SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Trunk Lines
Commonly used in Ethernet.
Dual-Homed Firewall
Packet Filtering Firewall
2. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Packet Switching
Point-To-Point (PPP)
Noise
Private Branch Exchange (PBX)
3. Network segment name for a DMZ created by two physical firewalls.
Application Proxy Firewall
Point-To-Point (PPP)
Frame Relay
Screened Sub-Net
4. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Definition of Protocol
Open Relay
Pulse Code Modulation (PCM)
Commonly used in logical bus - Ethernet - token ring.
5. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
802.11i
Bridge
Bastion Host
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
6. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Pulse Code Modulation (PCM)
Commonly used in FDDI.
Digital Subscriber Line (DSL)
Integrated Services Digital Network (ISDN)
7. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Twisted Pair Cables
Commonly used in logical bus - Ethernet - token ring.
ThinNet - aka 10base2
Application Proxy vs. Circuit Level
8. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
Router
Commonly used in logical bus - Ethernet - token ring.
ARP Poisoning
9. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Twisted Pair Cables
Digital Subscriber Line (DSL)
Direct Sequence Spread Spectrum (DSSS)
Frame Relay
10. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
X.25
Bluejacking
Extensible Authentication Protocol (EAP)
Shared Key Authentication (SKA)
11. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
802.11a
Network Address Translator (NAT)
Serial Line Internet Protocol (SLIP)
Isochronous Communication Processes
12. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Classless inter-domain routing (CIDR)
Twisted Pair Cables
OSI Layer 1: Physical
Remote Access Servers
13. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Attenuation
IGMP
Open Relay
Multilevel Switching
14. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
SPIM
802.15
Isochronous Communication Processes
Coaxial Cables
15. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Trunk Lines
Challenge Handshake Authentication Protocol (CHAP)
Packet Filtering Firewall
Router
16. Type of network layout that separates and group computers logically.
VLAN
Stateful Firewall
Bus Topology
Twisted Pair Cables
17. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
FDDI-2
IGMP
Multi-protocol Label Switching
802.16
18. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
IPv6
Serial Line Internet Protocol (SLIP)
T1
Synchronous Communication
19. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Circuit Switching
UDP
Mesh Topology
Extensible Authentication Protocol (EAP)
20. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Commonly used in FDDI.
Shared Key Authentication (SKA)
DOS attacks from flooding
Switched Virtual Circuit (SVC)
21. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Ethernet (802.3)
VLAN
IPSec
Distributed Environment Challenge
22. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Commonly used in Internet.
ThinNet - aka 10base2
Reverse Address Resolution Protocol (RARP )
Carrier sense multiple access with collision detection (CSMA/CD)
23. Type of topology where computers all are connected to each other - which provides redundancy.
Bus Topology
Point-To-Point (PPP)
Commonly used in Internet.
Trunk Lines
24. Problems: Requires more expense in cabling and extra effort to track down cable faults.
802.11b
Password Authentication Protocol (PAP)
Mesh Topology
Subnetting
25. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Switched Virtual Circuit (SVC)
Full-Duplex
Virtual Private Network (VPN)
802.15
26. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Virtual Private Network (VPN)
Cable Modem
Proxy Firewall
Point-To-Point (PPP)
27. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Twisted Pair Cables
ARP (Address Resolution Protocol)
Frequency Hopping Spread Spectrum (FHSS)
Layers in the TCP/IP Model
28. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Proxy Firewall Strengths
SPIM
Session Initiation Protocol (SIP)
Fiber Distributed Data Interface (FDDI)
29. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Multi-protocol Label Switching
DOS attacks from flooding
T3
Isochronous Communication Processes
30. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
OSI Data encapsulation
Frame Relay
Permanent Virtual Circuit (PVC)
Subnetting
31. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Tree Topology
Session Initiation Protocol (SIP)
OSI Data encapsulation
Committed Information Rate (CIR)
32. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Permanent Virtual Circuit (PVC)
Direct Sequence Spread Spectrum (DSSS)
DOS attacks from flooding
Isochronous Communication Processes
33. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
OSI Data encapsulation
802.11b
IPSec
OSI Layer 7: Application
34. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
OSI Layer 2: Data Link Layer
Dedicated Links
ThickNet - aka 10base5.
DNS (Domain Name System)
35. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Half-Duplex
Bluejacking
Switch
VoIP
36. Standard that outlines wireless personal area network (WPAN) technologies.
Screened Host Firewall
Twisted Pair Cables
Packet Filtering Firewall
802.15
37. Wireless standard that will improve security of wireless communication
Private Branch Exchange (PBX)
Crosstalk
FDDI-2
802.11i
38. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Switch
Point-To-Point (PPP)
Fiber-optic Cables
Router
39. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Application Proxy Firewall
Layer 2 Tunneling Protocol (L2TP)
Iterated Association
VoIP
40. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
ICMP (Internet Control Message Protocol)
Cable Modem
Screened Sub-Net
OSI Layer 5: Session Layer
41. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Bluejacking
Frame Relay
Dual-Homed Firewall
Proxy Firewall
42. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Layer 2 Tunneling Protocol (L2TP)
ARP (Address Resolution Protocol)
Synchronous Communication
CBC-MAC Protocol (CCMP)
43. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Subnetting
OSI Layer 3: Network Layer
Spread Spectrum
Bridge
44. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Isochronous Communication Processes
Ethernet (802.3)
Bluejacking
Commonly used in logical bus - Ethernet - token ring.
45. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Session Initiation Protocol (SIP)
802.15
Packet Switching
Classless inter-domain routing (CIDR)
46. Wireless communication that distributes individual signals across the allocated frequencies.
OSI Layer 7: Application
Loki Attack
Remote Access Servers
Spread Spectrum
47. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Token Passing
OSI Layer 2: Data Link Layer
T3
FDDI-2
48. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
Frequency Hopping Spread Spectrum (FHSS)
UDP
Definition of Protocol
Fiber-optic Cables
49. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Repeaters
Full-Duplex
Digital Subscriber Line (DSL)
Layers in the TCP/IP Model
50. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Temporal Key Integrity Protocol (TKIP)
Open System Authentication (OSA)
High Level Data Link Control (HLDC)
Layers in the TCP/IP Model