SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Isochronous Communication Processes
Mesh Topology
Application Proxy Firewall
OSI Data encapsulation
2. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Shared Key Authentication (SKA)
Stateful Firewall
Session Initiation Protocol (SIP)
Integrated Services Digital Network (ISDN)
3. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
IPv6
Attenuation
Circuit Switching
Integrated Services Digital Network (ISDN)
4. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Trunk Lines
Crosstalk
802.11
Layer 2 Tunneling Protocol (L2TP)
5. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
802.16
FDDI-2
Wired Equivalent Privacy (WEP)
Channel Service Unit/Data Service Unit (CSU/DSU)
6. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
Multilevel Switching
Star Topology
Application Proxy vs. Circuit Level
7. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Bus Topology
Fiber-optic Cables
Network Address Translator (NAT)
Commonly used in Internet.
8. Spam over IM
Packet Switching
Tree Topology
SPIM
Layers in the OSI Model
9. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Multistation Access Unit (MAU)
Commonly used in FDDI.
Extensible Authentication Protocol (EAP)
802.11a
10. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Fiber Distributed Data Interface (FDDI)
UDP
Definition of Protocol
T1
11. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Fiber-optic Cables
ARP (Address Resolution Protocol)
Carrier sense multiple access with collision detection (CSMA/CD)
OSI Layer 4: Transport Layer
12. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
T3
Layers in the OSI Model
ThinNet - aka 10base2
13. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
OSI Layer 7: Application
OSI Layer 3: Network Layer
OSI Layer 1: Physical
VLAN
14. Both directions - only one application can send information at a time
IPSec
Half-Duplex
Repeaters
Noise
15. Protocol for allowing multi-cast (one to many) communication
Network Address Translator (NAT)
IGMP
Reverse Address Resolution Protocol (RARP )
802.15
16. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
OSI Layer 6: Presentation
Trunk Lines
Screened Host Firewall
802.11b
17. Network segment name for a DMZ created by two physical firewalls.
VoIP
Multistation Access Unit (MAU)
Screened Sub-Net
OSI Layer 7: Application
18. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Mesh Topology
Committed Information Rate (CIR)
Cable Modem
Spam over Internet Telephony (SPIT)
19. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Packet Filtering Firewall
Iterated Association
Synchronous Data Link Control (SDLC)
T1
20. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
LLC (Logical Link Control - 802.2)
Pulse Code Modulation (PCM)
Commonly used in FDDI.
FDDI-2
21. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Tree Topology
802.11b
Session Initiation Protocol (SIP)
Token Ring (802.5)
22. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Point-To-Point Tunneling Protocol (PPTP)
Layers in the TCP/IP Model
Dedicated Links
Direct Sequence Spread Spectrum (DSSS)
23. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
SPIM
Loki Attack
Open System Authentication (OSA)
Commonly used in Internet.
24. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Open Relay
Synchronous Data Link Control (SDLC)
Asynchronous Transfer Mode (ATM)
CBC-MAC Protocol (CCMP)
25. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Circuit Level Proxy Firewall
802.11a
Repeaters
Plenum-rated Cables
26. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Multilevel Switching
Classless inter-domain routing (CIDR)
Blue Boxing
Frame Relay
27. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Packet Filtering Firewall
ICMP (Internet Control Message Protocol)
Wireless Application Protocol (WAP)
T1
28. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Half-Duplex
Open Relay
Password Authentication Protocol (PAP)
DNS (Domain Name System)
29. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Extensible Authentication Protocol (EAP)
10baseT
Metropolitan Area Network (MAN)
Commonly used in Internet.
30. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Committed Information Rate (CIR)
Bluejacking
Noise
Private Branch Exchange (PBX)
31. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Isochronous Communication Processes
Password Authentication Protocol (PAP)
Multilevel Switching
Full-Duplex
32. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Password Authentication Protocol (PAP)
DOS attacks from flooding
Commonly used in FDDI.
Simplex: One direction.
33. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
OSI Layer 2: Data Link Layer
Tree Topology
X.25
Twisted Pair Cables
34. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
802.11
Wide Area Network (WAN)
Dual-Homed Firewall
35. Wireless communication that distributes individual signals across the allocated frequencies.
Frame Relay
Bus Topology
Spread Spectrum
Wired Equivalent Privacy (WEP)
36. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Frequency Hopping Spread Spectrum (FHSS)
Application Proxy vs. Circuit Level
Channel Service Unit/Data Service Unit (CSU/DSU)
Asynchronous Communication
37. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Application Proxy vs. Circuit Level
Packet Filtering Firewall
Repeaters
Dual-Homed Firewall
38. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Router
High Level Data Link Control (HLDC)
802.16
VoIP
39. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
OSI Layer 4: Transport Layer
Point-To-Point (PPP)
Trunk Lines
10baseT
40. Protocol that translates IP address into a MAC address (physical Ethernet address)
Synchronous Data Link Control (SDLC)
Layers in the OSI Model
ARP (Address Resolution Protocol)
Password Authentication Protocol (PAP)
41. Standard that addresses wireless MAN technologies.
Isochronous Communication Processes
802.16
Multistation Access Unit (MAU)
High Level Data Link Control (HLDC)
42. This network technology determines which system will send data based on which one has the token.
OSI Data encapsulation
Token Passing
ThickNet - aka 10base5.
Spread Spectrum
43. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
DOS attacks from flooding
Multistation Access Unit (MAU)
T1
Application Proxy vs. Circuit Level
44. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Packet Filtering Firewall
Asynchronous Communication
Dynamic Packet Filtering
Synchronous Optical Networks (SONETS)
45. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Commonly used in Ethernet.
Circuit Level Proxy Firewall
SOCKS Firewall
TCP
46. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
OSI Layer 1: Physical
Coaxial Cables
Commonly used in Internet.
T1
47. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Network Address Translator (NAT)
802.11b
Commonly used in Internet.
Coaxial Cables
48. In a token ring network - each computer is connected to this - which acts as a central hub.
Layers in the TCP/IP Model
Cable Modem
Multistation Access Unit (MAU)
Fiber Distributed Data Interface (FDDI)
49. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Trunk Lines
Stateful Firewall
X.25
ICMP (Internet Control Message Protocol)
50. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Password Authentication Protocol (PAP)
Commonly used in FDDI.
Serial Line Internet Protocol (SLIP)
Remote Access Servers