SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Direct Sequence Spread Spectrum (DSSS)
Frame Relay
Star Topology
Network Address Translator (NAT)
2. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Port Numbers
Remote Access Servers
Fiber Distributed Data Interface (FDDI)
Reverse Address Resolution Protocol (RARP )
3. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Spread Spectrum
Serial Line Internet Protocol (SLIP)
Distributed Environment Challenge
Bridge
4. Problems: Central device is a single point of failure.
Crosstalk
Star Topology
Repeaters
802.11i
5. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Noise
Remote Access Servers
Coaxial Cables
CBC-MAC Protocol (CCMP)
6. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
OSI Layer 1: Physical
Proxy Firewall Strengths
Source Routing
Noise
7. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Synchronous Optical Networks (SONETS)
Bridge
Integrated Services Digital Network (ISDN)
Cable Modem
8. Both directions - only one application can send information at a time
Circuit Switching
Coaxial Cables
Point-To-Point Tunneling Protocol (PPTP)
Half-Duplex
9. Protocol that translates IP address into a MAC address (physical Ethernet address)
Shared Key Authentication (SKA)
Classless inter-domain routing (CIDR)
Multi-protocol Label Switching
ARP (Address Resolution Protocol)
10. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Source Routing
Multilevel Switching
Dedicated Links
Twisted Pair Cables
11. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
ARP (Address Resolution Protocol)
Commonly used in Ethernet.
OSI Layer 2: Data Link Layer
Layers in the TCP/IP Model
12. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
802.11b
Direct Sequence Spread Spectrum (DSSS)
OSI Layer 6: Presentation
CBC-MAC Protocol (CCMP)
13. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Ethernet (802.3)
ThinNet - aka 10base2
10baseT
Subnetting
14. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Coaxial Cables
Pulse Code Modulation (PCM)
Open System Authentication (OSA)
802.16
15. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Channel Service Unit/Data Service Unit (CSU/DSU)
Extensible Authentication Protocol (EAP)
Source Routing
Plenum-rated Cables
16. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Proxy Firewall
FDDI-2
802.11i
ARP (Address Resolution Protocol)
17. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Spam over Internet Telephony (SPIT)
Shared Key Authentication (SKA)
Attenuation
Network Address Translator (NAT)
18. Network segment name for a DMZ created by two physical firewalls.
X.25
OSI Layer 1: Physical
Dual-Homed Firewall
Screened Sub-Net
19. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
DOS attacks from flooding
Switch
ThinNet - aka 10base2
Open Relay
20. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Ring Topology
Router
DOS attacks from flooding
Proxy Firewall
21. Spam over IM
Repeaters
SPIM
Coaxial Cables
DOS attacks from flooding
22. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Dual-Homed Firewall
802.11
Bluejacking
Password Authentication Protocol (PAP)
23. Type of wireless security standard that uses AES in CBC mode.
CBC-MAC Protocol (CCMP)
Private Branch Exchange (PBX)
Metropolitan Area Network (MAN)
Definition of Protocol
24. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Digital Subscriber Line (DSL)
Packet Switching
Session Initiation Protocol (SIP)
Spread Spectrum
25. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Virtual Private Network (VPN)
Port Numbers
Blue Boxing
Spam over Internet Telephony (SPIT)
26. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Digital Subscriber Line (DSL)
SOCKS Firewall
X.25
Commonly used in Internet.
27. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Metropolitan Area Network (MAN)
Challenge Handshake Authentication Protocol (CHAP)
802.11
Crosstalk
28. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in logical bus - Ethernet - token ring.
Screened Host Firewall
Switch
Wireless Application Protocol (WAP)
29. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
OSI Layer 2: Data Link Layer
IPSec
FDDI-2
Classless inter-domain routing (CIDR)
30. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Layers in the OSI Model
T3
Wired Equivalent Privacy (WEP)
Stateful Firewall
31. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
VoIP
Service Set ID (SSID)
High Level Data Link Control (HLDC)
SOCKS Firewall
32. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
ICMP (Internet Control Message Protocol)
Point-To-Point (PPP)
802.11b
Circuit Level Proxy Firewall
33. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Password Authentication Protocol (PAP)
Extensible Authentication Protocol (EAP)
Reverse Address Resolution Protocol (RARP )
Serial Line Internet Protocol (SLIP)
34. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Stateful Firewall
Serial Line Internet Protocol (SLIP)
Digital Subscriber Line (DSL)
ARP (Address Resolution Protocol)
35. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Application Proxy Firewall
Repeaters
Frame Relay
802.15
36. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Carrier sense multiple access with collision detection (CSMA/CD)
Virtual Private Network (VPN)
Synchronous Data Link Control (SDLC)
VoIP
37. New variant to traditional email spam on VoIP networks.
Spam over Internet Telephony (SPIT)
802.15
Packet Filtering Firewall
Classless inter-domain routing (CIDR)
38. Standard that outlines wireless personal area network (WPAN) technologies.
Asynchronous Communication
802.15
Synchronous Optical Networks (SONETS)
Twisted Pair Cables
39. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Classless inter-domain routing (CIDR)
Switch
ICMP (Internet Control Message Protocol)
Wireless Application Protocol (WAP)
40. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Permanent Virtual Circuit (PVC)
Point-To-Point (PPP)
Simplex: One direction.
Blue Boxing
41. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Asynchronous Communication
Circuit Switching
Digital Subscriber Line (DSL)
Distributed Environment Challenge
42. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Synchronous Data Link Control (SDLC)
Network Address Translator (NAT)
CBC-MAC Protocol (CCMP)
OSI Layer 4: Transport Layer
43. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Network Address Translator (NAT)
Switched Virtual Circuit (SVC)
Circuit Level Proxy Firewall
CBC-MAC Protocol (CCMP)
44. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Committed Information Rate (CIR)
Service Set ID (SSID)
Layer 2 Tunneling Protocol (L2TP)
Trunk Lines
45. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
IGMP
Carrier sense multiple access with collision detection (CSMA/CD)
Permanent Virtual Circuit (PVC)
Bastion Host
46. Both directions - both applications can send information at a time. Session Layer Communication Modes
Switched Virtual Circuit (SVC)
Full-Duplex
Trunk Lines
ARP Poisoning
47. Type of network layout that separates and group computers logically.
VLAN
802.16
Proxy Firewall
Synchronous Communication
48. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Committed Information Rate (CIR)
Wireless Application Protocol (WAP)
Token Ring (802.5)
ARP (Address Resolution Protocol)
49. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
T3
Circuit Switching
Kernel Proxy Firewall
Extensible Authentication Protocol (EAP)
50. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Kernel Proxy Firewall
Temporal Key Integrity Protocol (TKIP)
Iterated Association
UDP