SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
ARP Poisoning
Bridge
Pulse Code Modulation (PCM)
Blue Boxing
2. Spam over IM
Point-To-Point (PPP)
SPIM
FDDI-2
Layer 2 Tunneling Protocol (L2TP)
3. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Session Initiation Protocol (SIP)
Remote Access Servers
Mesh Topology
Synchronous Optical Networks (SONETS)
4. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Attenuation
LLC (Logical Link Control - 802.2)
SOCKS Firewall
Frame Relay
5. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Blue Boxing
Fiber-optic Cables
Full-Duplex
Isochronous Communication Processes
6. Set of rules that dictates how computer communicate over networks.
Definition of Protocol
Synchronous Optical Networks (SONETS)
Proxy Firewall Strengths
Dual-Homed Firewall
7. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Network Address Translator (NAT)
DOS attacks from flooding
X.25
High Level Data Link Control (HLDC)
8. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Twisted Pair Cables
Distributed Environment Challenge
Committed Information Rate (CIR)
Token Ring (802.5)
9. New variant to traditional email spam on VoIP networks.
Spam over Internet Telephony (SPIT)
OSI Layer 4: Transport Layer
Service Set ID (SSID)
ARP (Address Resolution Protocol)
10. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Token Ring (802.5)
Plenum-rated Cables
Commonly used in logical bus - Ethernet - token ring.
Point-To-Point Tunneling Protocol (PPTP)
11. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
ICMP (Internet Control Message Protocol)
Synchronous Optical Networks (SONETS)
Fiber Distributed Data Interface (FDDI)
802.11a
12. Protocol that translates IP address into a MAC address (physical Ethernet address)
Switch
ARP (Address Resolution Protocol)
Layers in the OSI Model
Asynchronous Transfer Mode (ATM)
13. Standard that addresses wireless MAN technologies.
Source Routing
Subnetting
Temporal Key Integrity Protocol (TKIP)
802.16
14. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
SPIM
Layer 2 Tunneling Protocol (L2TP)
Password Authentication Protocol (PAP)
Multistation Access Unit (MAU)
15. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Dynamic Packet Filtering
Virtual Private Network (VPN)
Fiber Distributed Data Interface (FDDI)
802.11b
16. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Trunk Lines
FDDI-2
Frame Relay
Repeaters
17. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
802.11a
Kernel Proxy Firewall
Fiber Distributed Data Interface (FDDI)
OSI Layer 4: Transport Layer
18. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Private Branch Exchange (PBX)
Packet Switching
Multistation Access Unit (MAU)
VoIP
19. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Permanent Virtual Circuit (PVC)
Ring Topology
Bluejacking
Iterated Association
20. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Virtual Private Network (VPN)
Dedicated Links
Bridge
OSI Layer 6: Presentation
21. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
802.15
Multilevel Switching
Remote Access Servers
X.25
22. Both directions - only one application can send information at a time
DOS attacks from flooding
Half-Duplex
Noise
Open System Authentication (OSA)
23. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
IGMP
Temporal Key Integrity Protocol (TKIP)
IPv6
Token Ring (802.5)
24. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Layer 2 Tunneling Protocol (L2TP)
Token Passing
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
25. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Half-Duplex
Dual-Homed Firewall
Repeaters
Synchronous Optical Networks (SONETS)
26. In the OSI layer 5 - these are the types of what?
Bridge
Trunk Lines
ARP Poisoning
Simplex: One direction.
27. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Proxy Firewall
802.11a
Fiber Distributed Data Interface (FDDI)
ThickNet - aka 10base5.
28. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Layers in the OSI Model
Synchronous Optical Networks (SONETS)
Open Relay
Channel Service Unit/Data Service Unit (CSU/DSU)
29. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Multilevel Switching
Virtual Private Network (VPN)
DOS attacks from flooding
Half-Duplex
30. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
UDP
Multistation Access Unit (MAU)
Token Ring (802.5)
Repeaters
31. Identifys a WLAN. Can be used to segment environments into different WLANS.
Cable Modem
Star Topology
Frequency Hopping Spread Spectrum (FHSS)
Service Set ID (SSID)
32. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Bastion Host
CBC-MAC Protocol (CCMP)
Digital Subscriber Line (DSL)
802.16
33. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
VoIP
Stateful Firewall
Application Proxy Firewall
Ethernet (802.3)
34. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
TCP
Dedicated Links
Layers in the TCP/IP Model
OSI Layer 5: Session Layer
35. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Commonly used in FDDI.
10baseT
Plenum-rated Cables
ThinNet - aka 10base2
36. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Iterated Association
Layers in the OSI Model
Layers in the TCP/IP Model
Commonly used in Ethernet.
37. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Application Proxy Firewall
Digital Subscriber Line (DSL)
OSI Layer 1: Physical
Switched Virtual Circuit (SVC)
38. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
SOCKS Firewall
DOS attacks from flooding
Metropolitan Area Network (MAN)
Committed Information Rate (CIR)
39. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
10baseT
Service Set ID (SSID)
Subnetting
Integrated Services Digital Network (ISDN)
40. Both directions - both applications can send information at a time. Session Layer Communication Modes
Application Proxy Firewall
Switched Virtual Circuit (SVC)
Full-Duplex
Point-To-Point (PPP)
41. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
TCP
Stateful Firewall
OSI Layer 1: Physical
Ring Topology
42. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Virtual Private Network (VPN)
Direct Sequence Spread Spectrum (DSSS)
Cable Modem
Proxy Firewall
43. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Twisted Pair Cables
Full-Duplex
Layer 2 Tunneling Protocol (L2TP)
Token Passing
44. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Password Authentication Protocol (PAP)
Port Numbers
Permanent Virtual Circuit (PVC)
Temporal Key Integrity Protocol (TKIP)
45. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
OSI Layer 3: Network Layer
Asynchronous Communication
Kernel Proxy Firewall
46. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Wireless Application Protocol (WAP)
Layers in the OSI Model
Integrated Services Digital Network (ISDN)
Kernel Proxy Firewall
47. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Bus Topology
Frame Relay
SOCKS Firewall
Serial Line Internet Protocol (SLIP)
48. Wireless standard that will improve security of wireless communication
Coaxial Cables
Switch
DOS attacks from flooding
802.11i
49. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Channel Service Unit/Data Service Unit (CSU/DSU)
Packet Switching
Spam over Internet Telephony (SPIT)
802.11
50. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Attenuation
Wide Area Network (WAN)
Integrated Services Digital Network (ISDN)
Asynchronous Communication