SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Digital Subscriber Line (DSL)
802.11b
Packet Filtering Firewall
Extensible Authentication Protocol (EAP)
2. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
Commonly used in FDDI.
UDP
Bluejacking
3. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Frequency Hopping Spread Spectrum (FHSS)
Token Passing
10baseT
Proxy Firewall Strengths
4. New variant to traditional email spam on VoIP networks.
Channel Service Unit/Data Service Unit (CSU/DSU)
Bus Topology
Circuit Level Proxy Firewall
Spam over Internet Telephony (SPIT)
5. Network segment name for a DMZ created by two physical firewalls.
Ring Topology
OSI Data encapsulation
LLC (Logical Link Control - 802.2)
Screened Sub-Net
6. Protocol for allowing multi-cast (one to many) communication
IGMP
Switch
Carrier sense multiple access with collision detection (CSMA/CD)
Distributed Environment Challenge
7. Set of rules that dictates how computer communicate over networks.
Definition of Protocol
Frame Relay
802.16
Isochronous Communication Processes
8. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Classless inter-domain routing (CIDR)
Full-Duplex
Password Authentication Protocol (PAP)
OSI Layer 4: Transport Layer
9. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Router
Permanent Virtual Circuit (PVC)
Application Proxy vs. Circuit Level
Open Relay
10. Problems: Central device is a single point of failure.
Screened Host Firewall
OSI Layer 7: Application
Star Topology
T1
11. Protocol that increases address size from 32 bits to 128 bits
IPSec
IPv6
10baseT
Port Numbers
12. In the OSI layer 5 - these are the types of what?
Spread Spectrum
Classless inter-domain routing (CIDR)
T3
Simplex: One direction.
13. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Dedicated Links
Twisted Pair Cables
10baseT
Commonly used in Ethernet.
14. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Serial Line Internet Protocol (SLIP)
802.11b
Session Initiation Protocol (SIP)
Stateful Firewall
15. Standard that addresses wireless MAN technologies.
Challenge Handshake Authentication Protocol (CHAP)
Virtual Private Network (VPN)
802.16
Open System Authentication (OSA)
16. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Circuit Level Proxy Firewall
Ethernet (802.3)
Reverse Address Resolution Protocol (RARP )
OSI Layer 6: Presentation
17. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
Committed Information Rate (CIR)
Dynamic Packet Filtering
Trunk Lines
18. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
802.11b
Source Routing
Circuit Switching
Reverse Address Resolution Protocol (RARP )
19. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in Ethernet.
Synchronous Data Link Control (SDLC)
Commonly used in logical bus - Ethernet - token ring.
Asynchronous Communication
20. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Frame Relay
Synchronous Optical Networks (SONETS)
Repeaters
Integrated Services Digital Network (ISDN)
21. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
802.16
Isochronous Communication Processes
Digital Subscriber Line (DSL)
Multi-protocol Label Switching
22. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Stateful Firewall
Isochronous Communication Processes
Dual-Homed Firewall
Serial Line Internet Protocol (SLIP)
23. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Noise
Proxy Firewall Strengths
Open System Authentication (OSA)
802.11a
24. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
OSI Layer 1: Physical
Bluejacking
Coaxial Cables
Blue Boxing
25. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
OSI Data encapsulation
Packet Filtering Firewall
Synchronous Data Link Control (SDLC)
Mesh Topology
26. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Session Initiation Protocol (SIP)
Spread Spectrum
Pulse Code Modulation (PCM)
Network Address Translator (NAT)
27. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
Integrated Services Digital Network (ISDN)
FDDI-2
Token Ring (802.5)
High Level Data Link Control (HLDC)
28. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Source Routing
Bluejacking
Plenum-rated Cables
Kernel Proxy Firewall
29. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Screened Host Firewall
Frequency Hopping Spread Spectrum (FHSS)
Mesh Topology
Integrated Services Digital Network (ISDN)
30. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Committed Information Rate (CIR)
Wired Equivalent Privacy (WEP)
Asynchronous Communication
VoIP
31. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Dual-Homed Firewall
Fiber Distributed Data Interface (FDDI)
Stateful Firewall
Packet Switching
32. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Half-Duplex
Frequency Hopping Spread Spectrum (FHSS)
DOS attacks from flooding
Source Routing
33. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Switch
Multilevel Switching
Asynchronous Communication
ARP Poisoning
34. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Coaxial Cables
DOS attacks from flooding
Frame Relay
Multilevel Switching
35. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Plenum-rated Cables
Spread Spectrum
Layers in the OSI Model
Extensible Authentication Protocol (EAP)
36. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Wired Equivalent Privacy (WEP)
Synchronous Data Link Control (SDLC)
OSI Layer 4: Transport Layer
Asynchronous Transfer Mode (ATM)
37. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Proxy Firewall
Bridge
Twisted Pair Cables
Synchronous Communication
38. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Asynchronous Transfer Mode (ATM)
ThickNet - aka 10base5.
Fiber-optic Cables
Layers in the OSI Model
39. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Half-Duplex
SOCKS Firewall
Packet Switching
Asynchronous Communication
40. Wireless standard that will improve security of wireless communication
802.11i
Serial Line Internet Protocol (SLIP)
Commonly used in logical bus - Ethernet - token ring.
Metropolitan Area Network (MAN)
41. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
CBC-MAC Protocol (CCMP)
Shared Key Authentication (SKA)
Virtual Private Network (VPN)
Full-Duplex
42. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
DNS (Domain Name System)
802.11a
Twisted Pair Cables
Attenuation
43. Type of wireless security standard that uses AES in CBC mode.
Point-To-Point (PPP)
Dual-Homed Firewall
Definition of Protocol
CBC-MAC Protocol (CCMP)
44. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Wired Equivalent Privacy (WEP)
IGMP
Definition of Protocol
Point-To-Point (PPP)
45. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Coaxial Cables
Commonly used in logical bus - Ethernet - token ring.
802.11i
Fiber Distributed Data Interface (FDDI)
46. Type of network layout that separates and group computers logically.
VLAN
Blue Boxing
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Wireless Application Protocol (WAP)
47. Protocol that translates a MAC address into an IP address.
Loki Attack
Commonly used in Ethernet.
OSI Layer 3: Network Layer
Reverse Address Resolution Protocol (RARP )
48. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Circuit Switching
Packet Filtering Firewall
Wide Area Network (WAN)
Application Proxy Firewall
49. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Plenum-rated Cables
802.11b
IPv6
Committed Information Rate (CIR)
50. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
10baseT
Ring Topology
Frame Relay
802.11