SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
Token Ring (802.5)
Switch
Open System Authentication (OSA)
2. Spam over IM
Twisted Pair Cables
OSI Layer 4: Transport Layer
SPIM
ThickNet - aka 10base5.
3. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Bastion Host
Point-To-Point (PPP)
Synchronous Communication
Layer 2 Tunneling Protocol (L2TP)
4. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Bluejacking
Open Relay
ARP Poisoning
T1
5. Problems: Central device is a single point of failure.
Star Topology
FDDI-2
Commonly used in Internet.
Layer 2 Tunneling Protocol (L2TP)
6. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Permanent Virtual Circuit (PVC)
UDP
Remote Access Servers
Fiber-optic Cables
7. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Layer 2 Tunneling Protocol (L2TP)
Extensible Authentication Protocol (EAP)
Spread Spectrum
Cable Modem
8. Wireless communication that distributes individual signals across the allocated frequencies.
Spread Spectrum
Wired Equivalent Privacy (WEP)
OSI Layer 5: Session Layer
Ethernet (802.3)
9. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Multilevel Switching
10baseT
Private Branch Exchange (PBX)
Dedicated Links
10. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Distributed Environment Challenge
Dual-Homed Firewall
Virtual Private Network (VPN)
Multilevel Switching
11. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
Classless inter-domain routing (CIDR)
Trunk Lines
Kernel Proxy Firewall
12. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Wide Area Network (WAN)
802.11i
ICMP (Internet Control Message Protocol)
Definition of Protocol
13. Type of wireless security standard that uses AES in CBC mode.
OSI Layer 3: Network Layer
Distributed Environment Challenge
CBC-MAC Protocol (CCMP)
ThickNet - aka 10base5.
14. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Bus Topology
ARP Poisoning
Multistation Access Unit (MAU)
Layer 2 Tunneling Protocol (L2TP)
15. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
ICMP (Internet Control Message Protocol)
Bastion Host
Port Numbers
Session Initiation Protocol (SIP)
16. Type of firewall that lies between the perimeter router and and LAN.
Dynamic Packet Filtering
Noise
Screened Host Firewall
Fiber Distributed Data Interface (FDDI)
17. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
IPSec
Dynamic Packet Filtering
Virtual Private Network (VPN)
Application Proxy Firewall
18. In a token ring network - each computer is connected to this - which acts as a central hub.
T1
Multistation Access Unit (MAU)
802.11i
Port Numbers
19. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Wireless Application Protocol (WAP)
Proxy Firewall
Password Authentication Protocol (PAP)
Extensible Authentication Protocol (EAP)
20. Malware attack that sends commands inside of an ICMP packet.
High Level Data Link Control (HLDC)
Integrated Services Digital Network (ISDN)
Loki Attack
Digital Subscriber Line (DSL)
21. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Dynamic Packet Filtering
Fiber Distributed Data Interface (FDDI)
Bus Topology
Bluejacking
22. Both directions - only one application can send information at a time
Half-Duplex
802.11b
ARP (Address Resolution Protocol)
Token Passing
23. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Trunk Lines
Fiber Distributed Data Interface (FDDI)
OSI Layer 5: Session Layer
Channel Service Unit/Data Service Unit (CSU/DSU)
24. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
Commonly used in Internet.
Synchronous Data Link Control (SDLC)
Integrated Services Digital Network (ISDN)
25. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Spam over Internet Telephony (SPIT)
Session Initiation Protocol (SIP)
802.11
Source Routing
26. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Screened Host Firewall
Wireless Application Protocol (WAP)
802.11b
Fiber Distributed Data Interface (FDDI)
27. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
OSI Data encapsulation
Direct Sequence Spread Spectrum (DSSS)
Distributed Environment Challenge
28. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Loki Attack
Ethernet (802.3)
Open System Authentication (OSA)
Kernel Proxy Firewall
29. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
LLC (Logical Link Control - 802.2)
ICMP (Internet Control Message Protocol)
Source Routing
OSI Layer 2: Data Link Layer
30. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Repeaters
Temporal Key Integrity Protocol (TKIP)
Isochronous Communication Processes
CBC-MAC Protocol (CCMP)
31. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ThinNet - aka 10base2
Distributed Environment Challenge
Frame Relay
Metropolitan Area Network (MAN)
32. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Point-To-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Virtual Private Network (VPN)
VLAN
33. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
IPv6
Channel Service Unit/Data Service Unit (CSU/DSU)
Shared Key Authentication (SKA)
T3
34. This network technology determines which system will send data based on which one has the token.
Virtual Private Network (VPN)
Open System Authentication (OSA)
ICMP (Internet Control Message Protocol)
Token Passing
35. Protocol that translates a MAC address into an IP address.
Port Numbers
802.11i
Isochronous Communication Processes
Reverse Address Resolution Protocol (RARP )
36. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Packet Switching
Serial Line Internet Protocol (SLIP)
Port Numbers
Ring Topology
37. Standard that outlines wireless personal area network (WPAN) technologies.
OSI Layer 3: Network Layer
Classless inter-domain routing (CIDR)
Password Authentication Protocol (PAP)
802.15
38. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Trunk Lines
Network Address Translator (NAT)
Coaxial Cables
VLAN
39. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Metropolitan Area Network (MAN)
Token Ring (802.5)
Wide Area Network (WAN)
Point-To-Point Tunneling Protocol (PPTP)
40. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Dynamic Packet Filtering
Stateful Firewall
FDDI-2
Commonly used in logical bus - Ethernet - token ring.
41. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Plenum-rated Cables
Router
Circuit Level Proxy Firewall
Port Numbers
42. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Stateful Firewall
Open System Authentication (OSA)
Committed Information Rate (CIR)
Subnetting
43. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Committed Information Rate (CIR)
Synchronous Optical Networks (SONETS)
Remote Access Servers
Stateful Firewall
44. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Committed Information Rate (CIR)
T1
Open System Authentication (OSA)
ThinNet - aka 10base2
45. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
802.11a
Router
Pulse Code Modulation (PCM)
Network Address Translator (NAT)
46. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Packet Switching
Metropolitan Area Network (MAN)
Full-Duplex
T3
47. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Iterated Association
Synchronous Data Link Control (SDLC)
Serial Line Internet Protocol (SLIP)
Switched Virtual Circuit (SVC)
48. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
10baseT
Multilevel Switching
Metropolitan Area Network (MAN)
Network Address Translator (NAT)
49. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
FDDI-2
Half-Duplex
ThinNet - aka 10base2
Circuit Switching
50. Communication devices that determine synchronization scheme before data transmission.
OSI Layer 7: Application
Multistation Access Unit (MAU)
Kernel Proxy Firewall
Synchronous Communication