SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Distributed Environment Challenge
IPv6
Dual-Homed Firewall
2. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Cable Modem
Loki Attack
Stateful Firewall
Ring Topology
3. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
T3
802.11a
Shared Key Authentication (SKA)
Multi-protocol Label Switching
4. Both directions - only one application can send information at a time
Half-Duplex
Asynchronous Communication
Loki Attack
ARP (Address Resolution Protocol)
5. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Multistation Access Unit (MAU)
Application Proxy Firewall
Service Set ID (SSID)
IPSec
6. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
ThickNet - aka 10base5.
Bastion Host
OSI Layer 5: Session Layer
Screened Host Firewall
7. Wireless standard that will improve security of wireless communication
Synchronous Communication
Digital Subscriber Line (DSL)
802.11i
Attenuation
8. Malware attack that sends commands inside of an ICMP packet.
Loki Attack
Shared Key Authentication (SKA)
Full-Duplex
Temporal Key Integrity Protocol (TKIP)
9. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Bridge
Remote Access Servers
Open System Authentication (OSA)
OSI Layer 7: Application
10. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Classless inter-domain routing (CIDR)
Packet Filtering Firewall
802.16
Permanent Virtual Circuit (PVC)
11. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Noise
Bridge
Crosstalk
OSI Layer 6: Presentation
12. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Wired Equivalent Privacy (WEP)
Application Proxy Firewall
Wireless Application Protocol (WAP)
Fiber-optic Cables
13. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
802.11b
High Level Data Link Control (HLDC)
Packet Switching
ARP (Address Resolution Protocol)
14. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
FDDI-2
Session Initiation Protocol (SIP)
Screened Sub-Net
Synchronous Optical Networks (SONETS)
15. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Screened Sub-Net
Distributed Environment Challenge
Circuit Switching
VoIP
16. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Coaxial Cables
FDDI-2
Point-To-Point Tunneling Protocol (PPTP)
ARP (Address Resolution Protocol)
17. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
VoIP
OSI Layer 4: Transport Layer
Serial Line Internet Protocol (SLIP)
Plenum-rated Cables
18. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Wide Area Network (WAN)
Frequency Hopping Spread Spectrum (FHSS)
Loki Attack
Private Branch Exchange (PBX)
19. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
OSI Layer 5: Session Layer
DOS attacks from flooding
ARP (Address Resolution Protocol)
Virtual Private Network (VPN)
20. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Mesh Topology
Commonly used in Internet.
Stateful Firewall
Token Ring (802.5)
21. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Source Routing
Point-To-Point (PPP)
Private Branch Exchange (PBX)
ThickNet - aka 10base5.
22. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
DOS attacks from flooding
Wired Equivalent Privacy (WEP)
Application Proxy vs. Circuit Level
Classless inter-domain routing (CIDR)
23. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
OSI Layer 7: Application
Extensible Authentication Protocol (EAP)
Fiber Distributed Data Interface (FDDI)
802.11i
24. Protocol for allowing multi-cast (one to many) communication
OSI Layer 1: Physical
Session Initiation Protocol (SIP)
10baseT
IGMP
25. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
Multilevel Switching
Definition of Protocol
Commonly used in FDDI.
26. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Router
OSI Layer 6: Presentation
Virtual Private Network (VPN)
Token Passing
27. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Multilevel Switching
TCP
DOS attacks from flooding
Digital Subscriber Line (DSL)
28. Standard that outlines wireless personal area network (WPAN) technologies.
Pulse Code Modulation (PCM)
Stateful Firewall
802.11i
802.15
29. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
VLAN
Network Address Translator (NAT)
Kernel Proxy Firewall
Dedicated Links
30. SMTP server that is configured for sending email from any source to and destination.
ThinNet - aka 10base2
Ethernet (802.3)
Open Relay
Plenum-rated Cables
31. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Plenum-rated Cables
Application Proxy vs. Circuit Level
Point-To-Point Tunneling Protocol (PPTP)
802.16
32. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Layer 2 Tunneling Protocol (L2TP)
Serial Line Internet Protocol (SLIP)
Challenge Handshake Authentication Protocol (CHAP)
Switch
33. Protocol that increases address size from 32 bits to 128 bits
Virtual Private Network (VPN)
IPv6
OSI Layer 6: Presentation
Port Numbers
34. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
T1
OSI Layer 3: Network Layer
ThickNet - aka 10base5.
Plenum-rated Cables
35. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Bastion Host
Password Authentication Protocol (PAP)
OSI Layer 1: Physical
Serial Line Internet Protocol (SLIP)
36. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Reverse Address Resolution Protocol (RARP )
Proxy Firewall
Kernel Proxy Firewall
Isochronous Communication Processes
37. Type of wireless security standard that uses AES in CBC mode.
Source Routing
Packet Filtering Firewall
CBC-MAC Protocol (CCMP)
Cable Modem
38. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Router
LLC (Logical Link Control - 802.2)
Bus Topology
IGMP
39. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Dynamic Packet Filtering
Extensible Authentication Protocol (EAP)
802.15
Stateful Firewall
40. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Attenuation
Committed Information Rate (CIR)
Isochronous Communication Processes
Dual-Homed Firewall
41. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Synchronous Data Link Control (SDLC)
Tree Topology
802.11a
Switch
42. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
CBC-MAC Protocol (CCMP)
Fiber-optic Cables
Blue Boxing
Shared Key Authentication (SKA)
43. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Service Set ID (SSID)
Synchronous Communication
X.25
OSI Layer 5: Session Layer
44. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Ethernet (802.3)
Frame Relay
Temporal Key Integrity Protocol (TKIP)
Pulse Code Modulation (PCM)
45. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Layers in the TCP/IP Model
OSI Layer 5: Session Layer
Source Routing
IPv6
46. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Iterated Association
Frame Relay
802.11i
Dedicated Links
47. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Kernel Proxy Firewall
10baseT
Digital Subscriber Line (DSL)
TCP
48. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
Network Address Translator (NAT)
SOCKS Firewall
Frequency Hopping Spread Spectrum (FHSS)
High Level Data Link Control (HLDC)
49. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Screened Sub-Net
Trunk Lines
TCP
Integrated Services Digital Network (ISDN)
50. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Application Proxy Firewall
UDP
Bluejacking
Commonly used in Ethernet.