SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
DOS attacks from flooding
Multi-protocol Label Switching
Temporal Key Integrity Protocol (TKIP)
2. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Frequency Hopping Spread Spectrum (FHSS)
Extensible Authentication Protocol (EAP)
Committed Information Rate (CIR)
LLC (Logical Link Control - 802.2)
3. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Challenge Handshake Authentication Protocol (CHAP)
Circuit Switching
Proxy Firewall
SOCKS Firewall
4. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Switched Virtual Circuit (SVC)
Commonly used in FDDI.
Password Authentication Protocol (PAP)
IPv6
5. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Router
T3
Token Ring (802.5)
Packet Filtering Firewall
6. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Layers in the TCP/IP Model
Asynchronous Communication
Bus Topology
Open System Authentication (OSA)
7. Standard that addresses wireless MAN technologies.
Attenuation
802.16
802.11
Commonly used in Ethernet.
8. SMTP server that is configured for sending email from any source to and destination.
Loki Attack
Fiber-optic Cables
Wireless Application Protocol (WAP)
Open Relay
9. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Port Numbers
Source Routing
ARP Poisoning
802.11a
10. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
X.25
Token Passing
Spam over Internet Telephony (SPIT)
Carrier sense multiple access with collision detection (CSMA/CD)
11. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Layers in the TCP/IP Model
Shared Key Authentication (SKA)
IGMP
SOCKS Firewall
12. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
IPSec
Serial Line Internet Protocol (SLIP)
Screened Host Firewall
Temporal Key Integrity Protocol (TKIP)
13. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Open Relay
Channel Service Unit/Data Service Unit (CSU/DSU)
Permanent Virtual Circuit (PVC)
Multilevel Switching
14. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
802.11b
Session Initiation Protocol (SIP)
Packet Filtering Firewall
Plenum-rated Cables
15. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Packet Filtering Firewall
Ethernet (802.3)
Synchronous Optical Networks (SONETS)
Cable Modem
16. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Twisted Pair Cables
Iterated Association
OSI Layer 4: Transport Layer
Proxy Firewall Strengths
17. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
X.25
DNS (Domain Name System)
ICMP (Internet Control Message Protocol)
Dual-Homed Firewall
18. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Shared Key Authentication (SKA)
Noise
Ring Topology
Tree Topology
19. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Ring Topology
Kernel Proxy Firewall
OSI Layer 4: Transport Layer
Wireless Application Protocol (WAP)
20. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Repeaters
SOCKS Firewall
Application Proxy Firewall
Token Ring (802.5)
21. Protocol that increases address size from 32 bits to 128 bits
Frequency Hopping Spread Spectrum (FHSS)
TCP
IPv6
Network Address Translator (NAT)
22. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
IPv6
Extensible Authentication Protocol (EAP)
Wide Area Network (WAN)
Synchronous Data Link Control (SDLC)
23. Both directions - only one application can send information at a time
Blue Boxing
Half-Duplex
Packet Filtering Firewall
Virtual Private Network (VPN)
24. Wireless standard that will improve security of wireless communication
802.11i
Proxy Firewall Strengths
Dynamic Packet Filtering
Circuit Switching
25. Network segment name for a DMZ created by two physical firewalls.
Commonly used in Internet.
ARP Poisoning
Screened Sub-Net
T3
26. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Integrated Services Digital Network (ISDN)
VLAN
Packet Filtering Firewall
Switch
27. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
802.16
Layer 2 Tunneling Protocol (L2TP)
Isochronous Communication Processes
Loki Attack
28. Type of network layout that is a large geographical region connecting more that one LAN.
Plenum-rated Cables
Dynamic Packet Filtering
Application Proxy Firewall
Wide Area Network (WAN)
29. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Direct Sequence Spread Spectrum (DSSS)
Router
Fiber Distributed Data Interface (FDDI)
OSI Layer 1: Physical
30. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Commonly used in Ethernet.
OSI Layer 3: Network Layer
Multi-protocol Label Switching
Isochronous Communication Processes
31. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Cable Modem
Reverse Address Resolution Protocol (RARP )
Packet Switching
Full-Duplex
32. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
X.25
Switched Virtual Circuit (SVC)
Direct Sequence Spread Spectrum (DSSS)
Password Authentication Protocol (PAP)
33. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Frame Relay
Layers in the OSI Model
Full-Duplex
Crosstalk
34. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
802.11a
Crosstalk
Network Address Translator (NAT)
802.16
35. In a token ring network - each computer is connected to this - which acts as a central hub.
Multistation Access Unit (MAU)
Cable Modem
Commonly used in Internet.
Iterated Association
36. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Full-Duplex
Channel Service Unit/Data Service Unit (CSU/DSU)
Network Address Translator (NAT)
Half-Duplex
37. Type of cabling problem signals from one wire crossing over to another wire.
Pulse Code Modulation (PCM)
Challenge Handshake Authentication Protocol (CHAP)
TCP
Crosstalk
38. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Crosstalk
Dual-Homed Firewall
Dynamic Packet Filtering
Kernel Proxy Firewall
39. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Password Authentication Protocol (PAP)
Metropolitan Area Network (MAN)
ARP Poisoning
Source Routing
40. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Application Proxy Firewall
Source Routing
IPSec
Integrated Services Digital Network (ISDN)
41. Spam over IM
SPIM
Channel Service Unit/Data Service Unit (CSU/DSU)
Simplex: One direction.
Point-To-Point (PPP)
42. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Point-To-Point Tunneling Protocol (PPTP)
Asynchronous Communication
Integrated Services Digital Network (ISDN)
Source Routing
43. Type of wireless security standard that uses AES in CBC mode.
Simplex: One direction.
CBC-MAC Protocol (CCMP)
Layers in the TCP/IP Model
OSI Layer 7: Application
44. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
DOS attacks from flooding
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Repeaters
OSI Layer 2: Data Link Layer
45. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
DOS attacks from flooding
Layers in the OSI Model
Metropolitan Area Network (MAN)
Mesh Topology
46. In the OSI layer 5 - these are the types of what?
Simplex: One direction.
Synchronous Communication
Noise
IGMP
47. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Fiber-optic Cables
VLAN
IPSec
Wired Equivalent Privacy (WEP)
48. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Extensible Authentication Protocol (EAP)
Cable Modem
SOCKS Firewall
Wireless Application Protocol (WAP)
49. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
OSI Layer 1: Physical
Kernel Proxy Firewall
OSI Layer 7: Application
Dual-Homed Firewall
50. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
X.25
FDDI-2
Point-To-Point (PPP)
Challenge Handshake Authentication Protocol (CHAP)