SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Session Initiation Protocol (SIP)
Application Proxy Firewall
Integrated Services Digital Network (ISDN)
Temporal Key Integrity Protocol (TKIP)
2. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Virtual Private Network (VPN)
802.15
Coaxial Cables
Channel Service Unit/Data Service Unit (CSU/DSU)
3. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Proxy Firewall
Multistation Access Unit (MAU)
TCP
802.11i
4. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Distributed Environment Challenge
Commonly used in Ethernet.
OSI Layer 4: Transport Layer
Bastion Host
5. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
High Level Data Link Control (HLDC)
Open System Authentication (OSA)
Virtual Private Network (VPN)
DNS (Domain Name System)
6. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
OSI Layer 5: Session Layer
Mesh Topology
FDDI-2
Coaxial Cables
7. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Dedicated Links
Point-To-Point Tunneling Protocol (PPTP)
ThickNet - aka 10base5.
Shared Key Authentication (SKA)
8. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Frequency Hopping Spread Spectrum (FHSS)
Synchronous Optical Networks (SONETS)
OSI Data encapsulation
Fiber Distributed Data Interface (FDDI)
9. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Definition of Protocol
OSI Layer 5: Session Layer
Plenum-rated Cables
OSI Layer 6: Presentation
10. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
FDDI-2
ThickNet - aka 10base5.
802.16
Remote Access Servers
11. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
ThinNet - aka 10base2
Bastion Host
Full-Duplex
12. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
OSI Layer 2: Data Link Layer
Classless inter-domain routing (CIDR)
Packet Switching
OSI Data encapsulation
13. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Password Authentication Protocol (PAP)
Asynchronous Communication
Reverse Address Resolution Protocol (RARP )
VLAN
14. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
T3
ARP (Address Resolution Protocol)
T1
OSI Layer 4: Transport Layer
15. Type of wireless security standard that uses AES in CBC mode.
Proxy Firewall
CBC-MAC Protocol (CCMP)
Blue Boxing
FDDI-2
16. Type of network layout that separates and group computers logically.
Fiber-optic Cables
VLAN
Multistation Access Unit (MAU)
Point-To-Point (PPP)
17. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Twisted Pair Cables
802.11b
Bastion Host
TCP
18. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
CBC-MAC Protocol (CCMP)
Point-To-Point (PPP)
802.16
Packet Filtering Firewall
19. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Dedicated Links
Spread Spectrum
Channel Service Unit/Data Service Unit (CSU/DSU)
Layer 2 Tunneling Protocol (L2TP)
20. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Classless inter-domain routing (CIDR)
Extensible Authentication Protocol (EAP)
Fiber-optic Cables
Loki Attack
21. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Token Passing
OSI Layer 2: Data Link Layer
OSI Layer 3: Network Layer
ARP (Address Resolution Protocol)
22. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Extensible Authentication Protocol (EAP)
Switch
Simplex: One direction.
Layer 2 Tunneling Protocol (L2TP)
23. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Ring Topology
Application Proxy vs. Circuit Level
Committed Information Rate (CIR)
Cable Modem
24. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Source Routing
Spread Spectrum
TCP
Asynchronous Transfer Mode (ATM)
25. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
802.11
Challenge Handshake Authentication Protocol (CHAP)
Shared Key Authentication (SKA)
Spam over Internet Telephony (SPIT)
26. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
OSI Layer 2: Data Link Layer
Point-To-Point Tunneling Protocol (PPTP)
Simplex: One direction.
Layer 2 Tunneling Protocol (L2TP)
27. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
802.16
Distributed Environment Challenge
UDP
DOS attacks from flooding
28. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Temporal Key Integrity Protocol (TKIP)
Screened Host Firewall
Ethernet (802.3)
Packet Switching
29. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Open Relay
DOS attacks from flooding
ThinNet - aka 10base2
Router
30. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Application Proxy vs. Circuit Level
Committed Information Rate (CIR)
802.11a
T3
31. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Screened Sub-Net
Port Numbers
Integrated Services Digital Network (ISDN)
Carrier sense multiple access with collision detection (CSMA/CD)
32. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
VLAN
Token Ring (802.5)
Synchronous Optical Networks (SONETS)
Metropolitan Area Network (MAN)
33. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Password Authentication Protocol (PAP)
Integrated Services Digital Network (ISDN)
10baseT
Private Branch Exchange (PBX)
34. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Temporal Key Integrity Protocol (TKIP)
Application Proxy Firewall
TCP
IPv6
35. Standard that addresses wireless MAN technologies.
802.16
Subnetting
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Trunk Lines
36. SMTP server that is configured for sending email from any source to and destination.
ThinNet - aka 10base2
Frame Relay
Open Relay
Coaxial Cables
37. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Committed Information Rate (CIR)
LLC (Logical Link Control - 802.2)
Point-To-Point Tunneling Protocol (PPTP)
Permanent Virtual Circuit (PVC)
38. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Fiber Distributed Data Interface (FDDI)
VLAN
Switch
Tree Topology
39. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Synchronous Data Link Control (SDLC)
Blue Boxing
Pulse Code Modulation (PCM)
Frame Relay
40. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
OSI Data encapsulation
CBC-MAC Protocol (CCMP)
Committed Information Rate (CIR)
Layers in the TCP/IP Model
41. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Application Proxy Firewall
IPSec
T3
Blue Boxing
42. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Layers in the OSI Model
VoIP
Bluejacking
Synchronous Data Link Control (SDLC)
43. Type of cabling problem signals from one wire crossing over to another wire.
Point-To-Point Tunneling Protocol (PPTP)
Packet Filtering Firewall
CBC-MAC Protocol (CCMP)
Crosstalk
44. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
DOS attacks from flooding
Permanent Virtual Circuit (PVC)
802.16
Proxy Firewall Strengths
45. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
DOS attacks from flooding
Mesh Topology
CBC-MAC Protocol (CCMP)
Commonly used in Ethernet.
46. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
802.11a
LLC (Logical Link Control - 802.2)
SOCKS Firewall
ARP Poisoning
47. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
DNS (Domain Name System)
Bluejacking
OSI Layer 2: Data Link Layer
Metropolitan Area Network (MAN)
48. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Ethernet (802.3)
ThickNet - aka 10base5.
Stateful Firewall
IGMP
49. Standard that outlines wireless personal area network (WPAN) technologies.
802.15
Packet Switching
T1
ARP Poisoning
50. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Noise
Application Proxy Firewall
Permanent Virtual Circuit (PVC)
Wired Equivalent Privacy (WEP)