SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Switch
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
IPSec
Wired Equivalent Privacy (WEP)
2. Wireless communication that distributes individual signals across the allocated frequencies.
Spread Spectrum
Tree Topology
Reverse Address Resolution Protocol (RARP )
Distributed Environment Challenge
3. Wireless standard that will improve security of wireless communication
802.16
802.11b
Distributed Environment Challenge
802.11i
4. Type of firewall that lies between the perimeter router and and LAN.
Fiber Distributed Data Interface (FDDI)
Mesh Topology
Screened Host Firewall
Asynchronous Communication
5. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Integrated Services Digital Network (ISDN)
Proxy Firewall Strengths
DOS attacks from flooding
Switch
6. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Twisted Pair Cables
Reverse Address Resolution Protocol (RARP )
ARP Poisoning
Bus Topology
7. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Temporal Key Integrity Protocol (TKIP)
Source Routing
ThickNet - aka 10base5.
Simplex: One direction.
8. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
OSI Data encapsulation
FDDI-2
Source Routing
Multilevel Switching
9. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Crosstalk
802.11b
Synchronous Data Link Control (SDLC)
Channel Service Unit/Data Service Unit (CSU/DSU)
10. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Layer 2 Tunneling Protocol (L2TP)
Tree Topology
Extensible Authentication Protocol (EAP)
Ethernet (802.3)
11. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Point-To-Point Tunneling Protocol (PPTP)
Metropolitan Area Network (MAN)
Proxy Firewall
Commonly used in logical bus - Ethernet - token ring.
12. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Circuit Switching
Commonly used in Internet.
VoIP
Frame Relay
13. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Multilevel Switching
Iterated Association
Packet Filtering Firewall
OSI Layer 7: Application
14. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Trunk Lines
ARP Poisoning
Dual-Homed Firewall
Full-Duplex
15. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Coaxial Cables
Commonly used in Ethernet.
Multilevel Switching
Bus Topology
16. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Subnetting
Multistation Access Unit (MAU)
Stateful Firewall
Committed Information Rate (CIR)
17. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Open System Authentication (OSA)
Synchronous Data Link Control (SDLC)
DOS attacks from flooding
Bus Topology
18. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Frame Relay
Service Set ID (SSID)
Frame Relay
Synchronous Optical Networks (SONETS)
19. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Token Passing
Subnetting
Source Routing
Dynamic Packet Filtering
20. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
LLC (Logical Link Control - 802.2)
Blue Boxing
Dual-Homed Firewall
Frame Relay
21. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Proxy Firewall Strengths
Asynchronous Transfer Mode (ATM)
SOCKS Firewall
Repeaters
22. Identifys a WLAN. Can be used to segment environments into different WLANS.
Service Set ID (SSID)
ARP (Address Resolution Protocol)
OSI Layer 1: Physical
Loki Attack
23. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Layer 2 Tunneling Protocol (L2TP)
Classless inter-domain routing (CIDR)
Reverse Address Resolution Protocol (RARP )
IPSec
24. Both directions - only one application can send information at a time
Half-Duplex
OSI Layer 5: Session Layer
Token Passing
Synchronous Optical Networks (SONETS)
25. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
OSI Layer 7: Application
High Level Data Link Control (HLDC)
Iterated Association
Bluejacking
26. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Tree Topology
Commonly used in logical bus - Ethernet - token ring.
T1
VLAN
27. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Full-Duplex
Asynchronous Transfer Mode (ATM)
Challenge Handshake Authentication Protocol (CHAP)
Ring Topology
28. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Proxy Firewall
T1
802.11a
Coaxial Cables
29. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
Half-Duplex
Isochronous Communication Processes
OSI Layer 1: Physical
30. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Circuit Level Proxy Firewall
Asynchronous Transfer Mode (ATM)
ThickNet - aka 10base5.
Temporal Key Integrity Protocol (TKIP)
31. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Virtual Private Network (VPN)
Frequency Hopping Spread Spectrum (FHSS)
Switched Virtual Circuit (SVC)
Frame Relay
32. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Noise
802.11b
Point-To-Point (PPP)
802.16
33. Spam over IM
SPIM
Screened Host Firewall
LLC (Logical Link Control - 802.2)
ICMP (Internet Control Message Protocol)
34. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Attenuation
Packet Switching
DNS (Domain Name System)
IPv6
35. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
Remote Access Servers
Integrated Services Digital Network (ISDN)
Packet Filtering Firewall
UDP
36. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Commonly used in FDDI.
Network Address Translator (NAT)
Committed Information Rate (CIR)
Bastion Host
37. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
IPSec
Cable Modem
Frame Relay
Trunk Lines
38. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Proxy Firewall
Mesh Topology
Virtual Private Network (VPN)
10baseT
39. Malware attack that sends commands inside of an ICMP packet.
Noise
Simplex: One direction.
Loki Attack
Source Routing
40. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Plenum-rated Cables
Iterated Association
Pulse Code Modulation (PCM)
Point-To-Point (PPP)
41. Type of cabling problem signals from one wire crossing over to another wire.
SPIM
Crosstalk
Port Numbers
Synchronous Communication
42. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Password Authentication Protocol (PAP)
Digital Subscriber Line (DSL)
FDDI-2
Multistation Access Unit (MAU)
43. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Commonly used in FDDI.
Fiber Distributed Data Interface (FDDI)
802.16
High Level Data Link Control (HLDC)
44. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Definition of Protocol
IPSec
OSI Layer 2: Data Link Layer
Full-Duplex
45. This network technology determines which system will send data based on which one has the token.
Token Passing
Pulse Code Modulation (PCM)
DOS attacks from flooding
Carrier sense multiple access with collision detection (CSMA/CD)
46. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Blue Boxing
OSI Layer 1: Physical
Simplex: One direction.
Attenuation
47. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Frame Relay
Bluejacking
T1
Blue Boxing
48. Protocol that translates IP address into a MAC address (physical Ethernet address)
Synchronous Data Link Control (SDLC)
ARP (Address Resolution Protocol)
Iterated Association
Multi-protocol Label Switching
49. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Circuit Switching
Commonly used in Ethernet.
Wide Area Network (WAN)
Screened Sub-Net
50. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Definition of Protocol
Wired Equivalent Privacy (WEP)
Fiber Distributed Data Interface (FDDI)
Synchronous Optical Networks (SONETS)