SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Star Topology
Trunk Lines
Source Routing
Direct Sequence Spread Spectrum (DSSS)
2. Type of firewall that lies between the perimeter router and and LAN.
Screened Host Firewall
Proxy Firewall
Synchronous Data Link Control (SDLC)
Bus Topology
3. Problems: Central device is a single point of failure.
Fiber-optic Cables
Application Proxy Firewall
Star Topology
Digital Subscriber Line (DSL)
4. Network segment name for a DMZ created by two physical firewalls.
Commonly used in FDDI.
Fiber-optic Cables
Screened Sub-Net
Serial Line Internet Protocol (SLIP)
5. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Integrated Services Digital Network (ISDN)
802.11
X.25
Point-To-Point (PPP)
6. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Mesh Topology
Bastion Host
Star Topology
Layer 2 Tunneling Protocol (L2TP)
7. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Token Ring (802.5)
Bluejacking
Layers in the OSI Model
OSI Layer 5: Session Layer
8. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Open Relay
Private Branch Exchange (PBX)
Repeaters
Temporal Key Integrity Protocol (TKIP)
9. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ThinNet - aka 10base2
Switch
Dedicated Links
Bluejacking
10. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
SPIM
DNS (Domain Name System)
Screened Host Firewall
Multi-protocol Label Switching
11. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Commonly used in Internet.
SOCKS Firewall
Packet Filtering Firewall
802.15
12. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Proxy Firewall
Ring Topology
Plenum-rated Cables
Application Proxy vs. Circuit Level
13. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Network Address Translator (NAT)
OSI Layer 7: Application
IPv6
Packet Filtering Firewall
14. Type of cabling problem signals from one wire crossing over to another wire.
Wireless Application Protocol (WAP)
Direct Sequence Spread Spectrum (DSSS)
Crosstalk
Source Routing
15. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Channel Service Unit/Data Service Unit (CSU/DSU)
Carrier sense multiple access with collision detection (CSMA/CD)
T3
802.11
16. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in logical bus - Ethernet - token ring.
Metropolitan Area Network (MAN)
Tree Topology
Extensible Authentication Protocol (EAP)
17. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Attenuation
Plenum-rated Cables
IPv6
Asynchronous Communication
18. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
IPSec
Commonly used in logical bus - Ethernet - token ring.
Ring Topology
Serial Line Internet Protocol (SLIP)
19. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
OSI Data encapsulation
Switch
Extensible Authentication Protocol (EAP)
Integrated Services Digital Network (ISDN)
20. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
Full-Duplex
FDDI-2
Carrier sense multiple access with collision detection (CSMA/CD)
21. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Fiber Distributed Data Interface (FDDI)
Packet Filtering Firewall
Subnetting
Screened Host Firewall
22. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
DNS (Domain Name System)
Full-Duplex
TCP
IPSec
23. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
Wireless Application Protocol (WAP)
Application Proxy vs. Circuit Level
DOS attacks from flooding
24. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
SPIM
Crosstalk
Loki Attack
Twisted Pair Cables
25. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Digital Subscriber Line (DSL)
802.11i
Token Passing
OSI Layer 5: Session Layer
26. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Source Routing
Stateful Firewall
Switch
Switched Virtual Circuit (SVC)
27. Identifys a WLAN. Can be used to segment environments into different WLANS.
Ring Topology
Port Numbers
802.16
Service Set ID (SSID)
28. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Frequency Hopping Spread Spectrum (FHSS)
CBC-MAC Protocol (CCMP)
Layers in the OSI Model
Extensible Authentication Protocol (EAP)
29. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
OSI Layer 1: Physical
Router
Synchronous Optical Networks (SONETS)
Virtual Private Network (VPN)
30. In the OSI layer 5 - these are the types of what?
Twisted Pair Cables
Layers in the OSI Model
Circuit Switching
Simplex: One direction.
31. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Shared Key Authentication (SKA)
OSI Layer 5: Session Layer
Tree Topology
Extensible Authentication Protocol (EAP)
32. Type of network layout that is a large geographical region connecting more that one LAN.
Star Topology
ThinNet - aka 10base2
Wide Area Network (WAN)
Proxy Firewall
33. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Extensible Authentication Protocol (EAP)
Source Routing
Bridge
Plenum-rated Cables
34. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Metropolitan Area Network (MAN)
Repeaters
Switched Virtual Circuit (SVC)
Private Branch Exchange (PBX)
35. New variant to traditional email spam on VoIP networks.
Spam over Internet Telephony (SPIT)
Channel Service Unit/Data Service Unit (CSU/DSU)
Proxy Firewall Strengths
Asynchronous Communication
36. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
10baseT
Circuit Switching
Loki Attack
Packet Switching
37. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Wired Equivalent Privacy (WEP)
Star Topology
LLC (Logical Link Control - 802.2)
Committed Information Rate (CIR)
38. Protocol that increases address size from 32 bits to 128 bits
Permanent Virtual Circuit (PVC)
802.11b
IPv6
Port Numbers
39. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Metropolitan Area Network (MAN)
Frequency Hopping Spread Spectrum (FHSS)
DOS attacks from flooding
T3
40. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Temporal Key Integrity Protocol (TKIP)
Shared Key Authentication (SKA)
Full-Duplex
Asynchronous Transfer Mode (ATM)
41. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Permanent Virtual Circuit (PVC)
802.11
Temporal Key Integrity Protocol (TKIP)
Virtual Private Network (VPN)
42. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Spread Spectrum
Packet Switching
Extensible Authentication Protocol (EAP)
Permanent Virtual Circuit (PVC)
43. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Noise
Dynamic Packet Filtering
Coaxial Cables
IPv6
44. Type of network layout that separates and group computers logically.
VLAN
OSI Layer 7: Application
Classless inter-domain routing (CIDR)
Committed Information Rate (CIR)
45. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
SPIM
IPSec
Isochronous Communication Processes
Layer 2 Tunneling Protocol (L2TP)
46. Type of wireless security standard that uses AES in CBC mode.
Blue Boxing
CBC-MAC Protocol (CCMP)
Point-To-Point Tunneling Protocol (PPTP)
Iterated Association
47. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Twisted Pair Cables
Application Proxy Firewall
Repeaters
Frame Relay
48. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Proxy Firewall Strengths
Circuit Level Proxy Firewall
Reverse Address Resolution Protocol (RARP )
Remote Access Servers
49. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Attenuation
Stateful Firewall
Router
Screened Sub-Net
50. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Multilevel Switching
OSI Layer 6: Presentation
Packet Filtering Firewall
LLC (Logical Link Control - 802.2)