SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
FDDI-2
Simplex: One direction.
Wireless Application Protocol (WAP)
SPIM
2. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Wide Area Network (WAN)
Packet Filtering Firewall
Fiber Distributed Data Interface (FDDI)
Dedicated Links
3. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Noise
Session Initiation Protocol (SIP)
Iterated Association
Packet Filtering Firewall
4. This network technology determines which system will send data based on which one has the token.
Token Passing
Layer 2 Tunneling Protocol (L2TP)
Remote Access Servers
Virtual Private Network (VPN)
5. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
LLC (Logical Link Control - 802.2)
Proxy Firewall Strengths
VoIP
Integrated Services Digital Network (ISDN)
6. Wireless communication that distributes individual signals across the allocated frequencies.
Noise
DNS (Domain Name System)
Spread Spectrum
802.11i
7. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
OSI Layer 6: Presentation
OSI Layer 5: Session Layer
Wireless Application Protocol (WAP)
Synchronous Communication
8. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
OSI Layer 4: Transport Layer
Circuit Level Proxy Firewall
Switch
Bridge
9. Type of cabling problem signals from one wire crossing over to another wire.
Port Numbers
Challenge Handshake Authentication Protocol (CHAP)
UDP
Crosstalk
10. Type of firewall that lies between the perimeter router and and LAN.
Remote Access Servers
CBC-MAC Protocol (CCMP)
Point-To-Point (PPP)
Screened Host Firewall
11. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Private Branch Exchange (PBX)
CBC-MAC Protocol (CCMP)
Virtual Private Network (VPN)
DOS attacks from flooding
12. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Token Passing
Carrier sense multiple access with collision detection (CSMA/CD)
Proxy Firewall Strengths
Plenum-rated Cables
13. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Repeaters
Application Proxy vs. Circuit Level
CBC-MAC Protocol (CCMP)
OSI Data encapsulation
14. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Screened Host Firewall
OSI Data encapsulation
ThinNet - aka 10base2
Application Proxy vs. Circuit Level
15. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Proxy Firewall
Tree Topology
Port Numbers
Pulse Code Modulation (PCM)
16. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Cable Modem
Carrier sense multiple access with collision detection (CSMA/CD)
Private Branch Exchange (PBX)
Trunk Lines
17. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Fiber Distributed Data Interface (FDDI)
Bridge
Frame Relay
T1
18. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
Distributed Environment Challenge
Trunk Lines
OSI Layer 5: Session Layer
19. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Private Branch Exchange (PBX)
Tree Topology
Port Numbers
Multi-protocol Label Switching
20. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Proxy Firewall Strengths
Source Routing
Packet Filtering Firewall
Bastion Host
21. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Dedicated Links
Extensible Authentication Protocol (EAP)
Spam over Internet Telephony (SPIT)
Network Address Translator (NAT)
22. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Point-To-Point Tunneling Protocol (PPTP)
OSI Layer 6: Presentation
Isochronous Communication Processes
OSI Layer 2: Data Link Layer
23. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
ICMP (Internet Control Message Protocol)
802.11
Coaxial Cables
Tree Topology
24. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Kernel Proxy Firewall
Committed Information Rate (CIR)
Packet Filtering Firewall
Source Routing
25. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
T1
Application Proxy vs. Circuit Level
Mesh Topology
Point-To-Point Tunneling Protocol (PPTP)
26. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Digital Subscriber Line (DSL)
Packet Filtering Firewall
Open System Authentication (OSA)
OSI Layer 2: Data Link Layer
27. In the OSI layer 5 - these are the types of what?
Packet Filtering Firewall
Repeaters
Simplex: One direction.
Definition of Protocol
28. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Source Routing
Distributed Environment Challenge
Spam over Internet Telephony (SPIT)
OSI Layer 7: Application
29. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Proxy Firewall
Remote Access Servers
Dynamic Packet Filtering
Simplex: One direction.
30. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
OSI Layer 5: Session Layer
802.11b
Commonly used in logical bus - Ethernet - token ring.
Synchronous Optical Networks (SONETS)
31. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Shared Key Authentication (SKA)
Direct Sequence Spread Spectrum (DSSS)
OSI Layer 4: Transport Layer
UDP
32. Protocol that translates a MAC address into an IP address.
Reverse Address Resolution Protocol (RARP )
Committed Information Rate (CIR)
Bridge
Application Proxy Firewall
33. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Extensible Authentication Protocol (EAP)
TCP
OSI Layer 3: Network Layer
Ring Topology
34. Type of network layout that is a large geographical region connecting more that one LAN.
Extensible Authentication Protocol (EAP)
T3
Wide Area Network (WAN)
Simplex: One direction.
35. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Bastion Host
Point-To-Point (PPP)
ARP (Address Resolution Protocol)
Bluejacking
36. Standard that addresses wireless MAN technologies.
Half-Duplex
802.16
Spam over Internet Telephony (SPIT)
802.11
37. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Spam over Internet Telephony (SPIT)
Dynamic Packet Filtering
Pulse Code Modulation (PCM)
10baseT
38. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Synchronous Data Link Control (SDLC)
Port Numbers
Dedicated Links
Metropolitan Area Network (MAN)
39. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Packet Filtering Firewall
Ethernet (802.3)
OSI Layer 7: Application
Dedicated Links
40. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Packet Filtering Firewall
Proxy Firewall Strengths
Challenge Handshake Authentication Protocol (CHAP)
Cable Modem
41. Set of rules that dictates how computer communicate over networks.
Definition of Protocol
Bridge
Half-Duplex
High Level Data Link Control (HLDC)
42. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Synchronous Communication
ThickNet - aka 10base5.
OSI Layer 3: Network Layer
Digital Subscriber Line (DSL)
43. SMTP server that is configured for sending email from any source to and destination.
Coaxial Cables
Synchronous Data Link Control (SDLC)
Open Relay
Wide Area Network (WAN)
44. Problems: Central device is a single point of failure.
Bus Topology
10baseT
Star Topology
Definition of Protocol
45. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
OSI Data encapsulation
Dual-Homed Firewall
Fiber-optic Cables
IPSec
46. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Carrier sense multiple access with collision detection (CSMA/CD)
Source Routing
Bus Topology
Blue Boxing
47. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
UDP
Screened Host Firewall
Integrated Services Digital Network (ISDN)
Port Numbers
48. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Kernel Proxy Firewall
Shared Key Authentication (SKA)
Spread Spectrum
Channel Service Unit/Data Service Unit (CSU/DSU)
49. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
802.11a
Temporal Key Integrity Protocol (TKIP)
Classless inter-domain routing (CIDR)
Synchronous Data Link Control (SDLC)
50. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Attenuation
VoIP
OSI Data encapsulation
Dedicated Links