC)
802.11i
Classless inter-domain routing (CIDR)
802.11
11. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Bluejacking
Star Topology
Packet Filtering Firewall
Packet Filtering Firewall
12. SMTP server that is configured for sending email from any source to and destination.
OSI Layer 1: Physical
802.11i
Open Relay
T3
13. Type of cabling problem signals from one wire crossing over to another wire.
Crosstalk
OSI Layer 7: Application
Half-Duplex
Router
14. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
802.16
802.11i
Fiber-optic Cables
802.11a
15. Communication devices that determine synchronization scheme before data transmission.
Coaxial Cables
Packet Switching
Synchronous Communication
Kernel Proxy Firewall
16. In a token ring network - each computer is connected to this - which acts as a central hub.
Multistation Access Unit (MAU)
Service Set ID (SSID)
OSI Layer 3: Network Layer
Loki Attack
17. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Full-Duplex
Iterated Association
Remote Access Servers
Repeaters
18. Type of network layout that separates and group computers logically.
VLAN
Virtual Private Network (VPN)
Simplex: One direction.
Temporal Key Integrity Protocol (TKIP)
19. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
IPv6
LLC (Logical Link Control - 802.2)
Commonly used in FDDI.
Password Authentication Protocol (PAP)
20. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Twisted Pair Cables
Distributed Environment Challenge
IPSec
Committed Information Rate (CIR)
21. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Fiber-optic Cables
CBC-MAC Protocol (CCMP)
Shared Key Authentication (SKA)
OSI Layer 2: Data Link Layer
22. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
OSI Layer 7: Application
Metropolitan Area Network (MAN)
Layer 2 Tunneling Protocol (L2TP)
Direct Sequence Spread Spectrum (DSSS)
23. Protocol for allowing multi-cast (one to many) communication
OSI Layer 6: Presentation
Bluejacking
IGMP
Packet Filtering Firewall
24. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Circuit Level Proxy Firewall
Dual-Homed Firewall
Isochronous Communication Processes
Distributed Environment Challenge
25. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
802.11a
Ring Topology
Synchronous Data Link Control (SDLC)
Token Passing
26. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Point-To-Point (PPP)
Synchronous Communication
Commonly used in Ethernet.
Direct Sequence Spread Spectrum (DSSS)
27. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
High Level Data Link Control (HLDC)
Open Relay
Proxy Firewall Strengths
Trunk Lines
28. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
802.11i
Layers in the TCP/IP Model
T1
Carrier sense multiple access with collision detection (CSMA/CD)
29. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
802.11i
High Level Data Link Control (HLDC)
Shared Key Authentication (SKA)
Virtual Private Network (VPN)
30. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Bridge
ARP Poisoning
Dynamic Packet Filtering
Synchronous Optical Networks (SONETS)
31. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Frequency Hopping Spread Spectrum (FHSS)
Stateful Firewall
Ethernet (802.3)
Half-Duplex
32. Type of topology where computers all are connected to each other - which provides redundancy.
Commonly used in Internet.
X.25
Frame Relay
Switch
33. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Iterated Association
UDP
VLAN
Mesh Topology
34. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Wired Equivalent Privacy (WEP)
Digital Subscriber Line (DSL)
Reverse Address Resolution Protocol (RARP )
Commonly used in FDDI.
35. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
Classless inter-domain routing (CIDR)
802.15
Switched Virtual Circuit (SVC)
UDP
36. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Attenuation
Shared Key Authentication (SKA)
802.11a
Plenum-rated Cables
37. Standard that outlines wireless personal area network (WPAN) technologies.
Source Routing
802.15
Multistation Access Unit (MAU)
IPv6
38. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
802.11a
Switched Virtual Circuit (SVC)
Fiber Distributed Data Interface (FDDI)
10baseT
39. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Frame Relay
VoIP
Layers in the OSI Model
X.25
40. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
X.25
Isochronous Communication Processes
Circuit Level Proxy Firewall
Half-Duplex
41. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
OSI Data encapsulation
Port Numbers
Session Initiation Protocol (SIP)
Temporal Key Integrity Protocol (TKIP)
42. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Digital Subscriber Line (DSL)
Synchronous Data Link Control (SDLC)
Asynchronous Communication
Service Set ID (SSID)
43. Identifys a WLAN. Can be used to segment environments into different WLANS.
Source Routing
Crosstalk
Service Set ID (SSID)
Simplex: One direction.
44. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Cable Modem
CBC-MAC Protocol (CCMP)
DNS (Domain Name System)
Asynchronous Communication
45. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
IPv6
Integrated Services Digital Network (ISDN)
Channel Service Unit/Data Service Unit (CSU/DSU)
Proxy Firewall
46. Type of firewall that lies between the perimeter router and and LAN.
Integrated Services Digital Network (ISDN)
Screened Host Firewall
Multi-protocol Label Switching
Synchronous Data Link Control (SDLC)
47. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Bridge
Open System Authentication (OSA)
Virtual Private Network (VPN)
Multi-protocol Label Switching
48. Problems: Central device is a single point of failure.
Permanent Virtual Circuit (PVC)
Star Topology
TCP
Circuit Level Proxy Firewall
49. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Fiber Distributed Data Interface (FDDI)
Network Address Translator (NAT)
Wide Area Network (WAN)
Proxy Firewall Strengths
50. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Proxy Firewall Strengths
Packet Filtering Firewall
Simplex: One direction.
Commonly used in Ethernet.