SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
Iterated Association
Metropolitan Area Network (MAN)
ThickNet - aka 10base5.
2. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Attenuation
Port Numbers
Mesh Topology
Bastion Host
3. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Crosstalk
Layers in the OSI Model
Dedicated Links
802.16
4. Communication devices that determine synchronization scheme before data transmission.
Open System Authentication (OSA)
Circuit Switching
Synchronous Communication
Spread Spectrum
5. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Session Initiation Protocol (SIP)
Bastion Host
Carrier sense multiple access with collision detection (CSMA/CD)
ThickNet - aka 10base5.
6. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
SPIM
Point-To-Point (PPP)
Asynchronous Communication
Password Authentication Protocol (PAP)
7. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
VLAN
Asynchronous Communication
Commonly used in logical bus - Ethernet - token ring.
Serial Line Internet Protocol (SLIP)
8. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Plenum-rated Cables
Extensible Authentication Protocol (EAP)
Crosstalk
ThickNet - aka 10base5.
9. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Wireless Application Protocol (WAP)
Bus Topology
Fiber-optic Cables
Point-To-Point Tunneling Protocol (PPTP)
10. Standard that outlines wireless personal area network (WPAN) technologies.
Frequency Hopping Spread Spectrum (FHSS)
Commonly used in logical bus - Ethernet - token ring.
802.15
Extensible Authentication Protocol (EAP)
11. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Definition of Protocol
802.16
Application Proxy vs. Circuit Level
CBC-MAC Protocol (CCMP)
12. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Stateful Firewall
Full-Duplex
802.11
Proxy Firewall Strengths
13. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Session Initiation Protocol (SIP)
OSI Layer 7: Application
Direct Sequence Spread Spectrum (DSSS)
Commonly used in Internet.
14. In the OSI layer 5 - these are the types of what?
802.11i
DNS (Domain Name System)
Simplex: One direction.
Full-Duplex
15. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
FDDI-2
Spam over Internet Telephony (SPIT)
OSI Layer 4: Transport Layer
LLC (Logical Link Control - 802.2)
16. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Asynchronous Transfer Mode (ATM)
DNS (Domain Name System)
Wired Equivalent Privacy (WEP)
Dynamic Packet Filtering
17. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
ARP (Address Resolution Protocol)
802.15
Bus Topology
Fiber Distributed Data Interface (FDDI)
18. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Integrated Services Digital Network (ISDN)
OSI Layer 3: Network Layer
IGMP
Packet Filtering Firewall
19. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Token Ring (802.5)
Reverse Address Resolution Protocol (RARP )
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Subnetting
20. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Permanent Virtual Circuit (PVC)
Proxy Firewall
Circuit Level Proxy Firewall
FDDI-2
21. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Pulse Code Modulation (PCM)
OSI Layer 6: Presentation
802.11b
UDP
22. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Spread Spectrum
Multi-protocol Label Switching
802.15
T1
23. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Token Passing
Router
Shared Key Authentication (SKA)
X.25
24. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Pulse Code Modulation (PCM)
Full-Duplex
High Level Data Link Control (HLDC)
Noise
25. New variant to traditional email spam on VoIP networks.
Virtual Private Network (VPN)
CBC-MAC Protocol (CCMP)
Channel Service Unit/Data Service Unit (CSU/DSU)
Spam over Internet Telephony (SPIT)
26. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Frequency Hopping Spread Spectrum (FHSS)
Challenge Handshake Authentication Protocol (CHAP)
Circuit Switching
Bluejacking
27. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
OSI Layer 5: Session Layer
Repeaters
Virtual Private Network (VPN)
Password Authentication Protocol (PAP)
28. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Network Address Translator (NAT)
Frame Relay
Challenge Handshake Authentication Protocol (CHAP)
Spread Spectrum
29. Type of topology where computers all are connected to each other - which provides redundancy.
Password Authentication Protocol (PAP)
Commonly used in Internet.
Wired Equivalent Privacy (WEP)
Ethernet (802.3)
30. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
High Level Data Link Control (HLDC)
Layers in the TCP/IP Model
Point-To-Point (PPP)
802.11
31. Type of network layout that is a large geographical region connecting more that one LAN.
Switched Virtual Circuit (SVC)
LLC (Logical Link Control - 802.2)
Wide Area Network (WAN)
Attenuation
32. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
ThickNet - aka 10base5.
Point-To-Point Tunneling Protocol (PPTP)
SOCKS Firewall
OSI Layer 2: Data Link Layer
33. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Bluejacking
Subnetting
Proxy Firewall
Simplex: One direction.
34. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Crosstalk
ARP Poisoning
Distributed Environment Challenge
Switched Virtual Circuit (SVC)
35. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Temporal Key Integrity Protocol (TKIP)
UDP
Private Branch Exchange (PBX)
Isochronous Communication Processes
36. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Wireless Application Protocol (WAP)
OSI Layer 4: Transport Layer
Application Proxy Firewall
Asynchronous Communication
37. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Layers in the OSI Model
Multistation Access Unit (MAU)
Multilevel Switching
Point-To-Point Tunneling Protocol (PPTP)
38. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Proxy Firewall
Commonly used in Ethernet.
Synchronous Data Link Control (SDLC)
Stateful Firewall
39. Spam over IM
Screened Host Firewall
SPIM
802.15
DOS attacks from flooding
40. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Star Topology
Repeaters
Frame Relay
Kernel Proxy Firewall
41. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Twisted Pair Cables
CBC-MAC Protocol (CCMP)
Dynamic Packet Filtering
DNS (Domain Name System)
42. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Password Authentication Protocol (PAP)
CBC-MAC Protocol (CCMP)
ARP Poisoning
Open System Authentication (OSA)
43. In a token ring network - each computer is connected to this - which acts as a central hub.
Circuit Switching
ThinNet - aka 10base2
Multistation Access Unit (MAU)
OSI Layer 2: Data Link Layer
44. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Carrier sense multiple access with collision detection (CSMA/CD)
Reverse Address Resolution Protocol (RARP )
OSI Layer 4: Transport Layer
802.11a
45. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Synchronous Data Link Control (SDLC)
Commonly used in Ethernet.
OSI Layer 2: Data Link Layer
Definition of Protocol
46. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Token Ring (802.5)
Frequency Hopping Spread Spectrum (FHSS)
IPv6
Crosstalk
47. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Attenuation
Commonly used in FDDI.
Screened Host Firewall
OSI Layer 5: Session Layer
48. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
LLC (Logical Link Control - 802.2)
802.15
Carrier sense multiple access with collision detection (CSMA/CD)
Serial Line Internet Protocol (SLIP)
49. Type of firewall that lies between the perimeter router and and LAN.
Layers in the OSI Model
ARP Poisoning
Screened Host Firewall
Multi-protocol Label Switching
50. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
Fiber-optic Cables
ThickNet - aka 10base5.
Digital Subscriber Line (DSL)