SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Simplex: One direction.
Layer 2 Tunneling Protocol (L2TP)
Circuit Level Proxy Firewall
Asynchronous Communication
2. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Open Relay
ICMP (Internet Control Message Protocol)
Wide Area Network (WAN)
Token Ring (802.5)
3. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Multilevel Switching
802.11b
Layers in the TCP/IP Model
Remote Access Servers
4. Wireless communication that distributes individual signals across the allocated frequencies.
Spread Spectrum
Noise
SPIM
OSI Layer 6: Presentation
5. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Iterated Association
Port Numbers
Shared Key Authentication (SKA)
Commonly used in Ethernet.
6. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Point-To-Point Tunneling Protocol (PPTP)
Cable Modem
Layers in the OSI Model
Circuit Level Proxy Firewall
7. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Screened Sub-Net
Synchronous Data Link Control (SDLC)
Isochronous Communication Processes
Bastion Host
8. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Attenuation
Remote Access Servers
Frame Relay
SOCKS Firewall
9. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Packet Filtering Firewall
Challenge Handshake Authentication Protocol (CHAP)
Open Relay
OSI Data encapsulation
10. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Direct Sequence Spread Spectrum (DSSS)
Commonly used in Ethernet.
Synchronous Optical Networks (SONETS)
Commonly used in logical bus - Ethernet - token ring.
11. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Router
Tree Topology
Kernel Proxy Firewall
Open Relay
12. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Open System Authentication (OSA)
Iterated Association
Network Address Translator (NAT)
Frame Relay
13. This network technology determines which system will send data based on which one has the token.
Token Passing
Shared Key Authentication (SKA)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Pulse Code Modulation (PCM)
14. Both directions - only one application can send information at a time
Half-Duplex
Frequency Hopping Spread Spectrum (FHSS)
Permanent Virtual Circuit (PVC)
802.11b
15. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Dual-Homed Firewall
Private Branch Exchange (PBX)
ARP Poisoning
Fiber Distributed Data Interface (FDDI)
16. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Challenge Handshake Authentication Protocol (CHAP)
Half-Duplex
Circuit Switching
802.11
17. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
DOS attacks from flooding
Commonly used in FDDI.
Proxy Firewall
Metropolitan Area Network (MAN)
18. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
SPIM
Proxy Firewall Strengths
OSI Layer 6: Presentation
Bluejacking
19. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Spread Spectrum
Serial Line Internet Protocol (SLIP)
10baseT
Commonly used in Ethernet.
20. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Dynamic Packet Filtering
Network Address Translator (NAT)
High Level Data Link Control (HLDC)
ThinNet - aka 10base2
21. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
T1
UDP
ICMP (Internet Control Message Protocol)
Ethernet (802.3)
22. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
OSI Layer 4: Transport Layer
UDP
Channel Service Unit/Data Service Unit (CSU/DSU)
Challenge Handshake Authentication Protocol (CHAP)
23. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Reverse Address Resolution Protocol (RARP )
Digital Subscriber Line (DSL)
Commonly used in logical bus - Ethernet - token ring.
Half-Duplex
24. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Packet Filtering Firewall
Isochronous Communication Processes
Session Initiation Protocol (SIP)
Mesh Topology
25. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Asynchronous Communication
OSI Layer 4: Transport Layer
10baseT
T3
26. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Permanent Virtual Circuit (PVC)
Point-To-Point Tunneling Protocol (PPTP)
Trunk Lines
Crosstalk
27. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Trunk Lines
OSI Layer 5: Session Layer
Tree Topology
Wireless Application Protocol (WAP)
28. Communication devices that determine synchronization scheme before data transmission.
Application Proxy Firewall
Synchronous Communication
Router
Serial Line Internet Protocol (SLIP)
29. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Stateful Firewall
Ring Topology
Packet Filtering Firewall
Open System Authentication (OSA)
30. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
OSI Data encapsulation
Layers in the TCP/IP Model
Packet Filtering Firewall
Attenuation
31. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Serial Line Internet Protocol (SLIP)
Noise
Full-Duplex
Application Proxy Firewall
32. Network segment name for a DMZ created by two physical firewalls.
Screened Sub-Net
Trunk Lines
Asynchronous Transfer Mode (ATM)
Port Numbers
33. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Multi-protocol Label Switching
Packet Filtering Firewall
Bluejacking
SPIM
34. Malware attack that sends commands inside of an ICMP packet.
OSI Layer 7: Application
Loki Attack
802.11i
Simplex: One direction.
35. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
X.25
ARP Poisoning
Integrated Services Digital Network (ISDN)
Serial Line Internet Protocol (SLIP)
36. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
802.15
OSI Layer 1: Physical
OSI Layer 4: Transport Layer
Bridge
37. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ThinNet - aka 10base2
Bluejacking
FDDI-2
Private Branch Exchange (PBX)
38. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
VLAN
Private Branch Exchange (PBX)
Classless inter-domain routing (CIDR)
FDDI-2
39. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Circuit Level Proxy Firewall
Commonly used in Internet.
Repeaters
Serial Line Internet Protocol (SLIP)
40. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Packet Filtering Firewall
Bus Topology
Application Proxy vs. Circuit Level
Application Proxy Firewall
41. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Attenuation
Bus Topology
DNS (Domain Name System)
OSI Layer 2: Data Link Layer
42. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Circuit Level Proxy Firewall
UDP
Fiber Distributed Data Interface (FDDI)
X.25
43. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
802.11
Bus Topology
Subnetting
Synchronous Data Link Control (SDLC)
44. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Open Relay
Kernel Proxy Firewall
Packet Filtering Firewall
Application Proxy Firewall
45. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Coaxial Cables
LLC (Logical Link Control - 802.2)
Subnetting
Session Initiation Protocol (SIP)
46. Type of topology where computers all are connected to each other - which provides redundancy.
Switched Virtual Circuit (SVC)
Fiber Distributed Data Interface (FDDI)
Asynchronous Communication
Commonly used in Internet.
47. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Coaxial Cables
Commonly used in Ethernet.
T3
Classless inter-domain routing (CIDR)
48. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
VLAN
Asynchronous Transfer Mode (ATM)
10baseT
Loki Attack
49. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
OSI Layer 3: Network Layer
OSI Layer 7: Application
Point-To-Point (PPP)
Classless inter-domain routing (CIDR)
50. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Layers in the TCP/IP Model
Metropolitan Area Network (MAN)
Dedicated Links
OSI Layer 6: Presentation