SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol for allowing multi-cast (one to many) communication
Channel Service Unit/Data Service Unit (CSU/DSU)
IGMP
Challenge Handshake Authentication Protocol (CHAP)
Layers in the TCP/IP Model
2. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Synchronous Data Link Control (SDLC)
SPIM
Open Relay
Frame Relay
3. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
DOS attacks from flooding
Tree Topology
Password Authentication Protocol (PAP)
Packet Filtering Firewall
4. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Spread Spectrum
High Level Data Link Control (HLDC)
Twisted Pair Cables
SOCKS Firewall
5. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
OSI Layer 6: Presentation
Bastion Host
Direct Sequence Spread Spectrum (DSSS)
Subnetting
6. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Commonly used in Ethernet.
Service Set ID (SSID)
IGMP
Isochronous Communication Processes
7. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Definition of Protocol
Packet Switching
Layers in the TCP/IP Model
Cable Modem
8. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Virtual Private Network (VPN)
SPIM
IGMP
Tree Topology
9. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Asynchronous Transfer Mode (ATM)
Ethernet (802.3)
802.11
OSI Layer 3: Network Layer
10. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Wired Equivalent Privacy (WEP)
802.11i
Half-Duplex
Digital Subscriber Line (DSL)
11. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Multi-protocol Label Switching
Noise
Loki Attack
Reverse Address Resolution Protocol (RARP )
12. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Frequency Hopping Spread Spectrum (FHSS)
Metropolitan Area Network (MAN)
Twisted Pair Cables
Synchronous Communication
13. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
10baseT
TCP
Token Ring (802.5)
Noise
14. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Virtual Private Network (VPN)
Noise
Integrated Services Digital Network (ISDN)
Metropolitan Area Network (MAN)
15. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Circuit Level Proxy Firewall
ARP (Address Resolution Protocol)
Integrated Services Digital Network (ISDN)
Metropolitan Area Network (MAN)
16. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Circuit Level Proxy Firewall
Full-Duplex
Point-To-Point (PPP)
Fiber-optic Cables
17. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
OSI Data encapsulation
802.15
10baseT
802.11
18. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Router
X.25
Remote Access Servers
IGMP
19. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Dual-Homed Firewall
Switched Virtual Circuit (SVC)
Synchronous Communication
SPIM
20. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
ThickNet - aka 10base5.
Half-Duplex
Router
Proxy Firewall
21. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Application Proxy vs. Circuit Level
Wide Area Network (WAN)
Ring Topology
10baseT
22. Wireless communication that distributes individual signals across the allocated frequencies.
Definition of Protocol
Spread Spectrum
Frame Relay
ICMP (Internet Control Message Protocol)
23. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Definition of Protocol
ThickNet - aka 10base5.
TCP
Port Numbers
24. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Commonly used in FDDI.
Bus Topology
Pulse Code Modulation (PCM)
ARP Poisoning
25. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
ThickNet - aka 10base5.
Wireless Application Protocol (WAP)
IGMP
Channel Service Unit/Data Service Unit (CSU/DSU)
26. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
X.25
UDP
Fiber-optic Cables
IPSec
27. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Dedicated Links
Fiber Distributed Data Interface (FDDI)
Channel Service Unit/Data Service Unit (CSU/DSU)
Private Branch Exchange (PBX)
28. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
ICMP (Internet Control Message Protocol)
Packet Switching
Cable Modem
Ethernet (802.3)
29. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Fiber Distributed Data Interface (FDDI)
Screened Sub-Net
Session Initiation Protocol (SIP)
Ring Topology
30. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
Remote Access Servers
Simplex: One direction.
Multilevel Switching
31. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
OSI Layer 7: Application
Spread Spectrum
DOS attacks from flooding
Commonly used in FDDI.
32. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Reverse Address Resolution Protocol (RARP )
Source Routing
802.11b
Noise
33. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Kernel Proxy Firewall
Packet Filtering Firewall
802.11
Token Ring (802.5)
34. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Synchronous Data Link Control (SDLC)
Spread Spectrum
Distributed Environment Challenge
Frame Relay
35. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Star Topology
Wired Equivalent Privacy (WEP)
ThinNet - aka 10base2
Router
36. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Dedicated Links
Spam over Internet Telephony (SPIT)
802.16
Asynchronous Transfer Mode (ATM)
37. Standard that addresses wireless MAN technologies.
Carrier sense multiple access with collision detection (CSMA/CD)
VoIP
802.16
Bastion Host
38. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Repeaters
Commonly used in logical bus - Ethernet - token ring.
Shared Key Authentication (SKA)
Layer 2 Tunneling Protocol (L2TP)
39. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Commonly used in Internet.
Token Ring (802.5)
T3
ARP Poisoning
40. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Multi-protocol Label Switching
Source Routing
Iterated Association
ThinNet - aka 10base2
41. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
LLC (Logical Link Control - 802.2)
Mesh Topology
Asynchronous Transfer Mode (ATM)
Asynchronous Communication
42. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Bluejacking
Wired Equivalent Privacy (WEP)
Temporal Key Integrity Protocol (TKIP)
VoIP
43. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Fiber Distributed Data Interface (FDDI)
Attenuation
Subnetting
Digital Subscriber Line (DSL)
44. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
Router
IGMP
UDP
45. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Bridge
Port Numbers
Extensible Authentication Protocol (EAP)
Isochronous Communication Processes
46. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Stateful Firewall
VoIP
OSI Data encapsulation
Frame Relay
47. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
IGMP
Commonly used in logical bus - Ethernet - token ring.
High Level Data Link Control (HLDC)
Asynchronous Transfer Mode (ATM)
48. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
ThinNet - aka 10base2
OSI Layer 4: Transport Layer
FDDI-2
Wide Area Network (WAN)
49. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Dual-Homed Firewall
Stateful Firewall
Dynamic Packet Filtering
TCP
50. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Shared Key Authentication (SKA)
Isochronous Communication Processes
Extensible Authentication Protocol (EAP)
TCP