SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Bluejacking
Frame Relay
10baseT
Open Relay
2. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Circuit Level Proxy Firewall
Session Initiation Protocol (SIP)
FDDI-2
Token Ring (802.5)
3. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Ring Topology
Synchronous Optical Networks (SONETS)
Virtual Private Network (VPN)
Wide Area Network (WAN)
4. Identifys a WLAN. Can be used to segment environments into different WLANS.
Service Set ID (SSID)
UDP
Synchronous Data Link Control (SDLC)
802.15
5. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
SPIM
Session Initiation Protocol (SIP)
Bastion Host
Password Authentication Protocol (PAP)
6. Malware attack that sends commands inside of an ICMP packet.
Router
Loki Attack
Port Numbers
OSI Layer 4: Transport Layer
7. Type of network layout that is a large geographical region connecting more that one LAN.
Point-To-Point Tunneling Protocol (PPTP)
IPSec
Wide Area Network (WAN)
Asynchronous Transfer Mode (ATM)
8. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Wide Area Network (WAN)
Multistation Access Unit (MAU)
Spread Spectrum
Packet Filtering Firewall
9. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Wide Area Network (WAN)
ARP Poisoning
T1
OSI Layer 1: Physical
10. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Bluejacking
OSI Layer 3: Network Layer
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Full-Duplex
11. Type of cabling problem signals from one wire crossing over to another wire.
Repeaters
Crosstalk
Bastion Host
Twisted Pair Cables
12. Type of firewall that lies between the perimeter router and and LAN.
Noise
Screened Host Firewall
Digital Subscriber Line (DSL)
Source Routing
13. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Ring Topology
Carrier sense multiple access with collision detection (CSMA/CD)
Proxy Firewall
Packet Filtering Firewall
14. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
ARP (Address Resolution Protocol)
Serial Line Internet Protocol (SLIP)
Synchronous Optical Networks (SONETS)
Point-To-Point (PPP)
15. Network segment name for a DMZ created by two physical firewalls.
Multistation Access Unit (MAU)
Classless inter-domain routing (CIDR)
Spread Spectrum
Screened Sub-Net
16. Problems: Central device is a single point of failure.
IPv6
Open System Authentication (OSA)
Private Branch Exchange (PBX)
Star Topology
17. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Plenum-rated Cables
ThickNet - aka 10base5.
Committed Information Rate (CIR)
Remote Access Servers
18. Protocol that increases address size from 32 bits to 128 bits
IPv6
Wide Area Network (WAN)
Temporal Key Integrity Protocol (TKIP)
Spam over Internet Telephony (SPIT)
19. This network technology determines which system will send data based on which one has the token.
Simplex: One direction.
Token Passing
X.25
DNS (Domain Name System)
20. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Frame Relay
Point-To-Point Tunneling Protocol (PPTP)
Full-Duplex
Shared Key Authentication (SKA)
21. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Simplex: One direction.
Plenum-rated Cables
Shared Key Authentication (SKA)
Trunk Lines
22. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
OSI Data encapsulation
Ring Topology
Permanent Virtual Circuit (PVC)
Crosstalk
23. Both directions - only one application can send information at a time
OSI Data encapsulation
Half-Duplex
OSI Layer 7: Application
Carrier sense multiple access with collision detection (CSMA/CD)
24. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Kernel Proxy Firewall
Dedicated Links
Shared Key Authentication (SKA)
DNS (Domain Name System)
25. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Metropolitan Area Network (MAN)
Layers in the OSI Model
T1
Tree Topology
26. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Ring Topology
IPv6
Serial Line Internet Protocol (SLIP)
Frame Relay
27. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Application Proxy vs. Circuit Level
Packet Filtering Firewall
Commonly used in FDDI.
Frequency Hopping Spread Spectrum (FHSS)
28. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Circuit Switching
OSI Layer 4: Transport Layer
Router
Coaxial Cables
29. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Cable Modem
IGMP
Extensible Authentication Protocol (EAP)
UDP
30. Wireless standard that will improve security of wireless communication
Synchronous Optical Networks (SONETS)
Dual-Homed Firewall
Token Ring (802.5)
802.11i
31. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Switched Virtual Circuit (SVC)
Kernel Proxy Firewall
Ring Topology
Layers in the OSI Model
32. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Full-Duplex
802.11b
Circuit Level Proxy Firewall
LLC (Logical Link Control - 802.2)
33. Protocol that translates a MAC address into an IP address.
802.11
T1
802.11a
Reverse Address Resolution Protocol (RARP )
34. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Pulse Code Modulation (PCM)
Integrated Services Digital Network (ISDN)
OSI Data encapsulation
Temporal Key Integrity Protocol (TKIP)
35. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
OSI Data encapsulation
Layers in the TCP/IP Model
Packet Switching
Kernel Proxy Firewall
36. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
T1
Extensible Authentication Protocol (EAP)
Multi-protocol Label Switching
Pulse Code Modulation (PCM)
37. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Channel Service Unit/Data Service Unit (CSU/DSU)
VLAN
Wide Area Network (WAN)
38. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Extensible Authentication Protocol (EAP)
802.11i
LLC (Logical Link Control - 802.2)
Commonly used in FDDI.
39. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Bastion Host
IPSec
LLC (Logical Link Control - 802.2)
Bus Topology
40. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Network Address Translator (NAT)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
IPSec
Switch
41. Protocol for allowing multi-cast (one to many) communication
802.15
IGMP
Extensible Authentication Protocol (EAP)
Ring Topology
42. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
Plenum-rated Cables
Wireless Application Protocol (WAP)
Kernel Proxy Firewall
High Level Data Link Control (HLDC)
43. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Iterated Association
Open System Authentication (OSA)
Spread Spectrum
802.11
44. Set of rules that dictates how computer communicate over networks.
OSI Layer 7: Application
ThinNet - aka 10base2
OSI Layer 4: Transport Layer
Definition of Protocol
45. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Circuit Level Proxy Firewall
Pulse Code Modulation (PCM)
Private Branch Exchange (PBX)
Layer 2 Tunneling Protocol (L2TP)
46. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Channel Service Unit/Data Service Unit (CSU/DSU)
Bus Topology
Open System Authentication (OSA)
10baseT
47. Standard that addresses wireless MAN technologies.
802.16
TCP
Layer 2 Tunneling Protocol (L2TP)
Full-Duplex
48. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Commonly used in Ethernet.
ThickNet - aka 10base5.
802.15
Subnetting
49. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Switch
802.11
Mesh Topology
Application Proxy vs. Circuit Level
50. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Cable Modem
802.11
Extensible Authentication Protocol (EAP)
Screened Sub-Net