SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Kernel Proxy Firewall
Wide Area Network (WAN)
Commonly used in FDDI.
OSI Layer 3: Network Layer
2. Wireless standard that will improve security of wireless communication
Kernel Proxy Firewall
Network Address Translator (NAT)
Spam over Internet Telephony (SPIT)
802.11i
3. Spam over IM
SPIM
Wireless Application Protocol (WAP)
Token Passing
Classless inter-domain routing (CIDR)
4. Both directions - both applications can send information at a time. Session Layer Communication Modes
Full-Duplex
Half-Duplex
Network Address Translator (NAT)
Permanent Virtual Circuit (PVC)
5. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Asynchronous Transfer Mode (ATM)
Frame Relay
Classless inter-domain routing (CIDR)
802.16
6. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
802.11a
Coaxial Cables
Open Relay
Switch
7. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
SPIM
Switched Virtual Circuit (SVC)
VoIP
Synchronous Communication
8. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Router
DOS attacks from flooding
IPSec
Application Proxy vs. Circuit Level
9. Type of firewall that lies between the perimeter router and and LAN.
Screened Host Firewall
Fiber-optic Cables
Noise
Point-To-Point (PPP)
10. Standard that outlines wireless personal area network (WPAN) technologies.
Commonly used in FDDI.
802.15
Metropolitan Area Network (MAN)
OSI Layer 3: Network Layer
11. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
UDP
Token Ring (802.5)
Layer 2 Tunneling Protocol (L2TP)
Circuit Switching
12. Type of wireless security standard that uses AES in CBC mode.
Packet Filtering Firewall
CBC-MAC Protocol (CCMP)
Blue Boxing
IGMP
13. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Frame Relay
Classless inter-domain routing (CIDR)
Attenuation
Application Proxy vs. Circuit Level
14. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Plenum-rated Cables
Commonly used in Internet.
Frequency Hopping Spread Spectrum (FHSS)
Coaxial Cables
15. SMTP server that is configured for sending email from any source to and destination.
Open Relay
OSI Layer 3: Network Layer
Mesh Topology
Coaxial Cables
16. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
Ring Topology
Mesh Topology
OSI Layer 6: Presentation
17. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Remote Access Servers
Tree Topology
Cable Modem
Carrier sense multiple access with collision detection (CSMA/CD)
18. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
Definition of Protocol
IPv6
Layers in the TCP/IP Model
High Level Data Link Control (HLDC)
19. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Stateful Firewall
SPIM
T1
Tree Topology
20. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Digital Subscriber Line (DSL)
Channel Service Unit/Data Service Unit (CSU/DSU)
802.15
Layers in the OSI Model
21. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
ICMP (Internet Control Message Protocol)
Digital Subscriber Line (DSL)
Token Ring (802.5)
802.11b
22. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
OSI Layer 6: Presentation
Fiber Distributed Data Interface (FDDI)
Noise
IGMP
23. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Circuit Switching
SPIM
Challenge Handshake Authentication Protocol (CHAP)
Attenuation
24. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Remote Access Servers
Synchronous Communication
Fiber-optic Cables
Temporal Key Integrity Protocol (TKIP)
25. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Ethernet (802.3)
Coaxial Cables
Commonly used in Ethernet.
T1
26. Set of rules that dictates how computer communicate over networks.
UDP
Twisted Pair Cables
Definition of Protocol
Proxy Firewall
27. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Tree Topology
Classless inter-domain routing (CIDR)
Application Proxy vs. Circuit Level
Plenum-rated Cables
28. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Crosstalk
OSI Layer 1: Physical
Subnetting
Service Set ID (SSID)
29. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
UDP
Service Set ID (SSID)
Layers in the TCP/IP Model
Synchronous Optical Networks (SONETS)
30. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
ARP Poisoning
Switched Virtual Circuit (SVC)
OSI Layer 7: Application
Virtual Private Network (VPN)
31. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
LLC (Logical Link Control - 802.2)
802.11a
VoIP
32. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
Multistation Access Unit (MAU)
OSI Layer 7: Application
Committed Information Rate (CIR)
DOS attacks from flooding
33. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in logical bus - Ethernet - token ring.
802.11i
IPv6
OSI Layer 3: Network Layer
34. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Packet Filtering Firewall
OSI Layer 2: Data Link Layer
Frequency Hopping Spread Spectrum (FHSS)
Token Passing
35. Wireless communication that distributes individual signals across the allocated frequencies.
Router
Challenge Handshake Authentication Protocol (CHAP)
802.11i
Spread Spectrum
36. This network technology determines which system will send data based on which one has the token.
ARP (Address Resolution Protocol)
802.11b
UDP
Token Passing
37. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Circuit Switching
OSI Layer 7: Application
Plenum-rated Cables
Shared Key Authentication (SKA)
38. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Bluejacking
Dual-Homed Firewall
VLAN
Screened Sub-Net
39. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
T1
802.15
Packet Filtering Firewall
Wired Equivalent Privacy (WEP)
40. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Serial Line Internet Protocol (SLIP)
SOCKS Firewall
Open System Authentication (OSA)
Metropolitan Area Network (MAN)
41. Malware attack that sends commands inside of an ICMP packet.
Half-Duplex
Wireless Application Protocol (WAP)
Wide Area Network (WAN)
Loki Attack
42. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Multistation Access Unit (MAU)
Kernel Proxy Firewall
Source Routing
Classless inter-domain routing (CIDR)
43. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Wired Equivalent Privacy (WEP)
Attenuation
Packet Filtering Firewall
Asynchronous Communication
44. New variant to traditional email spam on VoIP networks.
Star Topology
802.11a
Spam over Internet Telephony (SPIT)
Multistation Access Unit (MAU)
45. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Layers in the OSI Model
Committed Information Rate (CIR)
Packet Filtering Firewall
Crosstalk
46. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Dynamic Packet Filtering
Attenuation
ARP Poisoning
Remote Access Servers
47. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Circuit Level Proxy Firewall
Wireless Application Protocol (WAP)
Ethernet (802.3)
IPv6
48. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Point-To-Point Tunneling Protocol (PPTP)
Blue Boxing
Synchronous Data Link Control (SDLC)
Half-Duplex
49. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Ring Topology
Twisted Pair Cables
Port Numbers
Tree Topology
50. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Mesh Topology
Ring Topology
Router
Multistation Access Unit (MAU)