SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
Commonly used in logical bus - Ethernet - token ring.
ThickNet - aka 10base5.
VLAN
2. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Extensible Authentication Protocol (EAP)
Commonly used in FDDI.
ARP (Address Resolution Protocol)
Attenuation
3. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
10baseT
Bus Topology
Fiber-optic Cables
Packet Filtering Firewall
4. New variant to traditional email spam on VoIP networks.
T1
Kernel Proxy Firewall
Star Topology
Spam over Internet Telephony (SPIT)
5. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Isochronous Communication Processes
Simplex: One direction.
Bluejacking
Tree Topology
6. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Carrier sense multiple access with collision detection (CSMA/CD)
VoIP
Screened Host Firewall
Commonly used in FDDI.
7. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
CBC-MAC Protocol (CCMP)
Circuit Level Proxy Firewall
Dynamic Packet Filtering
Virtual Private Network (VPN)
8. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Trunk Lines
Wired Equivalent Privacy (WEP)
ThinNet - aka 10base2
Switched Virtual Circuit (SVC)
9. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
10baseT
Proxy Firewall Strengths
Bus Topology
High Level Data Link Control (HLDC)
10. Wireless standard that will improve security of wireless communication
Application Proxy Firewall
T3
Digital Subscriber Line (DSL)
802.11i
11. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Twisted Pair Cables
Frame Relay
IPSec
Temporal Key Integrity Protocol (TKIP)
12. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
ICMP (Internet Control Message Protocol)
Application Proxy Firewall
Distributed Environment Challenge
Direct Sequence Spread Spectrum (DSSS)
13. Both directions - both applications can send information at a time. Session Layer Communication Modes
Service Set ID (SSID)
Switch
Noise
Full-Duplex
14. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Distributed Environment Challenge
Metropolitan Area Network (MAN)
Multi-protocol Label Switching
Switch
15. Identifys a WLAN. Can be used to segment environments into different WLANS.
Bridge
ARP (Address Resolution Protocol)
802.11a
Service Set ID (SSID)
16. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Mesh Topology
Carrier sense multiple access with collision detection (CSMA/CD)
TCP
Proxy Firewall Strengths
17. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
OSI Layer 6: Presentation
Switched Virtual Circuit (SVC)
DNS (Domain Name System)
Kernel Proxy Firewall
18. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
X.25
CBC-MAC Protocol (CCMP)
Metropolitan Area Network (MAN)
Proxy Firewall
19. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Synchronous Optical Networks (SONETS)
Permanent Virtual Circuit (PVC)
Crosstalk
Router
20. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
802.16
OSI Layer 3: Network Layer
Packet Filtering Firewall
Half-Duplex
21. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
IPSec
Tree Topology
Circuit Switching
DNS (Domain Name System)
22. Network segment name for a DMZ created by two physical firewalls.
Screened Sub-Net
Commonly used in FDDI.
FDDI-2
Point-To-Point (PPP)
23. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Switch
T1
Bus Topology
Screened Host Firewall
24. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
ICMP (Internet Control Message Protocol)
Synchronous Optical Networks (SONETS)
OSI Layer 1: Physical
IGMP
25. Type of cabling problem signals from one wire crossing over to another wire.
Frame Relay
Router
Crosstalk
Commonly used in Ethernet.
26. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
ARP (Address Resolution Protocol)
Asynchronous Communication
OSI Layer 4: Transport Layer
Commonly used in FDDI.
27. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Attenuation
Mesh Topology
Kernel Proxy Firewall
Pulse Code Modulation (PCM)
28. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
OSI Data encapsulation
Switch
Switched Virtual Circuit (SVC)
Bridge
29. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Point-To-Point (PPP)
OSI Layer 1: Physical
Twisted Pair Cables
Reverse Address Resolution Protocol (RARP )
30. Malware attack that sends commands inside of an ICMP packet.
Loki Attack
Commonly used in Ethernet.
Full-Duplex
Committed Information Rate (CIR)
31. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Point-To-Point (PPP)
Packet Filtering Firewall
Layers in the OSI Model
Layers in the TCP/IP Model
32. Protocol that translates IP address into a MAC address (physical Ethernet address)
802.11b
Frame Relay
SOCKS Firewall
ARP (Address Resolution Protocol)
33. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Direct Sequence Spread Spectrum (DSSS)
Open Relay
Wired Equivalent Privacy (WEP)
Metropolitan Area Network (MAN)
34. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Open System Authentication (OSA)
Distributed Environment Challenge
Circuit Level Proxy Firewall
Kernel Proxy Firewall
35. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Commonly used in logical bus - Ethernet - token ring.
802.11a
Ring Topology
Definition of Protocol
36. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Open Relay
Isochronous Communication Processes
Remote Access Servers
Repeaters
37. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Circuit Level Proxy Firewall
Packet Switching
Attenuation
Multi-protocol Label Switching
38. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Wide Area Network (WAN)
Packet Filtering Firewall
Extensible Authentication Protocol (EAP)
Reverse Address Resolution Protocol (RARP )
39. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Packet Filtering Firewall
OSI Layer 7: Application
Star Topology
Subnetting
40. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Digital Subscriber Line (DSL)
DNS (Domain Name System)
VoIP
Distributed Environment Challenge
41. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
DOS attacks from flooding
Frame Relay
Commonly used in logical bus - Ethernet - token ring.
Star Topology
42. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Metropolitan Area Network (MAN)
Multilevel Switching
Blue Boxing
Bastion Host
43. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Private Branch Exchange (PBX)
Session Initiation Protocol (SIP)
Plenum-rated Cables
Challenge Handshake Authentication Protocol (CHAP)
44. Protocol that translates a MAC address into an IP address.
Ring Topology
Open System Authentication (OSA)
Carrier sense multiple access with collision detection (CSMA/CD)
Reverse Address Resolution Protocol (RARP )
45. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Virtual Private Network (VPN)
Layers in the OSI Model
Proxy Firewall
Shared Key Authentication (SKA)
46. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Multistation Access Unit (MAU)
Simplex: One direction.
VoIP
Commonly used in Internet.
47. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Serial Line Internet Protocol (SLIP)
Token Ring (802.5)
Frame Relay
Plenum-rated Cables
48. Wireless communication that distributes individual signals across the allocated frequencies.
Extensible Authentication Protocol (EAP)
Spread Spectrum
Source Routing
Proxy Firewall Strengths
49. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
VLAN
Fiber Distributed Data Interface (FDDI)
Frame Relay
Packet Filtering Firewall
50. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Switched Virtual Circuit (SVC)
Bus Topology
Frame Relay
Token Ring (802.5)