SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol for allowing multi-cast (one to many) communication
Shared Key Authentication (SKA)
Bus Topology
IGMP
Screened Sub-Net
2. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
X.25
IGMP
Remote Access Servers
Session Initiation Protocol (SIP)
3. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
802.11
Wireless Application Protocol (WAP)
Reverse Address Resolution Protocol (RARP )
OSI Layer 3: Network Layer
4. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Switch
Multi-protocol Label Switching
Plenum-rated Cables
Simplex: One direction.
5. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Simplex: One direction.
FDDI-2
DOS attacks from flooding
Digital Subscriber Line (DSL)
6. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Layer 2 Tunneling Protocol (L2TP)
Virtual Private Network (VPN)
Circuit Switching
Layers in the TCP/IP Model
7. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
T1
Distributed Environment Challenge
Application Proxy Firewall
UDP
8. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Carrier sense multiple access with collision detection (CSMA/CD)
ThickNet - aka 10base5.
Extensible Authentication Protocol (EAP)
Bluejacking
9. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Wired Equivalent Privacy (WEP)
OSI Layer 7: Application
High Level Data Link Control (HLDC)
Dynamic Packet Filtering
10. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Point-To-Point Tunneling Protocol (PPTP)
Spread Spectrum
Commonly used in Internet.
Multilevel Switching
11. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Session Initiation Protocol (SIP)
IPSec
OSI Layer 1: Physical
DOS attacks from flooding
12. Both directions - only one application can send information at a time
Half-Duplex
OSI Layer 5: Session Layer
OSI Layer 7: Application
Virtual Private Network (VPN)
13. Network segment name for a DMZ created by two physical firewalls.
Half-Duplex
ARP (Address Resolution Protocol)
Screened Sub-Net
Committed Information Rate (CIR)
14. Identifys a WLAN. Can be used to segment environments into different WLANS.
Multi-protocol Label Switching
IGMP
Iterated Association
Service Set ID (SSID)
15. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Synchronous Communication
Loki Attack
OSI Layer 3: Network Layer
TCP
16. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Packet Filtering Firewall
Multilevel Switching
IPSec
OSI Layer 7: Application
17. Type of topology where computers all are connected to each other - which provides redundancy.
Multilevel Switching
Circuit Level Proxy Firewall
Commonly used in Internet.
VLAN
18. In the OSI layer 5 - these are the types of what?
IPv6
Simplex: One direction.
UDP
Classless inter-domain routing (CIDR)
19. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Dedicated Links
Ethernet (802.3)
802.11i
Synchronous Optical Networks (SONETS)
20. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Ring Topology
Serial Line Internet Protocol (SLIP)
Password Authentication Protocol (PAP)
ARP Poisoning
21. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Metropolitan Area Network (MAN)
Simplex: One direction.
802.11b
Circuit Switching
22. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
ThickNet - aka 10base5.
Fiber-optic Cables
IPv6
Circuit Switching
23. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ThinNet - aka 10base2
Proxy Firewall
Layers in the OSI Model
Iterated Association
24. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Session Initiation Protocol (SIP)
Bastion Host
SOCKS Firewall
Shared Key Authentication (SKA)
25. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Virtual Private Network (VPN)
OSI Layer 4: Transport Layer
Router
Private Branch Exchange (PBX)
26. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Distributed Environment Challenge
Session Initiation Protocol (SIP)
Spread Spectrum
Application Proxy Firewall
27. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
OSI Layer 2: Data Link Layer
Asynchronous Transfer Mode (ATM)
Carrier sense multiple access with collision detection (CSMA/CD)
Star Topology
28. SMTP server that is configured for sending email from any source to and destination.
Synchronous Data Link Control (SDLC)
IGMP
Open Relay
Multilevel Switching
29. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Packet Filtering Firewall
Metropolitan Area Network (MAN)
Carrier sense multiple access with collision detection (CSMA/CD)
Circuit Level Proxy Firewall
30. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Wireless Application Protocol (WAP)
DOS attacks from flooding
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Dedicated Links
31. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Isochronous Communication Processes
ARP Poisoning
Source Routing
T3
32. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Network Address Translator (NAT)
OSI Layer 2: Data Link Layer
802.11i
Point-To-Point Tunneling Protocol (PPTP)
33. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Isochronous Communication Processes
Simplex: One direction.
OSI Layer 2: Data Link Layer
Multistation Access Unit (MAU)
34. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Distributed Environment Challenge
Token Passing
Asynchronous Communication
Digital Subscriber Line (DSL)
35. Both directions - both applications can send information at a time. Session Layer Communication Modes
Direct Sequence Spread Spectrum (DSSS)
SPIM
Circuit Level Proxy Firewall
Full-Duplex
36. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
10baseT
Spread Spectrum
OSI Layer 5: Session Layer
Ring Topology
37. Type of firewall that lies between the perimeter router and and LAN.
DNS (Domain Name System)
Screened Host Firewall
Spam over Internet Telephony (SPIT)
Network Address Translator (NAT)
38. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Star Topology
Layers in the OSI Model
802.11b
DOS attacks from flooding
39. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Blue Boxing
DNS (Domain Name System)
Isochronous Communication Processes
Synchronous Data Link Control (SDLC)
40. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Trunk Lines
10baseT
Ethernet (802.3)
Switch
41. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
ICMP (Internet Control Message Protocol)
Service Set ID (SSID)
802.15
Isochronous Communication Processes
42. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Twisted Pair Cables
Stateful Firewall
Application Proxy Firewall
IPSec
43. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
DOS attacks from flooding
Trunk Lines
Virtual Private Network (VPN)
Blue Boxing
44. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Definition of Protocol
Coaxial Cables
Layer 2 Tunneling Protocol (L2TP)
CBC-MAC Protocol (CCMP)
45. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Commonly used in FDDI.
Proxy Firewall Strengths
OSI Layer 4: Transport Layer
Committed Information Rate (CIR)
46. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Fiber Distributed Data Interface (FDDI)
Application Proxy Firewall
Packet Filtering Firewall
Subnetting
47. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Circuit Level Proxy Firewall
Loki Attack
Crosstalk
Channel Service Unit/Data Service Unit (CSU/DSU)
48. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Dual-Homed Firewall
802.11a
ARP Poisoning
Password Authentication Protocol (PAP)
49. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Source Routing
802.11a
Cable Modem
Shared Key Authentication (SKA)
50. Communication devices that determine synchronization scheme before data transmission.
Remote Access Servers
Synchronous Communication
Wide Area Network (WAN)
Proxy Firewall