SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Distributed Environment Challenge
Screened Host Firewall
Commonly used in Internet.
Synchronous Optical Networks (SONETS)
2. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
High Level Data Link Control (HLDC)
802.11
Twisted Pair Cables
Source Routing
3. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Application Proxy Firewall
Extensible Authentication Protocol (EAP)
Integrated Services Digital Network (ISDN)
Proxy Firewall Strengths
4. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
CBC-MAC Protocol (CCMP)
Bridge
Subnetting
Star Topology
5. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Repeaters
Layers in the OSI Model
IPv6
Point-To-Point Tunneling Protocol (PPTP)
6. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Stateful Firewall
Dual-Homed Firewall
Virtual Private Network (VPN)
IPSec
7. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Coaxial Cables
Shared Key Authentication (SKA)
Router
Repeaters
8. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Synchronous Optical Networks (SONETS)
Packet Filtering Firewall
DOS attacks from flooding
Network Address Translator (NAT)
9. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
802.11b
Frame Relay
IPSec
OSI Layer 6: Presentation
10. Standard that addresses wireless MAN technologies.
Star Topology
Packet Switching
802.16
Pulse Code Modulation (PCM)
11. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Channel Service Unit/Data Service Unit (CSU/DSU)
Reverse Address Resolution Protocol (RARP )
Definition of Protocol
ThinNet - aka 10base2
12. Type of cabling problem signals from one wire crossing over to another wire.
Committed Information Rate (CIR)
Crosstalk
Commonly used in logical bus - Ethernet - token ring.
Distributed Environment Challenge
13. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Digital Subscriber Line (DSL)
Kernel Proxy Firewall
Point-To-Point (PPP)
Source Routing
14. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Wide Area Network (WAN)
Pulse Code Modulation (PCM)
Layers in the TCP/IP Model
Blue Boxing
15. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Synchronous Optical Networks (SONETS)
Commonly used in FDDI.
Packet Filtering Firewall
Channel Service Unit/Data Service Unit (CSU/DSU)
16. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Layer 2 Tunneling Protocol (L2TP)
Extensible Authentication Protocol (EAP)
Switch
Crosstalk
17. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
DNS (Domain Name System)
Commonly used in logical bus - Ethernet - token ring.
Integrated Services Digital Network (ISDN)
Asynchronous Transfer Mode (ATM)
18. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
IPv6
Layers in the OSI Model
Integrated Services Digital Network (ISDN)
Frequency Hopping Spread Spectrum (FHSS)
19. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Ethernet (802.3)
Frame Relay
Packet Filtering Firewall
Extensible Authentication Protocol (EAP)
20. Both directions - only one application can send information at a time
Password Authentication Protocol (PAP)
Synchronous Optical Networks (SONETS)
Half-Duplex
Wide Area Network (WAN)
21. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Crosstalk
Packet Filtering Firewall
VLAN
Extensible Authentication Protocol (EAP)
22. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Channel Service Unit/Data Service Unit (CSU/DSU)
802.15
Bridge
Synchronous Communication
23. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Coaxial Cables
Metropolitan Area Network (MAN)
Bluejacking
Switch
24. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Coaxial Cables
Digital Subscriber Line (DSL)
Frame Relay
Commonly used in FDDI.
25. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Ethernet (802.3)
Permanent Virtual Circuit (PVC)
Router
Synchronous Data Link Control (SDLC)
26. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Bluejacking
Dynamic Packet Filtering
Asynchronous Communication
Half-Duplex
27. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Half-Duplex
Loki Attack
Bluejacking
Open System Authentication (OSA)
28. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
T1
Packet Filtering Firewall
IPv6
Carrier sense multiple access with collision detection (CSMA/CD)
29. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Shared Key Authentication (SKA)
Challenge Handshake Authentication Protocol (CHAP)
Cable Modem
High Level Data Link Control (HLDC)
30. Set of rules that dictates how computer communicate over networks.
Commonly used in logical bus - Ethernet - token ring.
Frame Relay
Definition of Protocol
SPIM
31. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Switched Virtual Circuit (SVC)
Layers in the TCP/IP Model
CBC-MAC Protocol (CCMP)
Circuit Level Proxy Firewall
32. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Asynchronous Transfer Mode (ATM)
Ethernet (802.3)
Spread Spectrum
Pulse Code Modulation (PCM)
33. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Temporal Key Integrity Protocol (TKIP)
Star Topology
Point-To-Point (PPP)
Application Proxy vs. Circuit Level
34. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Commonly used in FDDI.
Cable Modem
Bridge
Wired Equivalent Privacy (WEP)
35. Protocol that increases address size from 32 bits to 128 bits
ARP (Address Resolution Protocol)
OSI Layer 1: Physical
Isochronous Communication Processes
IPv6
36. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Proxy Firewall
802.11i
Remote Access Servers
Spam over Internet Telephony (SPIT)
37. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Bastion Host
Multi-protocol Label Switching
802.11b
Cable Modem
38. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Virtual Private Network (VPN)
Synchronous Data Link Control (SDLC)
Repeaters
OSI Layer 2: Data Link Layer
39. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Stateful Firewall
Token Ring (802.5)
X.25
Fiber-optic Cables
40. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
10baseT
Fiber-optic Cables
Twisted Pair Cables
Permanent Virtual Circuit (PVC)
41. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Spread Spectrum
OSI Layer 6: Presentation
Coaxial Cables
Password Authentication Protocol (PAP)
42. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
T3
Packet Switching
Packet Filtering Firewall
Stateful Firewall
43. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Integrated Services Digital Network (ISDN)
Commonly used in Ethernet.
Router
OSI Layer 6: Presentation
44. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Committed Information Rate (CIR)
Permanent Virtual Circuit (PVC)
Packet Switching
Coaxial Cables
45. Type of network layout that separates and group computers logically.
VLAN
Bastion Host
Dual-Homed Firewall
Repeaters
46. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
TCP
Permanent Virtual Circuit (PVC)
Direct Sequence Spread Spectrum (DSSS)
Open System Authentication (OSA)
47. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Packet Filtering Firewall
Fiber-optic Cables
Point-To-Point Tunneling Protocol (PPTP)
Plenum-rated Cables
48. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
LLC (Logical Link Control - 802.2)
Coaxial Cables
T3
CBC-MAC Protocol (CCMP)
49. Protocol that translates a MAC address into an IP address.
Layers in the OSI Model
Reverse Address Resolution Protocol (RARP )
Integrated Services Digital Network (ISDN)
LLC (Logical Link Control - 802.2)
50. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
802.16
Half-Duplex
Asynchronous Transfer Mode (ATM)
Multi-protocol Label Switching