SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Identifys a WLAN. Can be used to segment environments into different WLANS.
Remote Access Servers
Service Set ID (SSID)
Circuit Level Proxy Firewall
T3
2. Standard that addresses wireless MAN technologies.
802.16
Circuit Switching
Iterated Association
IPSec
3. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Pulse Code Modulation (PCM)
Fiber Distributed Data Interface (FDDI)
Layers in the OSI Model
Switch
4. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
OSI Layer 3: Network Layer
Isochronous Communication Processes
Circuit Level Proxy Firewall
Commonly used in Ethernet.
5. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Subnetting
Frequency Hopping Spread Spectrum (FHSS)
Simplex: One direction.
Direct Sequence Spread Spectrum (DSSS)
6. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
LLC (Logical Link Control - 802.2)
Metropolitan Area Network (MAN)
Reverse Address Resolution Protocol (RARP )
Spam over Internet Telephony (SPIT)
7. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
802.11
Commonly used in Ethernet.
Dual-Homed Firewall
Dedicated Links
8. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
OSI Layer 1: Physical
Packet Filtering Firewall
Switch
Synchronous Data Link Control (SDLC)
9. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Plenum-rated Cables
Classless inter-domain routing (CIDR)
Private Branch Exchange (PBX)
Blue Boxing
10. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Blue Boxing
SOCKS Firewall
Service Set ID (SSID)
Synchronous Optical Networks (SONETS)
11. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
Wide Area Network (WAN)
Open Relay
T1
12. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Wireless Application Protocol (WAP)
OSI Layer 1: Physical
Half-Duplex
Dual-Homed Firewall
13. Wireless standard that will improve security of wireless communication
Bus Topology
Token Ring (802.5)
802.11i
Open Relay
14. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Digital Subscriber Line (DSL)
Definition of Protocol
Ring Topology
Carrier sense multiple access with collision detection (CSMA/CD)
15. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Router
Stateful Firewall
T1
Distributed Environment Challenge
16. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Layers in the OSI Model
UDP
Synchronous Data Link Control (SDLC)
Plenum-rated Cables
17. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Point-To-Point Tunneling Protocol (PPTP)
802.15
Switched Virtual Circuit (SVC)
OSI Layer 7: Application
18. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Committed Information Rate (CIR)
Ethernet (802.3)
Point-To-Point Tunneling Protocol (PPTP)
T1
19. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
FDDI-2
OSI Layer 7: Application
Session Initiation Protocol (SIP)
ARP (Address Resolution Protocol)
20. Protocol that translates a MAC address into an IP address.
VLAN
Temporal Key Integrity Protocol (TKIP)
Reverse Address Resolution Protocol (RARP )
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
21. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Synchronous Optical Networks (SONETS)
Plenum-rated Cables
Screened Host Firewall
Open System Authentication (OSA)
22. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Noise
Full-Duplex
Proxy Firewall Strengths
IGMP
23. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
IGMP
Token Passing
Bus Topology
X.25
24. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
DOS attacks from flooding
Cable Modem
Point-To-Point (PPP)
FDDI-2
25. Both directions - both applications can send information at a time. Session Layer Communication Modes
Full-Duplex
Classless inter-domain routing (CIDR)
Cable Modem
LLC (Logical Link Control - 802.2)
26. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Switched Virtual Circuit (SVC)
Dual-Homed Firewall
Stateful Firewall
IGMP
27. New variant to traditional email spam on VoIP networks.
OSI Layer 7: Application
Multistation Access Unit (MAU)
Spam over Internet Telephony (SPIT)
VoIP
28. Standard that outlines wireless personal area network (WPAN) technologies.
Router
Wide Area Network (WAN)
Carrier sense multiple access with collision detection (CSMA/CD)
802.15
29. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
VoIP
Multi-protocol Label Switching
Layers in the TCP/IP Model
Distributed Environment Challenge
30. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Point-To-Point (PPP)
Session Initiation Protocol (SIP)
High Level Data Link Control (HLDC)
802.16
31. Type of wireless security standard that uses AES in CBC mode.
T1
DOS attacks from flooding
Token Passing
CBC-MAC Protocol (CCMP)
32. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
OSI Layer 1: Physical
Trunk Lines
Packet Filtering Firewall
IPSec
33. Type of firewall that lies between the perimeter router and and LAN.
Digital Subscriber Line (DSL)
Screened Host Firewall
Session Initiation Protocol (SIP)
Iterated Association
34. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
X.25
OSI Layer 2: Data Link Layer
ICMP (Internet Control Message Protocol)
Dual-Homed Firewall
35. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Asynchronous Communication
Metropolitan Area Network (MAN)
Temporal Key Integrity Protocol (TKIP)
Definition of Protocol
36. Both directions - only one application can send information at a time
Dynamic Packet Filtering
DOS attacks from flooding
Bastion Host
Half-Duplex
37. Problems: Central device is a single point of failure.
UDP
Switch
Point-To-Point (PPP)
Star Topology
38. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Asynchronous Transfer Mode (ATM)
Token Passing
Dynamic Packet Filtering
Stateful Firewall
39. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
OSI Data encapsulation
OSI Layer 1: Physical
Challenge Handshake Authentication Protocol (CHAP)
Proxy Firewall Strengths
40. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Noise
Private Branch Exchange (PBX)
Application Proxy Firewall
Token Ring (802.5)
41. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
802.11b
OSI Layer 6: Presentation
Dedicated Links
VoIP
42. Network segment name for a DMZ created by two physical firewalls.
Mesh Topology
Screened Sub-Net
T1
Classless inter-domain routing (CIDR)
43. Type of network layout that is a large geographical region connecting more that one LAN.
OSI Layer 7: Application
VLAN
Commonly used in FDDI.
Wide Area Network (WAN)
44. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Direct Sequence Spread Spectrum (DSSS)
ARP Poisoning
Multistation Access Unit (MAU)
Source Routing
45. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Commonly used in Ethernet.
FDDI-2
Proxy Firewall Strengths
10baseT
46. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
CBC-MAC Protocol (CCMP)
UDP
Synchronous Optical Networks (SONETS)
Token Ring (802.5)
47. Type of network layout that separates and group computers logically.
VLAN
Isochronous Communication Processes
DOS attacks from flooding
SPIM
48. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Commonly used in FDDI.
Dynamic Packet Filtering
Bastion Host
Remote Access Servers
49. Communication devices that determine synchronization scheme before data transmission.
ThinNet - aka 10base2
Layers in the OSI Model
Synchronous Communication
Bastion Host
50. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Wired Equivalent Privacy (WEP)
Tree Topology
Coaxial Cables
Simplex: One direction.