SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Challenge Handshake Authentication Protocol (CHAP)
ThinNet - aka 10base2
Frame Relay
Circuit Switching
2. Problems: Central device is a single point of failure.
Twisted Pair Cables
Trunk Lines
Star Topology
Bridge
3. In the OSI layer 5 - these are the types of what?
Dedicated Links
Mesh Topology
Virtual Private Network (VPN)
Simplex: One direction.
4. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Dedicated Links
Commonly used in Ethernet.
ARP Poisoning
Frequency Hopping Spread Spectrum (FHSS)
5. Both directions - both applications can send information at a time. Session Layer Communication Modes
Dynamic Packet Filtering
Layer 2 Tunneling Protocol (L2TP)
Full-Duplex
LLC (Logical Link Control - 802.2)
6. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
SOCKS Firewall
Frequency Hopping Spread Spectrum (FHSS)
Synchronous Optical Networks (SONETS)
Subnetting
7. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
OSI Layer 6: Presentation
Temporal Key Integrity Protocol (TKIP)
802.16
Kernel Proxy Firewall
8. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Spam over Internet Telephony (SPIT)
Metropolitan Area Network (MAN)
Synchronous Optical Networks (SONETS)
Integrated Services Digital Network (ISDN)
9. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
ARP (Address Resolution Protocol)
OSI Layer 2: Data Link Layer
Synchronous Data Link Control (SDLC)
High Level Data Link Control (HLDC)
10. Protocol that translates IP address into a MAC address (physical Ethernet address)
Integrated Services Digital Network (ISDN)
ARP (Address Resolution Protocol)
Ethernet (802.3)
OSI Layer 5: Session Layer
11. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
SOCKS Firewall
Point-To-Point (PPP)
Permanent Virtual Circuit (PVC)
Channel Service Unit/Data Service Unit (CSU/DSU)
12. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Iterated Association
10baseT
Bridge
Proxy Firewall
13. Network segment name for a DMZ created by two physical firewalls.
Packet Switching
Mesh Topology
T3
Screened Sub-Net
14. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
Screened Host Firewall
Layer 2 Tunneling Protocol (L2TP)
Bus Topology
15. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
VoIP
Metropolitan Area Network (MAN)
Screened Host Firewall
Repeaters
16. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Point-To-Point (PPP)
IPv6
Trunk Lines
Synchronous Optical Networks (SONETS)
17. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Commonly used in Internet.
Crosstalk
Temporal Key Integrity Protocol (TKIP)
DNS (Domain Name System)
18. Set of rules that dictates how computer communicate over networks.
CBC-MAC Protocol (CCMP)
Definition of Protocol
Token Passing
Ethernet (802.3)
19. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Mesh Topology
SOCKS Firewall
Bus Topology
OSI Layer 1: Physical
20. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Crosstalk
OSI Layer 2: Data Link Layer
Ring Topology
Ethernet (802.3)
21. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Tree Topology
Repeaters
Packet Switching
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
22. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Coaxial Cables
Switch
Star Topology
Fiber Distributed Data Interface (FDDI)
23. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
UDP
Application Proxy Firewall
Fiber-optic Cables
Open Relay
24. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Extensible Authentication Protocol (EAP)
Crosstalk
Serial Line Internet Protocol (SLIP)
Packet Filtering Firewall
25. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Dynamic Packet Filtering
Carrier sense multiple access with collision detection (CSMA/CD)
Plenum-rated Cables
Cable Modem
26. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Cable Modem
Distributed Environment Challenge
Isochronous Communication Processes
10baseT
27. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Layer 2 Tunneling Protocol (L2TP)
TCP
Synchronous Communication
IPSec
28. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Integrated Services Digital Network (ISDN)
DNS (Domain Name System)
OSI Data encapsulation
Switch
29. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Packet Filtering Firewall
Spread Spectrum
Extensible Authentication Protocol (EAP)
Virtual Private Network (VPN)
30. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Classless inter-domain routing (CIDR)
Application Proxy Firewall
High Level Data Link Control (HLDC)
OSI Data encapsulation
31. Protocol for allowing multi-cast (one to many) communication
IPv6
Application Proxy Firewall
UDP
IGMP
32. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Frequency Hopping Spread Spectrum (FHSS)
Circuit Level Proxy Firewall
Bridge
Port Numbers
33. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Stateful Firewall
OSI Layer 2: Data Link Layer
Circuit Level Proxy Firewall
34. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Coaxial Cables
Token Passing
Trunk Lines
ThinNet - aka 10base2
35. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Attenuation
Synchronous Optical Networks (SONETS)
802.11a
Noise
36. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Circuit Level Proxy Firewall
Loki Attack
Source Routing
Password Authentication Protocol (PAP)
37. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Integrated Services Digital Network (ISDN)
Switch
Synchronous Optical Networks (SONETS)
Proxy Firewall Strengths
38. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Trunk Lines
X.25
High Level Data Link Control (HLDC)
Proxy Firewall
39. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Direct Sequence Spread Spectrum (DSSS)
Packet Filtering Firewall
IPSec
Frame Relay
40. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
OSI Layer 3: Network Layer
Router
Open Relay
Loki Attack
41. Type of wireless security standard that uses AES in CBC mode.
CBC-MAC Protocol (CCMP)
Circuit Switching
Dedicated Links
Router
42. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Circuit Level Proxy Firewall
Commonly used in FDDI.
Fiber Distributed Data Interface (FDDI)
IGMP
43. Protocol that translates a MAC address into an IP address.
Blue Boxing
Reverse Address Resolution Protocol (RARP )
Synchronous Communication
X.25
44. In a token ring network - each computer is connected to this - which acts as a central hub.
Simplex: One direction.
Subnetting
Application Proxy Firewall
Multistation Access Unit (MAU)
45. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
TCP
Layers in the OSI Model
Proxy Firewall Strengths
Circuit Switching
46. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Fiber-optic Cables
Blue Boxing
LLC (Logical Link Control - 802.2)
Source Routing
47. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Direct Sequence Spread Spectrum (DSSS)
Noise
802.11
Dynamic Packet Filtering
48. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Switched Virtual Circuit (SVC)
Commonly used in Internet.
Port Numbers
Layers in the OSI Model
49. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Temporal Key Integrity Protocol (TKIP)
Open Relay
OSI Layer 2: Data Link Layer
Asynchronous Transfer Mode (ATM)
50. Type of topology where computers all are connected to each other - which provides redundancy.
Subnetting
Commonly used in Internet.
Switched Virtual Circuit (SVC)
Synchronous Optical Networks (SONETS)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests