SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol that increases address size from 32 bits to 128 bits
Subnetting
IPv6
802.11a
Fiber-optic Cables
2. Wireless standard that will improve security of wireless communication
Channel Service Unit/Data Service Unit (CSU/DSU)
OSI Layer 2: Data Link Layer
802.11i
Service Set ID (SSID)
3. In the OSI layer 5 - these are the types of what?
Password Authentication Protocol (PAP)
Simplex: One direction.
Bridge
LLC (Logical Link Control - 802.2)
4. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Crosstalk
Switched Virtual Circuit (SVC)
Twisted Pair Cables
Dedicated Links
5. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
High Level Data Link Control (HLDC)
Password Authentication Protocol (PAP)
Bus Topology
Tree Topology
6. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
IPv6
OSI Layer 6: Presentation
X.25
Virtual Private Network (VPN)
7. Communication devices that determine synchronization scheme before data transmission.
Dedicated Links
Challenge Handshake Authentication Protocol (CHAP)
Synchronous Communication
Subnetting
8. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Tree Topology
Commonly used in FDDI.
OSI Layer 5: Session Layer
Wireless Application Protocol (WAP)
9. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Asynchronous Transfer Mode (ATM)
SOCKS Firewall
LLC (Logical Link Control - 802.2)
Subnetting
10. SMTP server that is configured for sending email from any source to and destination.
Fiber-optic Cables
Classless inter-domain routing (CIDR)
Switched Virtual Circuit (SVC)
Open Relay
11. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Open System Authentication (OSA)
Frame Relay
Ring Topology
DNS (Domain Name System)
12. New variant to traditional email spam on VoIP networks.
Twisted Pair Cables
Spam over Internet Telephony (SPIT)
Temporal Key Integrity Protocol (TKIP)
Ethernet (802.3)
13. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Source Routing
DOS attacks from flooding
OSI Layer 7: Application
Kernel Proxy Firewall
14. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Integrated Services Digital Network (ISDN)
Screened Host Firewall
Blue Boxing
OSI Layer 4: Transport Layer
15. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
High Level Data Link Control (HLDC)
Wireless Application Protocol (WAP)
Digital Subscriber Line (DSL)
UDP
16. Problems: Central device is a single point of failure.
Committed Information Rate (CIR)
Layers in the TCP/IP Model
Star Topology
Token Ring (802.5)
17. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Subnetting
802.11i
VoIP
Token Ring (802.5)
18. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Proxy Firewall
Layers in the OSI Model
Bridge
Frequency Hopping Spread Spectrum (FHSS)
19. Type of cabling problem signals from one wire crossing over to another wire.
Noise
Crosstalk
Fiber-optic Cables
Router
20. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Commonly used in logical bus - Ethernet - token ring.
Synchronous Optical Networks (SONETS)
OSI Layer 1: Physical
Commonly used in Ethernet.
21. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
DNS (Domain Name System)
Extensible Authentication Protocol (EAP)
TCP
Remote Access Servers
22. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
Digital Subscriber Line (DSL)
Extensible Authentication Protocol (EAP)
802.11b
23. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
OSI Layer 4: Transport Layer
OSI Data encapsulation
Ring Topology
Private Branch Exchange (PBX)
24. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
FDDI-2
Distributed Environment Challenge
Open Relay
Bluejacking
25. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Classless inter-domain routing (CIDR)
802.11
Spam over Internet Telephony (SPIT)
Circuit Level Proxy Firewall
26. Type of network layout that separates and group computers logically.
VLAN
Subnetting
Stateful Firewall
Layers in the OSI Model
27. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Packet Switching
Fiber Distributed Data Interface (FDDI)
Isochronous Communication Processes
Challenge Handshake Authentication Protocol (CHAP)
28. Both directions - only one application can send information at a time
Token Ring (802.5)
Application Proxy vs. Circuit Level
Half-Duplex
OSI Layer 4: Transport Layer
29. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
802.11a
Coaxial Cables
Point-To-Point Tunneling Protocol (PPTP)
T1
30. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Coaxial Cables
Attenuation
Application Proxy vs. Circuit Level
ThickNet - aka 10base5.
31. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Frame Relay
Switched Virtual Circuit (SVC)
Multistation Access Unit (MAU)
Reverse Address Resolution Protocol (RARP )
32. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Synchronous Data Link Control (SDLC)
IPSec
UDP
Source Routing
33. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
VoIP
Session Initiation Protocol (SIP)
Commonly used in Ethernet.
Mesh Topology
34. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Crosstalk
Distributed Environment Challenge
ARP Poisoning
Switch
35. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
OSI Layer 4: Transport Layer
Open System Authentication (OSA)
Proxy Firewall
Circuit Level Proxy Firewall
36. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Tree Topology
Multilevel Switching
Metropolitan Area Network (MAN)
Frame Relay
37. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Coaxial Cables
Network Address Translator (NAT)
Ring Topology
Wireless Application Protocol (WAP)
38. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
LLC (Logical Link Control - 802.2)
Switch
FDDI-2
ThinNet - aka 10base2
39. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Token Ring (802.5)
OSI Layer 3: Network Layer
Virtual Private Network (VPN)
Ring Topology
40. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Subnetting
OSI Data encapsulation
Multilevel Switching
ARP Poisoning
41. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Classless inter-domain routing (CIDR)
Channel Service Unit/Data Service Unit (CSU/DSU)
Virtual Private Network (VPN)
Remote Access Servers
42. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Dual-Homed Firewall
Layer 2 Tunneling Protocol (L2TP)
Trunk Lines
802.16
43. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Network Address Translator (NAT)
802.11a
IPv6
Trunk Lines
44. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Screened Host Firewall
Attenuation
OSI Layer 3: Network Layer
High Level Data Link Control (HLDC)
45. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Bus Topology
Noise
Port Numbers
ICMP (Internet Control Message Protocol)
46. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
OSI Layer 4: Transport Layer
OSI Layer 6: Presentation
Open System Authentication (OSA)
802.11i
47. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
SOCKS Firewall
Frame Relay
802.11b
Simplex: One direction.
48. Standard that outlines wireless personal area network (WPAN) technologies.
Serial Line Internet Protocol (SLIP)
802.15
Bluejacking
Synchronous Data Link Control (SDLC)
49. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Frequency Hopping Spread Spectrum (FHSS)
Channel Service Unit/Data Service Unit (CSU/DSU)
OSI Data encapsulation
Layers in the TCP/IP Model
50. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Asynchronous Communication
Metropolitan Area Network (MAN)
Repeaters
OSI Layer 2: Data Link Layer