SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Point-To-Point Tunneling Protocol (PPTP)
Half-Duplex
Wide Area Network (WAN)
Direct Sequence Spread Spectrum (DSSS)
2. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Serial Line Internet Protocol (SLIP)
Layers in the OSI Model
Bastion Host
OSI Layer 2: Data Link Layer
3. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Service Set ID (SSID)
Bridge
OSI Layer 1: Physical
Wireless Application Protocol (WAP)
4. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
10baseT
802.11b
Isochronous Communication Processes
5. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Remote Access Servers
Dedicated Links
OSI Layer 6: Presentation
Repeaters
6. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Direct Sequence Spread Spectrum (DSSS)
Simplex: One direction.
LLC (Logical Link Control - 802.2)
TCP
7. Wireless communication that distributes individual signals across the allocated frequencies.
Application Proxy vs. Circuit Level
Spread Spectrum
Temporal Key Integrity Protocol (TKIP)
Commonly used in Ethernet.
8. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Simplex: One direction.
Point-To-Point (PPP)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Digital Subscriber Line (DSL)
9. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
UDP
Ethernet (802.3)
OSI Layer 7: Application
Dedicated Links
10. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Repeaters
ICMP (Internet Control Message Protocol)
802.11
Synchronous Data Link Control (SDLC)
11. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
T3
Private Branch Exchange (PBX)
Metropolitan Area Network (MAN)
UDP
12. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Tree Topology
Packet Filtering Firewall
Serial Line Internet Protocol (SLIP)
Router
13. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Spam over Internet Telephony (SPIT)
IPSec
IGMP
Ethernet (802.3)
14. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Direct Sequence Spread Spectrum (DSSS)
OSI Layer 6: Presentation
X.25
Metropolitan Area Network (MAN)
15. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Proxy Firewall
Iterated Association
Token Ring (802.5)
Commonly used in FDDI.
16. Malware attack that sends commands inside of an ICMP packet.
Token Passing
Packet Filtering Firewall
Loki Attack
Noise
17. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Simplex: One direction.
VoIP
Distributed Environment Challenge
ICMP (Internet Control Message Protocol)
18. Type of firewall that lies between the perimeter router and and LAN.
Shared Key Authentication (SKA)
Spam over Internet Telephony (SPIT)
Token Ring (802.5)
Screened Host Firewall
19. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Shared Key Authentication (SKA)
Asynchronous Communication
IPSec
Router
20. Protocol that increases address size from 32 bits to 128 bits
DNS (Domain Name System)
IPv6
Layer 2 Tunneling Protocol (L2TP)
Blue Boxing
21. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Virtual Private Network (VPN)
Open System Authentication (OSA)
Frame Relay
OSI Layer 6: Presentation
22. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Blue Boxing
Frame Relay
Port Numbers
Direct Sequence Spread Spectrum (DSSS)
23. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Attenuation
Layer 2 Tunneling Protocol (L2TP)
OSI Layer 3: Network Layer
Coaxial Cables
24. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
802.11b
Dual-Homed Firewall
Asynchronous Communication
Application Proxy vs. Circuit Level
25. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Classless inter-domain routing (CIDR)
Noise
Trunk Lines
Password Authentication Protocol (PAP)
26. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
IPSec
OSI Layer 1: Physical
Bastion Host
SPIM
27. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Proxy Firewall Strengths
Twisted Pair Cables
Multi-protocol Label Switching
Layers in the OSI Model
28. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ThickNet - aka 10base5.
ThinNet - aka 10base2
Asynchronous Transfer Mode (ATM)
Frame Relay
29. SMTP server that is configured for sending email from any source to and destination.
Classless inter-domain routing (CIDR)
Circuit Level Proxy Firewall
Bus Topology
Open Relay
30. Both directions - only one application can send information at a time
ThinNet - aka 10base2
Repeaters
Password Authentication Protocol (PAP)
Half-Duplex
31. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Frequency Hopping Spread Spectrum (FHSS)
Twisted Pair Cables
802.15
Tree Topology
32. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Virtual Private Network (VPN)
Distributed Environment Challenge
Committed Information Rate (CIR)
Layers in the OSI Model
33. Set of rules that dictates how computer communicate over networks.
Serial Line Internet Protocol (SLIP)
Definition of Protocol
Committed Information Rate (CIR)
Reverse Address Resolution Protocol (RARP )
34. Identifys a WLAN. Can be used to segment environments into different WLANS.
DNS (Domain Name System)
Full-Duplex
Ring Topology
Service Set ID (SSID)
35. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Fiber-optic Cables
Plenum-rated Cables
Token Ring (802.5)
Trunk Lines
36. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
T3
Dedicated Links
Bridge
Frame Relay
37. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Packet Filtering Firewall
Open Relay
Mesh Topology
OSI Layer 4: Transport Layer
38. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Session Initiation Protocol (SIP)
Source Routing
Synchronous Optical Networks (SONETS)
Stateful Firewall
39. New variant to traditional email spam on VoIP networks.
Asynchronous Communication
Spam over Internet Telephony (SPIT)
Circuit Level Proxy Firewall
OSI Layer 6: Presentation
40. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Synchronous Optical Networks (SONETS)
Half-Duplex
Plenum-rated Cables
OSI Layer 5: Session Layer
41. Protocol for allowing multi-cast (one to many) communication
Wired Equivalent Privacy (WEP)
802.11b
IGMP
Open Relay
42. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Bastion Host
Ring Topology
Router
FDDI-2
43. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Repeaters
Multistation Access Unit (MAU)
Wireless Application Protocol (WAP)
Packet Filtering Firewall
44. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Token Ring (802.5)
Network Address Translator (NAT)
Multilevel Switching
Isochronous Communication Processes
45. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
OSI Layer 1: Physical
Wide Area Network (WAN)
Asynchronous Transfer Mode (ATM)
802.11
46. Protocol that translates a MAC address into an IP address.
Reverse Address Resolution Protocol (RARP )
Network Address Translator (NAT)
Tree Topology
Twisted Pair Cables
47. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in logical bus - Ethernet - token ring.
IPv6
Private Branch Exchange (PBX)
Dedicated Links
48. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
Temporal Key Integrity Protocol (TKIP)
Twisted Pair Cables
Direct Sequence Spread Spectrum (DSSS)
49. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Commonly used in Internet.
Proxy Firewall Strengths
Circuit Switching
Asynchronous Communication
50. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Switch
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
802.11a
Mesh Topology