SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Proxy Firewall Strengths
Bridge
Synchronous Data Link Control (SDLC)
Fiber Distributed Data Interface (FDDI)
2. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
OSI Layer 6: Presentation
Asynchronous Communication
Coaxial Cables
Spam over Internet Telephony (SPIT)
3. Standard that addresses wireless MAN technologies.
802.16
Dedicated Links
Extensible Authentication Protocol (EAP)
OSI Layer 4: Transport Layer
4. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
IGMP
Attenuation
Simplex: One direction.
Asynchronous Transfer Mode (ATM)
5. This network technology determines which system will send data based on which one has the token.
Plenum-rated Cables
OSI Layer 6: Presentation
Serial Line Internet Protocol (SLIP)
Token Passing
6. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Layer 2 Tunneling Protocol (L2TP)
Mesh Topology
Session Initiation Protocol (SIP)
802.15
7. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
Wired Equivalent Privacy (WEP)
Session Initiation Protocol (SIP)
Switch
High Level Data Link Control (HLDC)
8. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Screened Sub-Net
Direct Sequence Spread Spectrum (DSSS)
Packet Filtering Firewall
Bus Topology
9. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Packet Switching
Commonly used in FDDI.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Synchronous Optical Networks (SONETS)
10. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Wide Area Network (WAN)
Loki Attack
Tree Topology
ICMP (Internet Control Message Protocol)
11. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
802.11a
Open System Authentication (OSA)
Source Routing
ARP Poisoning
12. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
802.11a
IPv6
Repeaters
Token Passing
13. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Temporal Key Integrity Protocol (TKIP)
Multi-protocol Label Switching
Serial Line Internet Protocol (SLIP)
Simplex: One direction.
14. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Remote Access Servers
Channel Service Unit/Data Service Unit (CSU/DSU)
Distributed Environment Challenge
Ring Topology
15. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Ethernet (802.3)
Stateful Firewall
Switched Virtual Circuit (SVC)
Trunk Lines
16. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Mesh Topology
Channel Service Unit/Data Service Unit (CSU/DSU)
Open Relay
Committed Information Rate (CIR)
17. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Commonly used in Ethernet.
Plenum-rated Cables
Kernel Proxy Firewall
Serial Line Internet Protocol (SLIP)
18. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Subnetting
OSI Layer 6: Presentation
SOCKS Firewall
DOS attacks from flooding
19. Both directions - only one application can send information at a time
Plenum-rated Cables
Screened Sub-Net
Stateful Firewall
Half-Duplex
20. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
LLC (Logical Link Control - 802.2)
SPIM
802.11a
Committed Information Rate (CIR)
21. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Digital Subscriber Line (DSL)
Password Authentication Protocol (PAP)
Ethernet (802.3)
Proxy Firewall
22. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
IPv6
Blue Boxing
Layer 2 Tunneling Protocol (L2TP)
Bastion Host
23. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Integrated Services Digital Network (ISDN)
Iterated Association
OSI Data encapsulation
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
24. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
Trunk Lines
Asynchronous Communication
OSI Data encapsulation
25. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Bluejacking
OSI Layer 4: Transport Layer
Token Ring (802.5)
Commonly used in Internet.
26. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
DNS (Domain Name System)
OSI Layer 3: Network Layer
TCP
802.11a
27. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Isochronous Communication Processes
IGMP
802.11b
Serial Line Internet Protocol (SLIP)
28. Communication devices that determine synchronization scheme before data transmission.
Synchronous Communication
Commonly used in logical bus - Ethernet - token ring.
Digital Subscriber Line (DSL)
Bus Topology
29. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
10baseT
Commonly used in FDDI.
802.11a
Shared Key Authentication (SKA)
30. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Extensible Authentication Protocol (EAP)
IPv6
802.11a
31. Type of firewall that lies between the perimeter router and and LAN.
Permanent Virtual Circuit (PVC)
Screened Host Firewall
Metropolitan Area Network (MAN)
DOS attacks from flooding
32. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Metropolitan Area Network (MAN)
Switch
OSI Data encapsulation
Dual-Homed Firewall
33. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
UDP
Kernel Proxy Firewall
Point-To-Point Tunneling Protocol (PPTP)
Attenuation
34. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Switched Virtual Circuit (SVC)
Wireless Application Protocol (WAP)
Commonly used in logical bus - Ethernet - token ring.
IGMP
35. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
ThinNet - aka 10base2
Router
OSI Layer 3: Network Layer
10baseT
36. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
OSI Layer 3: Network Layer
Token Ring (802.5)
OSI Layer 2: Data Link Layer
Fiber-optic Cables
37. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Plenum-rated Cables
Port Numbers
Wireless Application Protocol (WAP)
802.11b
38. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Trunk Lines
SOCKS Firewall
Bastion Host
Packet Filtering Firewall
39. Problems: Central device is a single point of failure.
Proxy Firewall
Switched Virtual Circuit (SVC)
Star Topology
Multi-protocol Label Switching
40. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
ThickNet - aka 10base5.
Kernel Proxy Firewall
T3
Ethernet (802.3)
41. In a token ring network - each computer is connected to this - which acts as a central hub.
Multistation Access Unit (MAU)
Definition of Protocol
Temporal Key Integrity Protocol (TKIP)
Synchronous Optical Networks (SONETS)
42. Type of topology where computers all are connected to each other - which provides redundancy.
Layer 2 Tunneling Protocol (L2TP)
Wireless Application Protocol (WAP)
Noise
Commonly used in Internet.
43. Type of network layout that separates and group computers logically.
IPv6
VLAN
Metropolitan Area Network (MAN)
Ethernet (802.3)
44. Type of network layout that is a large geographical region connecting more that one LAN.
Kernel Proxy Firewall
Trunk Lines
Wide Area Network (WAN)
Service Set ID (SSID)
45. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
802.11a
Network Address Translator (NAT)
Coaxial Cables
802.11i
46. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
ThinNet - aka 10base2
Router
Packet Filtering Firewall
Asynchronous Communication
47. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
10baseT
T3
Proxy Firewall Strengths
Switched Virtual Circuit (SVC)
48. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Circuit Switching
Metropolitan Area Network (MAN)
ThinNet - aka 10base2
Router
49. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Serial Line Internet Protocol (SLIP)
OSI Data encapsulation
Packet Filtering Firewall
Screened Host Firewall
50. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Session Initiation Protocol (SIP)
Spam over Internet Telephony (SPIT)
Cable Modem
IPSec
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests