SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Communication devices that determine synchronization scheme before data transmission.
Stateful Firewall
Coaxial Cables
Synchronous Communication
Subnetting
2. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Serial Line Internet Protocol (SLIP)
Open System Authentication (OSA)
Integrated Services Digital Network (ISDN)
SPIM
3. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Open Relay
Noise
802.11
ARP Poisoning
4. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Ring Topology
Commonly used in logical bus - Ethernet - token ring.
OSI Data encapsulation
Fiber-optic Cables
5. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Frequency Hopping Spread Spectrum (FHSS)
Dedicated Links
OSI Data encapsulation
Dynamic Packet Filtering
6. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Shared Key Authentication (SKA)
10baseT
Dynamic Packet Filtering
Bus Topology
7. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Private Branch Exchange (PBX)
Synchronous Data Link Control (SDLC)
DNS (Domain Name System)
Noise
8. Type of wireless security standard that uses AES in CBC mode.
Full-Duplex
Loki Attack
OSI Layer 3: Network Layer
CBC-MAC Protocol (CCMP)
9. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Digital Subscriber Line (DSL)
Frame Relay
IPSec
Asynchronous Transfer Mode (ATM)
10. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
TCP
Layers in the TCP/IP Model
Full-Duplex
Circuit Switching
11. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
X.25
Digital Subscriber Line (DSL)
OSI Layer 1: Physical
Frequency Hopping Spread Spectrum (FHSS)
12. Protocol that increases address size from 32 bits to 128 bits
Metropolitan Area Network (MAN)
IPv6
Screened Sub-Net
Iterated Association
13. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
X.25
DOS attacks from flooding
Dynamic Packet Filtering
Asynchronous Communication
14. Spam over IM
VLAN
Switch
SPIM
ThickNet - aka 10base5.
15. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Ethernet (802.3)
High Level Data Link Control (HLDC)
Application Proxy Firewall
Wired Equivalent Privacy (WEP)
16. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
LLC (Logical Link Control - 802.2)
Synchronous Communication
Loki Attack
Session Initiation Protocol (SIP)
17. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Proxy Firewall Strengths
Network Address Translator (NAT)
Point-To-Point (PPP)
Plenum-rated Cables
18. Wireless standard that will improve security of wireless communication
ARP (Address Resolution Protocol)
Mesh Topology
Point-To-Point Tunneling Protocol (PPTP)
802.11i
19. Identifys a WLAN. Can be used to segment environments into different WLANS.
OSI Layer 1: Physical
Frequency Hopping Spread Spectrum (FHSS)
Service Set ID (SSID)
Bridge
20. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Synchronous Optical Networks (SONETS)
ThinNet - aka 10base2
Repeaters
Dedicated Links
21. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Circuit Switching
Pulse Code Modulation (PCM)
Coaxial Cables
Attenuation
22. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Asynchronous Transfer Mode (ATM)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Extensible Authentication Protocol (EAP)
Crosstalk
23. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Channel Service Unit/Data Service Unit (CSU/DSU)
DNS (Domain Name System)
802.11a
Packet Filtering Firewall
24. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
ARP (Address Resolution Protocol)
Loki Attack
Multi-protocol Label Switching
Ethernet (802.3)
25. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Wireless Application Protocol (WAP)
ARP Poisoning
ThickNet - aka 10base5.
Point-To-Point Tunneling Protocol (PPTP)
26. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
802.11b
DNS (Domain Name System)
Switch
Direct Sequence Spread Spectrum (DSSS)
27. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Point-To-Point (PPP)
Dual-Homed Firewall
Frame Relay
Subnetting
28. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Star Topology
Circuit Level Proxy Firewall
Twisted Pair Cables
VLAN
29. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Multilevel Switching
Half-Duplex
802.15
Token Ring (802.5)
30. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Point-To-Point Tunneling Protocol (PPTP)
Asynchronous Communication
T1
802.11i
31. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Pulse Code Modulation (PCM)
Remote Access Servers
Service Set ID (SSID)
Committed Information Rate (CIR)
32. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Screened Host Firewall
Point-To-Point (PPP)
Synchronous Communication
802.15
33. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
OSI Layer 2: Data Link Layer
Noise
Dual-Homed Firewall
Star Topology
34. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Asynchronous Communication
Layers in the TCP/IP Model
UDP
Password Authentication Protocol (PAP)
35. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Circuit Level Proxy Firewall
Direct Sequence Spread Spectrum (DSSS)
Private Branch Exchange (PBX)
Commonly used in Ethernet.
36. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Trunk Lines
Plenum-rated Cables
Service Set ID (SSID)
Multistation Access Unit (MAU)
37. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Switch
Private Branch Exchange (PBX)
Packet Filtering Firewall
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
38. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Dynamic Packet Filtering
Synchronous Data Link Control (SDLC)
T1
Wide Area Network (WAN)
39. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
802.11
Commonly used in logical bus - Ethernet - token ring.
Frame Relay
SPIM
40. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Multi-protocol Label Switching
Fiber-optic Cables
Simplex: One direction.
Switched Virtual Circuit (SVC)
41. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Crosstalk
ARP (Address Resolution Protocol)
Commonly used in FDDI.
10baseT
42. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Virtual Private Network (VPN)
Reverse Address Resolution Protocol (RARP )
Synchronous Optical Networks (SONETS)
Temporal Key Integrity Protocol (TKIP)
43. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Simplex: One direction.
Stateful Firewall
Application Proxy vs. Circuit Level
Router
44. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Mesh Topology
Router
Service Set ID (SSID)
Reverse Address Resolution Protocol (RARP )
45. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Switched Virtual Circuit (SVC)
Definition of Protocol
Multilevel Switching
Shared Key Authentication (SKA)
46. Protocol that translates IP address into a MAC address (physical Ethernet address)
Spread Spectrum
ARP (Address Resolution Protocol)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Coaxial Cables
47. Problems: Central device is a single point of failure.
Asynchronous Communication
802.16
Star Topology
Circuit Level Proxy Firewall
48. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Circuit Level Proxy Firewall
Challenge Handshake Authentication Protocol (CHAP)
Packet Filtering Firewall
Dual-Homed Firewall
49. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Application Proxy vs. Circuit Level
Iterated Association
OSI Layer 4: Transport Layer
Isochronous Communication Processes
50. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Dynamic Packet Filtering
Packet Filtering Firewall
OSI Layer 5: Session Layer
OSI Layer 4: Transport Layer