SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Metropolitan Area Network (MAN)
Layer 2 Tunneling Protocol (L2TP)
Commonly used in Ethernet.
Commonly used in FDDI.
2. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Circuit Switching
Token Ring (802.5)
Distributed Environment Challenge
Carrier sense multiple access with collision detection (CSMA/CD)
3. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Shared Key Authentication (SKA)
Challenge Handshake Authentication Protocol (CHAP)
Application Proxy Firewall
Synchronous Data Link Control (SDLC)
4. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Open Relay
DNS (Domain Name System)
Repeaters
Wired Equivalent Privacy (WEP)
5. Standard that outlines wireless personal area network (WPAN) technologies.
DNS (Domain Name System)
802.15
Crosstalk
Repeaters
6. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Extensible Authentication Protocol (EAP)
Committed Information Rate (CIR)
Synchronous Optical Networks (SONETS)
Token Ring (802.5)
7. Set of rules that dictates how computer communicate over networks.
Blue Boxing
Multilevel Switching
Spread Spectrum
Definition of Protocol
8. SMTP server that is configured for sending email from any source to and destination.
Repeaters
Open Relay
Remote Access Servers
Frequency Hopping Spread Spectrum (FHSS)
9. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
ThickNet - aka 10base5.
Packet Filtering Firewall
Ethernet (802.3)
10. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Token Ring (802.5)
Dynamic Packet Filtering
802.11a
Repeaters
11. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Serial Line Internet Protocol (SLIP)
Direct Sequence Spread Spectrum (DSSS)
Screened Host Firewall
Half-Duplex
12. Wireless communication that distributes individual signals across the allocated frequencies.
Asynchronous Communication
TCP
Spread Spectrum
802.11a
13. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Commonly used in Ethernet.
Wireless Application Protocol (WAP)
Layers in the TCP/IP Model
Shared Key Authentication (SKA)
14. Type of network layout that is a large geographical region connecting more that one LAN.
Password Authentication Protocol (PAP)
VoIP
Wide Area Network (WAN)
OSI Layer 7: Application
15. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Frame Relay
Ethernet (802.3)
IPSec
Integrated Services Digital Network (ISDN)
16. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Star Topology
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
10baseT
Iterated Association
17. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
802.11i
Pulse Code Modulation (PCM)
ARP Poisoning
Switched Virtual Circuit (SVC)
18. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Dedicated Links
Digital Subscriber Line (DSL)
High Level Data Link Control (HLDC)
X.25
19. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
High Level Data Link Control (HLDC)
Half-Duplex
Application Proxy Firewall
T1
20. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
802.15
Cable Modem
Temporal Key Integrity Protocol (TKIP)
21. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Commonly used in Internet.
Token Passing
Tree Topology
Mesh Topology
22. Type of wireless security standard that uses AES in CBC mode.
CBC-MAC Protocol (CCMP)
Reverse Address Resolution Protocol (RARP )
Commonly used in Internet.
ARP (Address Resolution Protocol)
23. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Token Ring (802.5)
Asynchronous Communication
OSI Layer 2: Data Link Layer
Application Proxy Firewall
24. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Loki Attack
Serial Line Internet Protocol (SLIP)
Session Initiation Protocol (SIP)
Bus Topology
25. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
802.16
Spread Spectrum
Cable Modem
Fiber-optic Cables
26. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Channel Service Unit/Data Service Unit (CSU/DSU)
802.11
Dynamic Packet Filtering
Packet Switching
27. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Loki Attack
Noise
Commonly used in Ethernet.
Wired Equivalent Privacy (WEP)
28. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in logical bus - Ethernet - token ring.
Service Set ID (SSID)
Spread Spectrum
Multilevel Switching
29. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Temporal Key Integrity Protocol (TKIP)
10baseT
ThickNet - aka 10base5.
OSI Layer 3: Network Layer
30. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Channel Service Unit/Data Service Unit (CSU/DSU)
Challenge Handshake Authentication Protocol (CHAP)
Spam over Internet Telephony (SPIT)
Private Branch Exchange (PBX)
31. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
TCP
Point-To-Point Tunneling Protocol (PPTP)
X.25
Switched Virtual Circuit (SVC)
32. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Service Set ID (SSID)
Isochronous Communication Processes
Switch
Screened Host Firewall
33. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
OSI Layer 6: Presentation
Multi-protocol Label Switching
Wired Equivalent Privacy (WEP)
Layers in the OSI Model
34. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Ring Topology
802.15
Attenuation
Wired Equivalent Privacy (WEP)
35. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Application Proxy vs. Circuit Level
Integrated Services Digital Network (ISDN)
Virtual Private Network (VPN)
Token Passing
36. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
DOS attacks from flooding
Reverse Address Resolution Protocol (RARP )
CBC-MAC Protocol (CCMP)
Token Ring (802.5)
37. Type of cabling problem signals from one wire crossing over to another wire.
Crosstalk
Frequency Hopping Spread Spectrum (FHSS)
OSI Layer 2: Data Link Layer
Commonly used in Ethernet.
38. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ThinNet - aka 10base2
Noise
Layers in the TCP/IP Model
802.11i
39. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Iterated Association
Kernel Proxy Firewall
Half-Duplex
ICMP (Internet Control Message Protocol)
40. Communication devices that determine synchronization scheme before data transmission.
Dynamic Packet Filtering
OSI Layer 6: Presentation
Committed Information Rate (CIR)
Synchronous Communication
41. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Multi-protocol Label Switching
Token Passing
Shared Key Authentication (SKA)
Metropolitan Area Network (MAN)
42. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Blue Boxing
Subnetting
Frame Relay
Crosstalk
43. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Switch
Metropolitan Area Network (MAN)
Layers in the OSI Model
IPSec
44. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Isochronous Communication Processes
Fiber-optic Cables
Half-Duplex
LLC (Logical Link Control - 802.2)
45. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Spam over Internet Telephony (SPIT)
Dynamic Packet Filtering
Commonly used in Ethernet.
OSI Layer 1: Physical
46. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
OSI Layer 6: Presentation
Noise
OSI Layer 4: Transport Layer
Layers in the TCP/IP Model
47. In a token ring network - each computer is connected to this - which acts as a central hub.
Asynchronous Communication
Mesh Topology
Multistation Access Unit (MAU)
Reverse Address Resolution Protocol (RARP )
48. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Reverse Address Resolution Protocol (RARP )
Dedicated Links
Frequency Hopping Spread Spectrum (FHSS)
Carrier sense multiple access with collision detection (CSMA/CD)
49. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Asynchronous Communication
X.25
Carrier sense multiple access with collision detection (CSMA/CD)
Permanent Virtual Circuit (PVC)
50. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Proxy Firewall
Simplex: One direction.
Plenum-rated Cables
Frame Relay
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests