SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
Shared Key Authentication (SKA)
Dedicated Links
802.11
2. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Dynamic Packet Filtering
DOS attacks from flooding
Switched Virtual Circuit (SVC)
Digital Subscriber Line (DSL)
3. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Dedicated Links
SOCKS Firewall
Full-Duplex
Service Set ID (SSID)
4. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Bluejacking
Wide Area Network (WAN)
Remote Access Servers
Packet Switching
5. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
OSI Layer 7: Application
Blue Boxing
Network Address Translator (NAT)
Multistation Access Unit (MAU)
6. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Bluejacking
ARP Poisoning
Screened Host Firewall
Half-Duplex
7. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Simplex: One direction.
Bridge
OSI Data encapsulation
Coaxial Cables
8. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
OSI Layer 7: Application
Open Relay
Commonly used in Ethernet.
Layers in the OSI Model
9. Type of wireless security standard that uses AES in CBC mode.
Commonly used in Ethernet.
Wired Equivalent Privacy (WEP)
CBC-MAC Protocol (CCMP)
OSI Layer 3: Network Layer
10. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
SOCKS Firewall
Cable Modem
Direct Sequence Spread Spectrum (DSSS)
Bus Topology
11. Identifys a WLAN. Can be used to segment environments into different WLANS.
Coaxial Cables
ICMP (Internet Control Message Protocol)
Service Set ID (SSID)
Switched Virtual Circuit (SVC)
12. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Token Ring (802.5)
Channel Service Unit/Data Service Unit (CSU/DSU)
OSI Layer 3: Network Layer
Extensible Authentication Protocol (EAP)
13. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
DNS (Domain Name System)
IPv6
Noise
Stateful Firewall
14. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Pulse Code Modulation (PCM)
Layer 2 Tunneling Protocol (L2TP)
Trunk Lines
Crosstalk
15. Protocol that translates IP address into a MAC address (physical Ethernet address)
Service Set ID (SSID)
ARP (Address Resolution Protocol)
Pulse Code Modulation (PCM)
ThinNet - aka 10base2
16. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
IPSec
Circuit Level Proxy Firewall
Bastion Host
Session Initiation Protocol (SIP)
17. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
SPIM
Isochronous Communication Processes
Loki Attack
IGMP
18. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
LLC (Logical Link Control - 802.2)
Bluejacking
Circuit Switching
Serial Line Internet Protocol (SLIP)
19. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Digital Subscriber Line (DSL)
Fiber-optic Cables
Subnetting
Bridge
20. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Spam over Internet Telephony (SPIT)
DOS attacks from flooding
Wide Area Network (WAN)
Plenum-rated Cables
21. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Definition of Protocol
OSI Layer 6: Presentation
Multilevel Switching
FDDI-2
22. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
OSI Layer 2: Data Link Layer
TCP
Twisted Pair Cables
Password Authentication Protocol (PAP)
23. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Bus Topology
802.11
DNS (Domain Name System)
Commonly used in Ethernet.
24. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Twisted Pair Cables
ICMP (Internet Control Message Protocol)
Temporal Key Integrity Protocol (TKIP)
802.15
25. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Asynchronous Transfer Mode (ATM)
Synchronous Optical Networks (SONETS)
Challenge Handshake Authentication Protocol (CHAP)
Password Authentication Protocol (PAP)
26. Set of rules that dictates how computer communicate over networks.
ARP Poisoning
Definition of Protocol
Proxy Firewall Strengths
Wide Area Network (WAN)
27. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Asynchronous Communication
Cable Modem
802.11
Classless inter-domain routing (CIDR)
28. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
T1
Multistation Access Unit (MAU)
Fiber Distributed Data Interface (FDDI)
Switch
29. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Layers in the OSI Model
Coaxial Cables
ICMP (Internet Control Message Protocol)
Password Authentication Protocol (PAP)
30. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Simplex: One direction.
Ethernet (802.3)
Token Ring (802.5)
Router
31. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Spam over Internet Telephony (SPIT)
Wired Equivalent Privacy (WEP)
LLC (Logical Link Control - 802.2)
Plenum-rated Cables
32. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Twisted Pair Cables
Packet Filtering Firewall
Bus Topology
Subnetting
33. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Packet Switching
Bastion Host
Token Passing
T1
34. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Layers in the TCP/IP Model
Wide Area Network (WAN)
IPSec
VoIP
35. In the OSI layer 5 - these are the types of what?
Simplex: One direction.
Fiber Distributed Data Interface (FDDI)
Asynchronous Transfer Mode (ATM)
Token Passing
36. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Bastion Host
Frame Relay
Packet Filtering Firewall
Layers in the OSI Model
37. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Shared Key Authentication (SKA)
T1
Layers in the TCP/IP Model
802.11i
38. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Shared Key Authentication (SKA)
Classless inter-domain routing (CIDR)
Plenum-rated Cables
Spread Spectrum
39. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
DOS attacks from flooding
Open System Authentication (OSA)
Application Proxy vs. Circuit Level
Commonly used in logical bus - Ethernet - token ring.
40. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
UDP
Ethernet (802.3)
Classless inter-domain routing (CIDR)
Multistation Access Unit (MAU)
41. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Twisted Pair Cables
Spam over Internet Telephony (SPIT)
Router
Wired Equivalent Privacy (WEP)
42. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Metropolitan Area Network (MAN)
Wired Equivalent Privacy (WEP)
Session Initiation Protocol (SIP)
DNS (Domain Name System)
43. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Commonly used in Ethernet.
ThinNet - aka 10base2
Router
Subnetting
44. Both directions - only one application can send information at a time
LLC (Logical Link Control - 802.2)
Half-Duplex
Wireless Application Protocol (WAP)
Iterated Association
45. SMTP server that is configured for sending email from any source to and destination.
Application Proxy Firewall
Multi-protocol Label Switching
Spread Spectrum
Open Relay
46. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Permanent Virtual Circuit (PVC)
Distributed Environment Challenge
Dedicated Links
Committed Information Rate (CIR)
47. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Stateful Firewall
Proxy Firewall
Synchronous Communication
Simplex: One direction.
48. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Private Branch Exchange (PBX)
Permanent Virtual Circuit (PVC)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Synchronous Communication
49. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Bus Topology
Layers in the TCP/IP Model
OSI Layer 4: Transport Layer
Commonly used in Ethernet.
50. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
Coaxial Cables
Synchronous Communication
High Level Data Link Control (HLDC)
Noise
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests