SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Fiber-optic Cables
Open Relay
802.11b
OSI Layer 1: Physical
2. Spam over IM
802.11a
OSI Data encapsulation
SPIM
Remote Access Servers
3. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Temporal Key Integrity Protocol (TKIP)
OSI Layer 2: Data Link Layer
Isochronous Communication Processes
Noise
4. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
X.25
Shared Key Authentication (SKA)
Ring Topology
Trunk Lines
5. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Proxy Firewall
ARP (Address Resolution Protocol)
Circuit Switching
Bastion Host
6. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Kernel Proxy Firewall
Channel Service Unit/Data Service Unit (CSU/DSU)
Mesh Topology
OSI Layer 4: Transport Layer
7. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
Ethernet (802.3)
Shared Key Authentication (SKA)
Dual-Homed Firewall
8. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
VLAN
Direct Sequence Spread Spectrum (DSSS)
Router
Switched Virtual Circuit (SVC)
9. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
10baseT
Port Numbers
OSI Layer 5: Session Layer
Frame Relay
10. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
OSI Layer 2: Data Link Layer
Extensible Authentication Protocol (EAP)
Bastion Host
Ethernet (802.3)
11. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Direct Sequence Spread Spectrum (DSSS)
Packet Filtering Firewall
ARP (Address Resolution Protocol)
Coaxial Cables
12. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Noise
Open System Authentication (OSA)
VoIP
Commonly used in Ethernet.
13. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Application Proxy vs. Circuit Level
802.11a
OSI Layer 1: Physical
SPIM
14. Malware attack that sends commands inside of an ICMP packet.
Remote Access Servers
Layers in the OSI Model
Loki Attack
OSI Layer 2: Data Link Layer
15. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Synchronous Communication
SPIM
Challenge Handshake Authentication Protocol (CHAP)
OSI Layer 1: Physical
16. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Digital Subscriber Line (DSL)
Commonly used in FDDI.
Frequency Hopping Spread Spectrum (FHSS)
VLAN
17. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Application Proxy vs. Circuit Level
Token Passing
Dedicated Links
IPSec
18. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
T3
Application Proxy Firewall
ARP Poisoning
Switch
19. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Integrated Services Digital Network (ISDN)
Open System Authentication (OSA)
802.16
Direct Sequence Spread Spectrum (DSSS)
20. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Application Proxy Firewall
Integrated Services Digital Network (ISDN)
DNS (Domain Name System)
Direct Sequence Spread Spectrum (DSSS)
21. Protocol for allowing multi-cast (one to many) communication
TCP
IGMP
Classless inter-domain routing (CIDR)
Pulse Code Modulation (PCM)
22. Type of firewall that lies between the perimeter router and and LAN.
Screened Host Firewall
Application Proxy Firewall
VLAN
Token Passing
23. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Fiber-optic Cables
Multi-protocol Label Switching
Bus Topology
Reverse Address Resolution Protocol (RARP )
24. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Blue Boxing
Carrier sense multiple access with collision detection (CSMA/CD)
VoIP
OSI Layer 7: Application
25. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Switch
Attenuation
Subnetting
IGMP
26. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
FDDI-2
Pulse Code Modulation (PCM)
Bridge
27. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Circuit Switching
Point-To-Point Tunneling Protocol (PPTP)
Simplex: One direction.
ICMP (Internet Control Message Protocol)
28. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Star Topology
Token Ring (802.5)
Application Proxy Firewall
Synchronous Optical Networks (SONETS)
29. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
SPIM
Asynchronous Communication
Twisted Pair Cables
Bus Topology
30. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
802.11b
Switch
Point-To-Point Tunneling Protocol (PPTP)
Open System Authentication (OSA)
31. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Synchronous Communication
OSI Data encapsulation
X.25
Permanent Virtual Circuit (PVC)
32. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Dual-Homed Firewall
Carrier sense multiple access with collision detection (CSMA/CD)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Kernel Proxy Firewall
33. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Session Initiation Protocol (SIP)
Port Numbers
Ethernet (802.3)
802.15
34. In a token ring network - each computer is connected to this - which acts as a central hub.
Subnetting
Multistation Access Unit (MAU)
Synchronous Communication
802.11a
35. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Token Ring (802.5)
Half-Duplex
Bridge
Ethernet (802.3)
36. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
CBC-MAC Protocol (CCMP)
Crosstalk
Dedicated Links
Frame Relay
37. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
IPSec
Attenuation
Classless inter-domain routing (CIDR)
VLAN
38. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
802.11
Half-Duplex
Layers in the TCP/IP Model
High Level Data Link Control (HLDC)
39. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
802.11
Committed Information Rate (CIR)
Point-To-Point Tunneling Protocol (PPTP)
40. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
802.11b
Router
Subnetting
Dual-Homed Firewall
41. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Subnetting
Screened Host Firewall
UDP
Password Authentication Protocol (PAP)
42. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
ARP Poisoning
VoIP
UDP
Ring Topology
43. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Dual-Homed Firewall
DNS (Domain Name System)
Permanent Virtual Circuit (PVC)
Virtual Private Network (VPN)
44. Type of topology where computers all are connected to each other - which provides redundancy.
T3
SOCKS Firewall
Cable Modem
Commonly used in Internet.
45. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Packet Filtering Firewall
Port Numbers
Subnetting
OSI Layer 3: Network Layer
46. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
ICMP (Internet Control Message Protocol)
802.11a
Router
Circuit Switching
47. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Subnetting
Blue Boxing
SOCKS Firewall
Channel Service Unit/Data Service Unit (CSU/DSU)
48. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
LLC (Logical Link Control - 802.2)
Repeaters
Session Initiation Protocol (SIP)
Application Proxy vs. Circuit Level
49. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in logical bus - Ethernet - token ring.
802.11i
Digital Subscriber Line (DSL)
Definition of Protocol
50. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Token Passing
Network Address Translator (NAT)
Application Proxy vs. Circuit Level
Carrier sense multiple access with collision detection (CSMA/CD)