SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
802.11b
IGMP
Challenge Handshake Authentication Protocol (CHAP)
2. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Multilevel Switching
Direct Sequence Spread Spectrum (DSSS)
Asynchronous Transfer Mode (ATM)
Layers in the TCP/IP Model
3. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
ThickNet - aka 10base5.
ThinNet - aka 10base2
Committed Information Rate (CIR)
Integrated Services Digital Network (ISDN)
4. Standard that outlines wireless personal area network (WPAN) technologies.
Bridge
Frame Relay
802.15
Switch
5. SMTP server that is configured for sending email from any source to and destination.
Remote Access Servers
Full-Duplex
Trunk Lines
Open Relay
6. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
Bastion Host
Network Address Translator (NAT)
UDP
Switch
7. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Ring Topology
Application Proxy vs. Circuit Level
Fiber Distributed Data Interface (FDDI)
OSI Layer 6: Presentation
8. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Circuit Level Proxy Firewall
Proxy Firewall
Packet Filtering Firewall
Packet Switching
9. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Plenum-rated Cables
Spam over Internet Telephony (SPIT)
Wireless Application Protocol (WAP)
802.16
10. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Stateful Firewall
Challenge Handshake Authentication Protocol (CHAP)
Integrated Services Digital Network (ISDN)
T1
11. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Frequency Hopping Spread Spectrum (FHSS)
Permanent Virtual Circuit (PVC)
LLC (Logical Link Control - 802.2)
Spread Spectrum
12. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Packet Switching
Coaxial Cables
Open System Authentication (OSA)
Classless inter-domain routing (CIDR)
13. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
X.25
802.11a
VoIP
10baseT
14. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
IGMP
Remote Access Servers
Noise
Repeaters
15. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
X.25
Crosstalk
Repeaters
SOCKS Firewall
16. Malware attack that sends commands inside of an ICMP packet.
Screened Host Firewall
Password Authentication Protocol (PAP)
Loki Attack
Tree Topology
17. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Bus Topology
VoIP
Synchronous Data Link Control (SDLC)
LLC (Logical Link Control - 802.2)
18. Network segment name for a DMZ created by two physical firewalls.
Point-To-Point Tunneling Protocol (PPTP)
Attenuation
Screened Sub-Net
Trunk Lines
19. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Application Proxy Firewall
Wired Equivalent Privacy (WEP)
X.25
Source Routing
20. Protocol that translates a MAC address into an IP address.
OSI Layer 7: Application
Proxy Firewall
Reverse Address Resolution Protocol (RARP )
Asynchronous Communication
21. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Full-Duplex
Circuit Switching
ThickNet - aka 10base5.
Service Set ID (SSID)
22. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Integrated Services Digital Network (ISDN)
Screened Host Firewall
Packet Filtering Firewall
Mesh Topology
23. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
OSI Layer 6: Presentation
DNS (Domain Name System)
Token Ring (802.5)
Asynchronous Communication
24. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
DNS (Domain Name System)
Serial Line Internet Protocol (SLIP)
Challenge Handshake Authentication Protocol (CHAP)
Port Numbers
25. Spam over IM
Wide Area Network (WAN)
Permanent Virtual Circuit (PVC)
Multistation Access Unit (MAU)
SPIM
26. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Extensible Authentication Protocol (EAP)
Wireless Application Protocol (WAP)
Screened Host Firewall
Stateful Firewall
27. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Proxy Firewall
Tree Topology
Bastion Host
Mesh Topology
28. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Definition of Protocol
UDP
Commonly used in FDDI.
Attenuation
29. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
T3
Open System Authentication (OSA)
Ring Topology
Fiber-optic Cables
30. Standard that addresses wireless MAN technologies.
Stateful Firewall
Open System Authentication (OSA)
802.16
Distributed Environment Challenge
31. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
OSI Data encapsulation
ICMP (Internet Control Message Protocol)
Definition of Protocol
Frequency Hopping Spread Spectrum (FHSS)
32. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Wide Area Network (WAN)
Subnetting
Layers in the OSI Model
Channel Service Unit/Data Service Unit (CSU/DSU)
33. Type of wireless security standard that uses AES in CBC mode.
Stateful Firewall
Star Topology
CBC-MAC Protocol (CCMP)
802.16
34. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Point-To-Point (PPP)
Dedicated Links
Kernel Proxy Firewall
802.11a
35. This network technology determines which system will send data based on which one has the token.
Mesh Topology
Token Passing
Extensible Authentication Protocol (EAP)
Digital Subscriber Line (DSL)
36. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Frame Relay
High Level Data Link Control (HLDC)
X.25
Router
37. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Point-To-Point Tunneling Protocol (PPTP)
Switch
Ethernet (802.3)
OSI Layer 7: Application
38. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Synchronous Data Link Control (SDLC)
802.11
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
OSI Data encapsulation
39. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Layer 2 Tunneling Protocol (L2TP)
Token Passing
Packet Filtering Firewall
X.25
40. Communication devices that determine synchronization scheme before data transmission.
Committed Information Rate (CIR)
Crosstalk
Synchronous Communication
Carrier sense multiple access with collision detection (CSMA/CD)
41. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Frame Relay
Multilevel Switching
Iterated Association
Bridge
42. New variant to traditional email spam on VoIP networks.
Token Ring (802.5)
Spam over Internet Telephony (SPIT)
Pulse Code Modulation (PCM)
Screened Host Firewall
43. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Packet Filtering Firewall
LLC (Logical Link Control - 802.2)
Fiber Distributed Data Interface (FDDI)
Attenuation
44. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Noise
Virtual Private Network (VPN)
T1
Wide Area Network (WAN)
45. Set of rules that dictates how computer communicate over networks.
Commonly used in Ethernet.
Router
Wired Equivalent Privacy (WEP)
Definition of Protocol
46. Protocol that translates IP address into a MAC address (physical Ethernet address)
Trunk Lines
Point-To-Point Tunneling Protocol (PPTP)
Session Initiation Protocol (SIP)
ARP (Address Resolution Protocol)
47. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
Bridge
High Level Data Link Control (HLDC)
IGMP
Packet Filtering Firewall
48. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Open System Authentication (OSA)
Circuit Level Proxy Firewall
UDP
Switch
49. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Packet Switching
FDDI-2
ThickNet - aka 10base5.
IPSec
50. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
Twisted Pair Cables
Screened Sub-Net
Crosstalk
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests