SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
LLC (Logical Link Control - 802.2)
IPv6
Source Routing
OSI Layer 3: Network Layer
2. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Proxy Firewall Strengths
Kernel Proxy Firewall
Commonly used in Ethernet.
Digital Subscriber Line (DSL)
3. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
FDDI-2
Proxy Firewall
T3
Application Proxy vs. Circuit Level
4. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Subnetting
Packet Filtering Firewall
OSI Layer 6: Presentation
Metropolitan Area Network (MAN)
5. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
Attenuation
Token Ring (802.5)
Layers in the TCP/IP Model
6. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Direct Sequence Spread Spectrum (DSSS)
Layer 2 Tunneling Protocol (L2TP)
OSI Data encapsulation
Virtual Private Network (VPN)
7. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
Full-Duplex
Bluejacking
Bastion Host
8. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Kernel Proxy Firewall
Packet Filtering Firewall
ICMP (Internet Control Message Protocol)
Port Numbers
9. Type of cabling problem signals from one wire crossing over to another wire.
Crosstalk
ARP (Address Resolution Protocol)
Commonly used in Internet.
Token Passing
10. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Wired Equivalent Privacy (WEP)
Commonly used in Internet.
IPSec
Permanent Virtual Circuit (PVC)
11. Identifys a WLAN. Can be used to segment environments into different WLANS.
Service Set ID (SSID)
VLAN
Layers in the TCP/IP Model
T1
12. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
OSI Layer 2: Data Link Layer
Simplex: One direction.
Cable Modem
Blue Boxing
13. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Frame Relay
Layers in the OSI Model
Attenuation
Plenum-rated Cables
14. Both directions - both applications can send information at a time. Session Layer Communication Modes
Frequency Hopping Spread Spectrum (FHSS)
Plenum-rated Cables
Circuit Level Proxy Firewall
Full-Duplex
15. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
OSI Layer 4: Transport Layer
ThinNet - aka 10base2
Point-To-Point (PPP)
802.11a
16. Network segment name for a DMZ created by two physical firewalls.
Distributed Environment Challenge
Open System Authentication (OSA)
Screened Sub-Net
Temporal Key Integrity Protocol (TKIP)
17. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
OSI Data encapsulation
Proxy Firewall Strengths
CBC-MAC Protocol (CCMP)
Layers in the TCP/IP Model
18. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Multi-protocol Label Switching
Commonly used in FDDI.
Fiber-optic Cables
Switch
19. Communication devices that determine synchronization scheme before data transmission.
Router
Synchronous Communication
Open System Authentication (OSA)
Classless inter-domain routing (CIDR)
20. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
IGMP
Iterated Association
Spread Spectrum
Service Set ID (SSID)
21. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Subnetting
Circuit Switching
Switch
Point-To-Point (PPP)
22. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Shared Key Authentication (SKA)
Full-Duplex
802.11a
Stateful Firewall
23. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
SPIM
OSI Layer 5: Session Layer
Session Initiation Protocol (SIP)
Dual-Homed Firewall
24. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Isochronous Communication Processes
LLC (Logical Link Control - 802.2)
Circuit Level Proxy Firewall
Bridge
25. Spam over IM
Point-To-Point (PPP)
IGMP
Screened Sub-Net
SPIM
26. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
802.11b
Private Branch Exchange (PBX)
VoIP
Frequency Hopping Spread Spectrum (FHSS)
27. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
DNS (Domain Name System)
Layer 2 Tunneling Protocol (L2TP)
OSI Layer 4: Transport Layer
Service Set ID (SSID)
28. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Switched Virtual Circuit (SVC)
Permanent Virtual Circuit (PVC)
Half-Duplex
Network Address Translator (NAT)
29. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in logical bus - Ethernet - token ring.
802.16
Proxy Firewall
TCP
30. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
802.11a
Virtual Private Network (VPN)
OSI Layer 3: Network Layer
Bus Topology
31. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
IPSec
Frame Relay
Password Authentication Protocol (PAP)
Bus Topology
32. In a token ring network - each computer is connected to this - which acts as a central hub.
Tree Topology
CBC-MAC Protocol (CCMP)
Multistation Access Unit (MAU)
Router
33. Type of topology where computers all are connected to each other - which provides redundancy.
Dual-Homed Firewall
Simplex: One direction.
Ethernet (802.3)
Commonly used in Internet.
34. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Layers in the TCP/IP Model
SOCKS Firewall
OSI Layer 3: Network Layer
OSI Layer 2: Data Link Layer
35. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Bastion Host
UDP
Commonly used in FDDI.
Isochronous Communication Processes
36. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Synchronous Optical Networks (SONETS)
OSI Layer 1: Physical
Commonly used in FDDI.
OSI Layer 4: Transport Layer
37. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Password Authentication Protocol (PAP)
Digital Subscriber Line (DSL)
Token Ring (802.5)
Circuit Switching
38. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Commonly used in Internet.
Token Ring (802.5)
Point-To-Point Tunneling Protocol (PPTP)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
39. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Synchronous Optical Networks (SONETS)
Open Relay
OSI Layer 6: Presentation
Commonly used in FDDI.
40. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Iterated Association
Attenuation
IPSec
41. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
DOS attacks from flooding
Attenuation
Full-Duplex
Wireless Application Protocol (WAP)
42. Problems: Central device is a single point of failure.
Simplex: One direction.
Commonly used in FDDI.
TCP
Star Topology
43. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Circuit Switching
Multilevel Switching
ThinNet - aka 10base2
Stateful Firewall
44. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Serial Line Internet Protocol (SLIP)
802.11a
Attenuation
ThinNet - aka 10base2
45. In the OSI layer 5 - these are the types of what?
Coaxial Cables
Kernel Proxy Firewall
ICMP (Internet Control Message Protocol)
Simplex: One direction.
46. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Carrier sense multiple access with collision detection (CSMA/CD)
Direct Sequence Spread Spectrum (DSSS)
Coaxial Cables
Circuit Switching
47. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Commonly used in Ethernet.
Extensible Authentication Protocol (EAP)
DOS attacks from flooding
OSI Layer 5: Session Layer
48. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Synchronous Optical Networks (SONETS)
Bluejacking
Ring Topology
Shared Key Authentication (SKA)
49. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
VLAN
Full-Duplex
DNS (Domain Name System)
OSI Layer 2: Data Link Layer
50. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
Screened Host Firewall
Committed Information Rate (CIR)
Commonly used in logical bus - Ethernet - token ring.
OSI Layer 7: Application