SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol that translates IP address into a MAC address (physical Ethernet address)
Layer 2 Tunneling Protocol (L2TP)
ARP (Address Resolution Protocol)
Packet Filtering Firewall
Noise
2. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Challenge Handshake Authentication Protocol (CHAP)
Port Numbers
Commonly used in FDDI.
Blue Boxing
3. This network technology determines which system will send data based on which one has the token.
SOCKS Firewall
Token Passing
Bridge
OSI Data encapsulation
4. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
ARP Poisoning
Stateful Firewall
Temporal Key Integrity Protocol (TKIP)
Commonly used in Internet.
5. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Private Branch Exchange (PBX)
OSI Layer 3: Network Layer
DNS (Domain Name System)
Integrated Services Digital Network (ISDN)
6. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
VoIP
Open Relay
Frame Relay
OSI Layer 7: Application
7. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
802.11
10baseT
Full-Duplex
Packet Filtering Firewall
8. Type of firewall that lies between the perimeter router and and LAN.
Session Initiation Protocol (SIP)
Kernel Proxy Firewall
Screened Host Firewall
DOS attacks from flooding
9. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Trunk Lines
ThickNet - aka 10base5.
Ring Topology
Stateful Firewall
10. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
Classless inter-domain routing (CIDR)
Cable Modem
OSI Layer 7: Application
Coaxial Cables
11. Protocol that increases address size from 32 bits to 128 bits
OSI Layer 3: Network Layer
Fiber-optic Cables
IPv6
Bus Topology
12. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
ICMP (Internet Control Message Protocol)
Star Topology
Circuit Level Proxy Firewall
13. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Multistation Access Unit (MAU)
Commonly used in logical bus - Ethernet - token ring.
Layers in the OSI Model
Circuit Level Proxy Firewall
14. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Star Topology
Token Passing
Spread Spectrum
Frequency Hopping Spread Spectrum (FHSS)
15. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
VLAN
Port Numbers
802.11b
OSI Data encapsulation
16. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
High Level Data Link Control (HLDC)
Commonly used in Internet.
T1
Serial Line Internet Protocol (SLIP)
17. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Bluejacking
Virtual Private Network (VPN)
Router
Tree Topology
18. Standard that outlines wireless personal area network (WPAN) technologies.
OSI Layer 5: Session Layer
Committed Information Rate (CIR)
802.15
Serial Line Internet Protocol (SLIP)
19. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Repeaters
Multilevel Switching
Open Relay
Session Initiation Protocol (SIP)
20. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
VoIP
Dynamic Packet Filtering
Point-To-Point Tunneling Protocol (PPTP)
Full-Duplex
21. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Definition of Protocol
IPSec
Router
OSI Layer 6: Presentation
22. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
DOS attacks from flooding
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Reverse Address Resolution Protocol (RARP )
Open System Authentication (OSA)
23. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Half-Duplex
Iterated Association
OSI Data encapsulation
Full-Duplex
24. SMTP server that is configured for sending email from any source to and destination.
Dedicated Links
DNS (Domain Name System)
Open Relay
Password Authentication Protocol (PAP)
25. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Attenuation
Committed Information Rate (CIR)
Repeaters
LLC (Logical Link Control - 802.2)
26. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Virtual Private Network (VPN)
Application Proxy Firewall
Commonly used in logical bus - Ethernet - token ring.
Token Ring (802.5)
27. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Distributed Environment Challenge
Commonly used in Ethernet.
Port Numbers
Dedicated Links
28. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Commonly used in Ethernet.
Fiber Distributed Data Interface (FDDI)
X.25
Port Numbers
29. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Pulse Code Modulation (PCM)
Token Ring (802.5)
Packet Filtering Firewall
Commonly used in Internet.
30. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Direct Sequence Spread Spectrum (DSSS)
Stateful Firewall
Proxy Firewall
Switched Virtual Circuit (SVC)
31. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Attenuation
Carrier sense multiple access with collision detection (CSMA/CD)
OSI Layer 1: Physical
OSI Layer 4: Transport Layer
32. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Coaxial Cables
Asynchronous Transfer Mode (ATM)
Screened Host Firewall
VoIP
33. Wireless standard that will improve security of wireless communication
Network Address Translator (NAT)
Layers in the TCP/IP Model
Reverse Address Resolution Protocol (RARP )
802.11i
34. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Direct Sequence Spread Spectrum (DSSS)
Stateful Firewall
Attenuation
Token Ring (802.5)
35. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Virtual Private Network (VPN)
Screened Sub-Net
OSI Layer 1: Physical
Synchronous Optical Networks (SONETS)
36. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Synchronous Communication
Wired Equivalent Privacy (WEP)
Metropolitan Area Network (MAN)
Source Routing
37. In the OSI layer 5 - these are the types of what?
Simplex: One direction.
Repeaters
Service Set ID (SSID)
Circuit Level Proxy Firewall
38. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Asynchronous Communication
Committed Information Rate (CIR)
Synchronous Optical Networks (SONETS)
Asynchronous Transfer Mode (ATM)
39. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Proxy Firewall Strengths
Classless inter-domain routing (CIDR)
Extensible Authentication Protocol (EAP)
TCP
40. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Channel Service Unit/Data Service Unit (CSU/DSU)
Spread Spectrum
Iterated Association
T1
41. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Cable Modem
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
TCP
Packet Switching
42. Problems: Central device is a single point of failure.
CBC-MAC Protocol (CCMP)
Twisted Pair Cables
Application Proxy Firewall
Star Topology
43. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
Service Set ID (SSID)
ARP Poisoning
UDP
Classless inter-domain routing (CIDR)
44. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Definition of Protocol
ThinNet - aka 10base2
Bluejacking
VLAN
45. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
OSI Layer 5: Session Layer
10baseT
Dynamic Packet Filtering
DOS attacks from flooding
46. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Bastion Host
Dual-Homed Firewall
Multi-protocol Label Switching
Packet Switching
47. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Session Initiation Protocol (SIP)
Synchronous Data Link Control (SDLC)
Integrated Services Digital Network (ISDN)
OSI Layer 5: Session Layer
48. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Extensible Authentication Protocol (EAP)
DOS attacks from flooding
Session Initiation Protocol (SIP)
Attenuation
49. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Twisted Pair Cables
Open System Authentication (OSA)
802.11
Bridge
50. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Asynchronous Transfer Mode (ATM)
Simplex: One direction.
Iterated Association
Wireless Application Protocol (WAP)