SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
High Level Data Link Control (HLDC)
Dynamic Packet Filtering
ThickNet - aka 10base5.
ThinNet - aka 10base2
2. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Iterated Association
802.11b
OSI Layer 7: Application
ICMP (Internet Control Message Protocol)
3. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Trunk Lines
Extensible Authentication Protocol (EAP)
Point-To-Point Tunneling Protocol (PPTP)
Dynamic Packet Filtering
4. Standard that addresses wireless MAN technologies.
Blue Boxing
802.16
OSI Layer 3: Network Layer
Spread Spectrum
5. Type of topology where computers all are connected to each other - which provides redundancy.
Loki Attack
802.16
Carrier sense multiple access with collision detection (CSMA/CD)
Commonly used in Internet.
6. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Isochronous Communication Processes
Plenum-rated Cables
Packet Filtering Firewall
7. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Challenge Handshake Authentication Protocol (CHAP)
IGMP
Reverse Address Resolution Protocol (RARP )
Dual-Homed Firewall
8. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Pulse Code Modulation (PCM)
Port Numbers
802.11a
X.25
9. Communication devices that determine synchronization scheme before data transmission.
Wide Area Network (WAN)
Challenge Handshake Authentication Protocol (CHAP)
Token Ring (802.5)
Synchronous Communication
10. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Ethernet (802.3)
Network Address Translator (NAT)
Attenuation
10baseT
11. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
802.11a
Spam over Internet Telephony (SPIT)
Point-To-Point (PPP)
Integrated Services Digital Network (ISDN)
12. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Open System Authentication (OSA)
Network Address Translator (NAT)
Attenuation
Classless inter-domain routing (CIDR)
13. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Frame Relay
High Level Data Link Control (HLDC)
Classless inter-domain routing (CIDR)
Distributed Environment Challenge
14. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Pulse Code Modulation (PCM)
Permanent Virtual Circuit (PVC)
Application Proxy Firewall
Proxy Firewall Strengths
15. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
T3
Source Routing
Dynamic Packet Filtering
Channel Service Unit/Data Service Unit (CSU/DSU)
16. Protocol for allowing multi-cast (one to many) communication
Password Authentication Protocol (PAP)
Frame Relay
IGMP
Point-To-Point (PPP)
17. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Commonly used in FDDI.
FDDI-2
Ethernet (802.3)
Tree Topology
18. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Wireless Application Protocol (WAP)
Session Initiation Protocol (SIP)
Channel Service Unit/Data Service Unit (CSU/DSU)
T1
19. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Commonly used in Ethernet.
Integrated Services Digital Network (ISDN)
VLAN
Fiber Distributed Data Interface (FDDI)
20. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Reverse Address Resolution Protocol (RARP )
Source Routing
Layers in the TCP/IP Model
Screened Host Firewall
21. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Distributed Environment Challenge
Carrier sense multiple access with collision detection (CSMA/CD)
DNS (Domain Name System)
Multistation Access Unit (MAU)
22. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
OSI Layer 7: Application
Commonly used in logical bus - Ethernet - token ring.
Repeaters
Trunk Lines
23. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Twisted Pair Cables
Integrated Services Digital Network (ISDN)
Frame Relay
Trunk Lines
24. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
TCP
Noise
Spam over Internet Telephony (SPIT)
Direct Sequence Spread Spectrum (DSSS)
25. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
ThinNet - aka 10base2
OSI Layer 5: Session Layer
Commonly used in Ethernet.
Network Address Translator (NAT)
26. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Session Initiation Protocol (SIP)
OSI Layer 1: Physical
Synchronous Optical Networks (SONETS)
Definition of Protocol
27. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Mesh Topology
X.25
Attenuation
Circuit Switching
28. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Point-To-Point (PPP)
Wired Equivalent Privacy (WEP)
High Level Data Link Control (HLDC)
Frame Relay
29. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Isochronous Communication Processes
Full-Duplex
802.11
IPSec
30. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Packet Filtering Firewall
802.11
Bastion Host
Blue Boxing
31. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Session Initiation Protocol (SIP)
Bluejacking
IPSec
10baseT
32. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Asynchronous Communication
ThickNet - aka 10base5.
Fiber Distributed Data Interface (FDDI)
Layers in the OSI Model
33. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
LLC (Logical Link Control - 802.2)
Shared Key Authentication (SKA)
Frame Relay
Source Routing
34. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Trunk Lines
Virtual Private Network (VPN)
Digital Subscriber Line (DSL)
Layers in the OSI Model
35. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
IPv6
Proxy Firewall Strengths
X.25
LLC (Logical Link Control - 802.2)
36. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Multilevel Switching
Star Topology
Asynchronous Transfer Mode (ATM)
Remote Access Servers
37. Type of firewall that lies between the perimeter router and and LAN.
Bus Topology
Circuit Switching
Screened Host Firewall
Ethernet (802.3)
38. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Loki Attack
Repeaters
Channel Service Unit/Data Service Unit (CSU/DSU)
Stateful Firewall
39. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Loki Attack
Wireless Application Protocol (WAP)
LLC (Logical Link Control - 802.2)
Noise
40. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
ICMP (Internet Control Message Protocol)
Remote Access Servers
10baseT
41. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Ring Topology
Integrated Services Digital Network (ISDN)
OSI Layer 1: Physical
Trunk Lines
42. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Open Relay
Wireless Application Protocol (WAP)
Ring Topology
Point-To-Point Tunneling Protocol (PPTP)
43. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Application Proxy Firewall
Digital Subscriber Line (DSL)
High Level Data Link Control (HLDC)
ARP Poisoning
44. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Wireless Application Protocol (WAP)
Proxy Firewall
Isochronous Communication Processes
Temporal Key Integrity Protocol (TKIP)
45. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
Asynchronous Communication
OSI Layer 1: Physical
Mesh Topology
46. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
802.11i
Point-To-Point Tunneling Protocol (PPTP)
10baseT
Spread Spectrum
47. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Iterated Association
Frame Relay
Synchronous Communication
802.15
48. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Subnetting
Repeaters
Committed Information Rate (CIR)
X.25
49. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Multistation Access Unit (MAU)
Loki Attack
802.11b
OSI Layer 6: Presentation
50. Wireless standard that will improve security of wireless communication
Extensible Authentication Protocol (EAP)
Point-To-Point (PPP)
802.11i
TCP