SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Router
OSI Layer 5: Session Layer
Token Ring (802.5)
Layers in the TCP/IP Model
2. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
802.11
Reverse Address Resolution Protocol (RARP )
OSI Data encapsulation
SOCKS Firewall
3. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Coaxial Cables
UDP
Carrier sense multiple access with collision detection (CSMA/CD)
Channel Service Unit/Data Service Unit (CSU/DSU)
4. Identifys a WLAN. Can be used to segment environments into different WLANS.
Service Set ID (SSID)
Proxy Firewall Strengths
Port Numbers
Temporal Key Integrity Protocol (TKIP)
5. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
UDP
Extensible Authentication Protocol (EAP)
Trunk Lines
Port Numbers
6. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Multilevel Switching
Trunk Lines
Metropolitan Area Network (MAN)
Wireless Application Protocol (WAP)
7. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Asynchronous Communication
Fiber-optic Cables
Multi-protocol Label Switching
ThickNet - aka 10base5.
8. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Full-Duplex
Reverse Address Resolution Protocol (RARP )
IPv6
10baseT
9. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Shared Key Authentication (SKA)
Bastion Host
Isochronous Communication Processes
ThickNet - aka 10base5.
10. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Distributed Environment Challenge
Integrated Services Digital Network (ISDN)
Trunk Lines
Bluejacking
11. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Coaxial Cables
Ring Topology
Asynchronous Communication
T1
12. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Asynchronous Communication
Bastion Host
Temporal Key Integrity Protocol (TKIP)
Synchronous Data Link Control (SDLC)
13. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
DNS (Domain Name System)
Bridge
Synchronous Data Link Control (SDLC)
LLC (Logical Link Control - 802.2)
14. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Layer 2 Tunneling Protocol (L2TP)
Remote Access Servers
Extensible Authentication Protocol (EAP)
Point-To-Point (PPP)
15. Protocol that translates a MAC address into an IP address.
Tree Topology
Committed Information Rate (CIR)
Token Ring (802.5)
Reverse Address Resolution Protocol (RARP )
16. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
Iterated Association
Router
OSI Layer 6: Presentation
17. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Tree Topology
Twisted Pair Cables
Bluejacking
Spread Spectrum
18. Both directions - only one application can send information at a time
Spread Spectrum
Packet Filtering Firewall
Proxy Firewall
Half-Duplex
19. Protocol that increases address size from 32 bits to 128 bits
Twisted Pair Cables
IPv6
Pulse Code Modulation (PCM)
Crosstalk
20. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Twisted Pair Cables
Bastion Host
Fiber Distributed Data Interface (FDDI)
Temporal Key Integrity Protocol (TKIP)
21. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Metropolitan Area Network (MAN)
Point-To-Point (PPP)
Token Ring (802.5)
Half-Duplex
22. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Circuit Level Proxy Firewall
Layers in the TCP/IP Model
Layer 2 Tunneling Protocol (L2TP)
Open Relay
23. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Dedicated Links
Packet Filtering Firewall
CBC-MAC Protocol (CCMP)
Proxy Firewall Strengths
24. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
Layers in the TCP/IP Model
UDP
Blue Boxing
SOCKS Firewall
25. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Full-Duplex
Session Initiation Protocol (SIP)
Frame Relay
Network Address Translator (NAT)
26. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Bastion Host
Application Proxy vs. Circuit Level
Twisted Pair Cables
OSI Layer 2: Data Link Layer
27. Communication devices that determine synchronization scheme before data transmission.
Committed Information Rate (CIR)
Synchronous Communication
Token Passing
Network Address Translator (NAT)
28. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
802.11a
Wireless Application Protocol (WAP)
Multi-protocol Label Switching
ThickNet - aka 10base5.
29. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Token Ring (802.5)
Application Proxy Firewall
Subnetting
Full-Duplex
30. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Fiber Distributed Data Interface (FDDI)
Router
Network Address Translator (NAT)
VoIP
31. Spam over IM
SPIM
Dedicated Links
802.11b
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
32. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Reverse Address Resolution Protocol (RARP )
Virtual Private Network (VPN)
Asynchronous Communication
Dedicated Links
33. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
CBC-MAC Protocol (CCMP)
Network Address Translator (NAT)
DOS attacks from flooding
SOCKS Firewall
34. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Frequency Hopping Spread Spectrum (FHSS)
ThinNet - aka 10base2
802.11b
Coaxial Cables
35. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Port Numbers
DNS (Domain Name System)
Star Topology
Integrated Services Digital Network (ISDN)
36. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
T3
Frequency Hopping Spread Spectrum (FHSS)
802.11
Star Topology
37. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
802.16
Bridge
OSI Layer 1: Physical
Bus Topology
38. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Layers in the TCP/IP Model
Commonly used in Ethernet.
Plenum-rated Cables
Metropolitan Area Network (MAN)
39. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Direct Sequence Spread Spectrum (DSSS)
OSI Layer 4: Transport Layer
Bluejacking
Extensible Authentication Protocol (EAP)
40. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Switched Virtual Circuit (SVC)
CBC-MAC Protocol (CCMP)
Extensible Authentication Protocol (EAP)
Channel Service Unit/Data Service Unit (CSU/DSU)
41. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Iterated Association
Source Routing
Packet Filtering Firewall
Dual-Homed Firewall
42. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
10baseT
Digital Subscriber Line (DSL)
CBC-MAC Protocol (CCMP)
Permanent Virtual Circuit (PVC)
43. This network technology determines which system will send data based on which one has the token.
Direct Sequence Spread Spectrum (DSSS)
Token Passing
Coaxial Cables
Frequency Hopping Spread Spectrum (FHSS)
44. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
DNS (Domain Name System)
Permanent Virtual Circuit (PVC)
Commonly used in FDDI.
45. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Kernel Proxy Firewall
Direct Sequence Spread Spectrum (DSSS)
Frame Relay
OSI Layer 7: Application
46. Wireless communication that distributes individual signals across the allocated frequencies.
Twisted Pair Cables
IPv6
Iterated Association
Spread Spectrum
47. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Twisted Pair Cables
X.25
802.11i
Switched Virtual Circuit (SVC)
48. Type of firewall that lies between the perimeter router and and LAN.
Ring Topology
Spread Spectrum
Synchronous Optical Networks (SONETS)
Screened Host Firewall
49. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Star Topology
X.25
Committed Information Rate (CIR)
Screened Sub-Net
50. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Service Set ID (SSID)
Asynchronous Communication
Pulse Code Modulation (PCM)
LLC (Logical Link Control - 802.2)