SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Carrier sense multiple access with collision detection (CSMA/CD)
Cable Modem
Screened Sub-Net
Open Relay
2. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Wired Equivalent Privacy (WEP)
OSI Layer 2: Data Link Layer
Point-To-Point Tunneling Protocol (PPTP)
Shared Key Authentication (SKA)
3. Identifys a WLAN. Can be used to segment environments into different WLANS.
VLAN
Spam over Internet Telephony (SPIT)
Private Branch Exchange (PBX)
Service Set ID (SSID)
4. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Full-Duplex
Network Address Translator (NAT)
Spam over Internet Telephony (SPIT)
Ethernet (802.3)
5. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Permanent Virtual Circuit (PVC)
Open System Authentication (OSA)
X.25
DNS (Domain Name System)
6. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Twisted Pair Cables
Packet Filtering Firewall
802.15
Point-To-Point (PPP)
7. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Extensible Authentication Protocol (EAP)
IPv6
Application Proxy Firewall
Synchronous Communication
8. Malware attack that sends commands inside of an ICMP packet.
Asynchronous Communication
Loki Attack
Switch
Application Proxy vs. Circuit Level
9. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
UDP
Private Branch Exchange (PBX)
LLC (Logical Link Control - 802.2)
Digital Subscriber Line (DSL)
10. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Dynamic Packet Filtering
FDDI-2
OSI Layer 5: Session Layer
VoIP
11. Protocol that translates IP address into a MAC address (physical Ethernet address)
Network Address Translator (NAT)
DNS (Domain Name System)
ARP (Address Resolution Protocol)
T3
12. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Digital Subscriber Line (DSL)
T1
Open System Authentication (OSA)
Repeaters
13. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Multi-protocol Label Switching
Spam over Internet Telephony (SPIT)
Proxy Firewall
Private Branch Exchange (PBX)
14. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
IPSec
Pulse Code Modulation (PCM)
Multi-protocol Label Switching
Wireless Application Protocol (WAP)
15. Network segment name for a DMZ created by two physical firewalls.
Wide Area Network (WAN)
Screened Sub-Net
802.16
VLAN
16. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Commonly used in FDDI.
SOCKS Firewall
OSI Layer 7: Application
UDP
17. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Half-Duplex
VoIP
Carrier sense multiple access with collision detection (CSMA/CD)
OSI Layer 7: Application
18. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
OSI Layer 6: Presentation
OSI Layer 1: Physical
Reverse Address Resolution Protocol (RARP )
Packet Filtering Firewall
19. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
DNS (Domain Name System)
Point-To-Point (PPP)
Multi-protocol Label Switching
Port Numbers
20. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Multilevel Switching
Asynchronous Communication
VoIP
Plenum-rated Cables
21. Set of rules that dictates how computer communicate over networks.
Definition of Protocol
Twisted Pair Cables
Proxy Firewall
OSI Layer 2: Data Link Layer
22. Type of firewall that lies between the perimeter router and and LAN.
Dual-Homed Firewall
Screened Host Firewall
Packet Filtering Firewall
Open System Authentication (OSA)
23. This network technology determines which system will send data based on which one has the token.
Plenum-rated Cables
Full-Duplex
Token Passing
Wired Equivalent Privacy (WEP)
24. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Asynchronous Transfer Mode (ATM)
Switch
Application Proxy Firewall
Application Proxy vs. Circuit Level
25. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Plenum-rated Cables
Coaxial Cables
Tree Topology
Frame Relay
26. SMTP server that is configured for sending email from any source to and destination.
Noise
ThickNet - aka 10base5.
Blue Boxing
Open Relay
27. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
ThinNet - aka 10base2
Twisted Pair Cables
Screened Sub-Net
28. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
Carrier sense multiple access with collision detection (CSMA/CD)
Distributed Environment Challenge
OSI Layer 7: Application
802.16
29. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Pulse Code Modulation (PCM)
Layers in the TCP/IP Model
Switch
Remote Access Servers
30. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Circuit Level Proxy Firewall
Layers in the TCP/IP Model
Blue Boxing
Dedicated Links
31. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
T3
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Point-To-Point Tunneling Protocol (PPTP)
32. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Dynamic Packet Filtering
T3
Fiber Distributed Data Interface (FDDI)
VLAN
33. Protocol that increases address size from 32 bits to 128 bits
Application Proxy Firewall
Direct Sequence Spread Spectrum (DSSS)
IPv6
802.11a
34. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Commonly used in Ethernet.
OSI Layer 4: Transport Layer
Wireless Application Protocol (WAP)
Session Initiation Protocol (SIP)
35. Wireless standard that will improve security of wireless communication
802.11i
Wide Area Network (WAN)
Packet Filtering Firewall
Dedicated Links
36. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Open System Authentication (OSA)
Loki Attack
Isochronous Communication Processes
Trunk Lines
37. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Full-Duplex
Bus Topology
Spread Spectrum
Commonly used in FDDI.
38. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
OSI Layer 3: Network Layer
Synchronous Communication
Tree Topology
High Level Data Link Control (HLDC)
39. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
DNS (Domain Name System)
IPSec
Integrated Services Digital Network (ISDN)
OSI Layer 3: Network Layer
40. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Dual-Homed Firewall
Commonly used in logical bus - Ethernet - token ring.
Full-Duplex
Password Authentication Protocol (PAP)
41. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
802.11i
Circuit Switching
Bridge
Trunk Lines
42. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Multilevel Switching
Circuit Switching
Frame Relay
Fiber Distributed Data Interface (FDDI)
43. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Attenuation
SPIM
Application Proxy Firewall
10baseT
44. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
802.11b
Token Ring (802.5)
IGMP
Circuit Switching
45. In the OSI layer 5 - these are the types of what?
Wired Equivalent Privacy (WEP)
Simplex: One direction.
Application Proxy vs. Circuit Level
Circuit Switching
46. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Half-Duplex
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
ICMP (Internet Control Message Protocol)
UDP
47. Communication devices that determine synchronization scheme before data transmission.
FDDI-2
Spam over Internet Telephony (SPIT)
802.11
Synchronous Communication
48. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Classless inter-domain routing (CIDR)
Proxy Firewall
Ethernet (802.3)
OSI Layer 6: Presentation
49. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Remote Access Servers
Fiber-optic Cables
Metropolitan Area Network (MAN)
Kernel Proxy Firewall
50. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Ethernet (802.3)
Packet Filtering Firewall
Twisted Pair Cables
Frame Relay
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests