SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Plenum-rated Cables
Bridge
FDDI-2
OSI Data encapsulation
2. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Temporal Key Integrity Protocol (TKIP)
OSI Layer 1: Physical
Frame Relay
Crosstalk
3. Type of firewall that lies between the perimeter router and and LAN.
FDDI-2
Packet Filtering Firewall
Screened Host Firewall
802.11
4. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Multi-protocol Label Switching
T1
Token Passing
Distributed Environment Challenge
5. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Direct Sequence Spread Spectrum (DSSS)
Session Initiation Protocol (SIP)
OSI Layer 3: Network Layer
OSI Data encapsulation
6. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Pulse Code Modulation (PCM)
UDP
Frame Relay
Stateful Firewall
7. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Asynchronous Transfer Mode (ATM)
Crosstalk
Dedicated Links
OSI Layer 7: Application
8. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
Asynchronous Communication
OSI Layer 7: Application
Dynamic Packet Filtering
IPSec
9. Type of wireless security standard that uses AES in CBC mode.
CBC-MAC Protocol (CCMP)
Distributed Environment Challenge
Proxy Firewall
OSI Layer 4: Transport Layer
10. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Session Initiation Protocol (SIP)
X.25
Multi-protocol Label Switching
OSI Layer 2: Data Link Layer
11. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Token Passing
Application Proxy Firewall
802.11i
Session Initiation Protocol (SIP)
12. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Isochronous Communication Processes
Password Authentication Protocol (PAP)
OSI Layer 3: Network Layer
Switched Virtual Circuit (SVC)
13. Protocol that translates IP address into a MAC address (physical Ethernet address)
OSI Layer 6: Presentation
802.16
Spread Spectrum
ARP (Address Resolution Protocol)
14. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
OSI Layer 3: Network Layer
Temporal Key Integrity Protocol (TKIP)
Spam over Internet Telephony (SPIT)
TCP
15. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Channel Service Unit/Data Service Unit (CSU/DSU)
DOS attacks from flooding
Dedicated Links
Multilevel Switching
16. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Packet Filtering Firewall
Multilevel Switching
OSI Layer 6: Presentation
Commonly used in Internet.
17. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
OSI Layer 7: Application
Extensible Authentication Protocol (EAP)
OSI Data encapsulation
18. Protocol that increases address size from 32 bits to 128 bits
CBC-MAC Protocol (CCMP)
Network Address Translator (NAT)
Trunk Lines
IPv6
19. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Integrated Services Digital Network (ISDN)
Dual-Homed Firewall
Wired Equivalent Privacy (WEP)
UDP
20. This network technology determines which system will send data based on which one has the token.
Reverse Address Resolution Protocol (RARP )
Commonly used in logical bus - Ethernet - token ring.
Router
Token Passing
21. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Isochronous Communication Processes
Shared Key Authentication (SKA)
Carrier sense multiple access with collision detection (CSMA/CD)
Bridge
22. Type of cabling problem signals from one wire crossing over to another wire.
Circuit Level Proxy Firewall
Router
Crosstalk
Asynchronous Transfer Mode (ATM)
23. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Reverse Address Resolution Protocol (RARP )
Digital Subscriber Line (DSL)
Frame Relay
Wireless Application Protocol (WAP)
24. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Asynchronous Communication
Wired Equivalent Privacy (WEP)
Remote Access Servers
Multi-protocol Label Switching
25. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
802.16
Source Routing
Crosstalk
Commonly used in Ethernet.
26. Spam over IM
SPIM
Screened Host Firewall
VoIP
DOS attacks from flooding
27. Problems: Central device is a single point of failure.
Twisted Pair Cables
Synchronous Optical Networks (SONETS)
Digital Subscriber Line (DSL)
Star Topology
28. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Commonly used in Ethernet.
Token Ring (802.5)
Tree Topology
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
29. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Virtual Private Network (VPN)
Stateful Firewall
ICMP (Internet Control Message Protocol)
Integrated Services Digital Network (ISDN)
30. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Application Proxy vs. Circuit Level
Pulse Code Modulation (PCM)
Point-To-Point (PPP)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
31. Problems: Requires more expense in cabling and extra effort to track down cable faults.
IPv6
Mesh Topology
Frame Relay
Frequency Hopping Spread Spectrum (FHSS)
32. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Distributed Environment Challenge
VoIP
Spread Spectrum
Twisted Pair Cables
33. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
LLC (Logical Link Control - 802.2)
T3
Half-Duplex
Temporal Key Integrity Protocol (TKIP)
34. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Packet Switching
Synchronous Communication
T3
OSI Layer 7: Application
35. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Point-To-Point Tunneling Protocol (PPTP)
FDDI-2
Private Branch Exchange (PBX)
Crosstalk
36. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
LLC (Logical Link Control - 802.2)
Switched Virtual Circuit (SVC)
Extensible Authentication Protocol (EAP)
VLAN
37. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Remote Access Servers
Noise
Integrated Services Digital Network (ISDN)
Dual-Homed Firewall
38. Both directions - both applications can send information at a time. Session Layer Communication Modes
Switch
Plenum-rated Cables
Dedicated Links
Full-Duplex
39. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
T1
Bluejacking
Private Branch Exchange (PBX)
OSI Layer 5: Session Layer
40. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Channel Service Unit/Data Service Unit (CSU/DSU)
Spam over Internet Telephony (SPIT)
802.15
Fiber Distributed Data Interface (FDDI)
41. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Serial Line Internet Protocol (SLIP)
Isochronous Communication Processes
Synchronous Optical Networks (SONETS)
Frequency Hopping Spread Spectrum (FHSS)
42. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Ethernet (802.3)
Commonly used in Internet.
Port Numbers
ThickNet - aka 10base5.
43. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Ring Topology
Open System Authentication (OSA)
Digital Subscriber Line (DSL)
Iterated Association
44. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Bus Topology
Session Initiation Protocol (SIP)
802.11a
Permanent Virtual Circuit (PVC)
45. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
FDDI-2
Circuit Level Proxy Firewall
Proxy Firewall
Dual-Homed Firewall
46. SMTP server that is configured for sending email from any source to and destination.
LLC (Logical Link Control - 802.2)
Temporal Key Integrity Protocol (TKIP)
Wireless Application Protocol (WAP)
Open Relay
47. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
OSI Layer 7: Application
ARP Poisoning
VoIP
Commonly used in logical bus - Ethernet - token ring.
48. Both directions - only one application can send information at a time
Proxy Firewall
Packet Switching
Half-Duplex
Private Branch Exchange (PBX)
49. Standard that addresses wireless MAN technologies.
FDDI-2
Iterated Association
Commonly used in Ethernet.
802.16
50. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Layers in the OSI Model
Committed Information Rate (CIR)
Mesh Topology
Packet Switching