SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
High Level Data Link Control (HLDC)
Bus Topology
Router
802.11i
2. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Ethernet (802.3)
Synchronous Optical Networks (SONETS)
Packet Filtering Firewall
Kernel Proxy Firewall
3. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Virtual Private Network (VPN)
Tree Topology
Circuit Switching
Layer 2 Tunneling Protocol (L2TP)
4. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Frame Relay
802.11a
Crosstalk
ThickNet - aka 10base5.
5. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Ethernet (802.3)
Packet Filtering Firewall
Wired Equivalent Privacy (WEP)
Screened Host Firewall
6. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Crosstalk
Commonly used in Ethernet.
OSI Layer 5: Session Layer
Half-Duplex
7. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Committed Information Rate (CIR)
OSI Layer 2: Data Link Layer
IPSec
SOCKS Firewall
8. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Direct Sequence Spread Spectrum (DSSS)
Circuit Level Proxy Firewall
Bus Topology
Full-Duplex
9. Type of firewall that lies between the perimeter router and and LAN.
Twisted Pair Cables
Bastion Host
Screened Host Firewall
Blue Boxing
10. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Multi-protocol Label Switching
OSI Layer 6: Presentation
802.11i
Stateful Firewall
11. This network technology determines which system will send data based on which one has the token.
Layers in the TCP/IP Model
Token Passing
802.11
802.15
12. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
UDP
FDDI-2
Carrier sense multiple access with collision detection (CSMA/CD)
Circuit Switching
13. Problems: Central device is a single point of failure.
OSI Layer 6: Presentation
Star Topology
Token Ring (802.5)
VoIP
14. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Asynchronous Transfer Mode (ATM)
Screened Sub-Net
Blue Boxing
Attenuation
15. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Extensible Authentication Protocol (EAP)
ICMP (Internet Control Message Protocol)
Asynchronous Communication
Blue Boxing
16. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
SOCKS Firewall
Service Set ID (SSID)
Commonly used in FDDI.
802.11b
17. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
802.11
Half-Duplex
Token Ring (802.5)
Screened Host Firewall
18. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
VoIP
OSI Layer 4: Transport Layer
LLC (Logical Link Control - 802.2)
Star Topology
19. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Synchronous Optical Networks (SONETS)
Cable Modem
Stateful Firewall
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
20. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Direct Sequence Spread Spectrum (DSSS)
Frame Relay
Temporal Key Integrity Protocol (TKIP)
Isochronous Communication Processes
21. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
ThickNet - aka 10base5.
LLC (Logical Link Control - 802.2)
Frame Relay
Blue Boxing
22. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
Integrated Services Digital Network (ISDN)
ThickNet - aka 10base5.
Carrier sense multiple access with collision detection (CSMA/CD)
23. Protocol that translates IP address into a MAC address (physical Ethernet address)
ARP (Address Resolution Protocol)
Reverse Address Resolution Protocol (RARP )
Spread Spectrum
Ethernet (802.3)
24. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Wide Area Network (WAN)
DNS (Domain Name System)
Reverse Address Resolution Protocol (RARP )
Bluejacking
25. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Token Passing
Committed Information Rate (CIR)
T3
Switch
26. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
802.11i
Proxy Firewall Strengths
Direct Sequence Spread Spectrum (DSSS)
Remote Access Servers
27. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Star Topology
ARP Poisoning
Digital Subscriber Line (DSL)
Point-To-Point Tunneling Protocol (PPTP)
28. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Dedicated Links
Layers in the OSI Model
Permanent Virtual Circuit (PVC)
T3
29. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Challenge Handshake Authentication Protocol (CHAP)
OSI Layer 5: Session Layer
Digital Subscriber Line (DSL)
Metropolitan Area Network (MAN)
30. Protocol that translates a MAC address into an IP address.
Bus Topology
Ring Topology
Reverse Address Resolution Protocol (RARP )
Attenuation
31. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Bus Topology
Simplex: One direction.
Stateful Firewall
Synchronous Communication
32. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Direct Sequence Spread Spectrum (DSSS)
IGMP
OSI Layer 3: Network Layer
Commonly used in Internet.
33. Malware attack that sends commands inside of an ICMP packet.
Loki Attack
Trunk Lines
Metropolitan Area Network (MAN)
Frequency Hopping Spread Spectrum (FHSS)
34. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Full-Duplex
Shared Key Authentication (SKA)
T3
Wireless Application Protocol (WAP)
35. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Metropolitan Area Network (MAN)
Commonly used in FDDI.
Spread Spectrum
Integrated Services Digital Network (ISDN)
36. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Open System Authentication (OSA)
Frame Relay
Asynchronous Communication
OSI Layer 3: Network Layer
37. New variant to traditional email spam on VoIP networks.
Commonly used in logical bus - Ethernet - token ring.
OSI Layer 6: Presentation
Spam over Internet Telephony (SPIT)
Crosstalk
38. Set of rules that dictates how computer communicate over networks.
Fiber-optic Cables
Definition of Protocol
Source Routing
IPSec
39. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
OSI Layer 3: Network Layer
Subnetting
OSI Layer 2: Data Link Layer
Dynamic Packet Filtering
40. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Password Authentication Protocol (PAP)
802.15
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Commonly used in Ethernet.
41. Type of topology where computers all are connected to each other - which provides redundancy.
Commonly used in Internet.
Subnetting
Open System Authentication (OSA)
Definition of Protocol
42. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Full-Duplex
Plenum-rated Cables
Digital Subscriber Line (DSL)
SOCKS Firewall
43. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Classless inter-domain routing (CIDR)
Attenuation
Circuit Switching
Noise
44. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
X.25
Spam over Internet Telephony (SPIT)
Channel Service Unit/Data Service Unit (CSU/DSU)
Wired Equivalent Privacy (WEP)
45. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Application Proxy vs. Circuit Level
Simplex: One direction.
Iterated Association
Frame Relay
46. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Metropolitan Area Network (MAN)
Asynchronous Transfer Mode (ATM)
Noise
Coaxial Cables
47. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Switched Virtual Circuit (SVC)
IPv6
Plenum-rated Cables
Tree Topology
48. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Layers in the OSI Model
Digital Subscriber Line (DSL)
Fiber Distributed Data Interface (FDDI)
Screened Host Firewall
49. Protocol that increases address size from 32 bits to 128 bits
Repeaters
Layers in the OSI Model
IPv6
Port Numbers
50. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Metropolitan Area Network (MAN)
Permanent Virtual Circuit (PVC)
Token Passing
Switched Virtual Circuit (SVC)