SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Fiber Distributed Data Interface (FDDI)
Circuit Switching
Synchronous Communication
Repeaters
2. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Kernel Proxy Firewall
Pulse Code Modulation (PCM)
Fiber Distributed Data Interface (FDDI)
DOS attacks from flooding
3. Malware attack that sends commands inside of an ICMP packet.
Loki Attack
OSI Layer 3: Network Layer
IPSec
Twisted Pair Cables
4. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Metropolitan Area Network (MAN)
OSI Layer 5: Session Layer
ThickNet - aka 10base5.
Bastion Host
5. Type of network layout that separates and group computers logically.
Wired Equivalent Privacy (WEP)
Star Topology
Source Routing
VLAN
6. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Definition of Protocol
Network Address Translator (NAT)
Bridge
OSI Data encapsulation
7. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
802.11a
Fiber-optic Cables
DOS attacks from flooding
Digital Subscriber Line (DSL)
8. Spam over IM
Loki Attack
Noise
ICMP (Internet Control Message Protocol)
SPIM
9. Standard that outlines wireless personal area network (WPAN) technologies.
Password Authentication Protocol (PAP)
802.15
Classless inter-domain routing (CIDR)
Synchronous Data Link Control (SDLC)
10. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
ThinNet - aka 10base2
Wired Equivalent Privacy (WEP)
DOS attacks from flooding
Cable Modem
11. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Bluejacking
Full-Duplex
Service Set ID (SSID)
OSI Layer 2: Data Link Layer
12. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Channel Service Unit/Data Service Unit (CSU/DSU)
Commonly used in logical bus - Ethernet - token ring.
Permanent Virtual Circuit (PVC)
13. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Commonly used in Ethernet.
Asynchronous Transfer Mode (ATM)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Point-To-Point Tunneling Protocol (PPTP)
14. Protocol that translates IP address into a MAC address (physical Ethernet address)
Definition of Protocol
802.11i
Star Topology
ARP (Address Resolution Protocol)
15. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Application Proxy vs. Circuit Level
Remote Access Servers
Full-Duplex
16. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Layer 2 Tunneling Protocol (L2TP)
Screened Sub-Net
Carrier sense multiple access with collision detection (CSMA/CD)
Circuit Level Proxy Firewall
17. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Screened Sub-Net
Subnetting
Session Initiation Protocol (SIP)
VoIP
18. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
TCP
Commonly used in Internet.
Asynchronous Transfer Mode (ATM)
Kernel Proxy Firewall
19. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Dedicated Links
Cable Modem
Distributed Environment Challenge
Isochronous Communication Processes
20. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Iterated Association
Multilevel Switching
Metropolitan Area Network (MAN)
Dedicated Links
21. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
VoIP
Crosstalk
LLC (Logical Link Control - 802.2)
Pulse Code Modulation (PCM)
22. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Fiber Distributed Data Interface (FDDI)
Point-To-Point Tunneling Protocol (PPTP)
Stateful Firewall
Channel Service Unit/Data Service Unit (CSU/DSU)
23. Protocol that increases address size from 32 bits to 128 bits
802.11i
Port Numbers
Open Relay
IPv6
24. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Synchronous Optical Networks (SONETS)
Integrated Services Digital Network (ISDN)
OSI Layer 7: Application
Wired Equivalent Privacy (WEP)
25. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Challenge Handshake Authentication Protocol (CHAP)
SPIM
Commonly used in Ethernet.
Dedicated Links
26. Both directions - both applications can send information at a time. Session Layer Communication Modes
Coaxial Cables
Wired Equivalent Privacy (WEP)
Full-Duplex
CBC-MAC Protocol (CCMP)
27. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Wide Area Network (WAN)
Coaxial Cables
Star Topology
Screened Sub-Net
28. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Integrated Services Digital Network (ISDN)
Isochronous Communication Processes
Commonly used in Internet.
Layers in the OSI Model
29. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Distributed Environment Challenge
Point-To-Point Tunneling Protocol (PPTP)
OSI Layer 6: Presentation
Carrier sense multiple access with collision detection (CSMA/CD)
30. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Classless inter-domain routing (CIDR)
Multilevel Switching
Commonly used in Ethernet.
ThinNet - aka 10base2
31. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Mesh Topology
Spread Spectrum
DOS attacks from flooding
Open System Authentication (OSA)
32. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Committed Information Rate (CIR)
Stateful Firewall
OSI Layer 3: Network Layer
Asynchronous Transfer Mode (ATM)
33. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Token Passing
OSI Layer 2: Data Link Layer
SOCKS Firewall
Dynamic Packet Filtering
34. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Layer 2 Tunneling Protocol (L2TP)
Trunk Lines
Commonly used in logical bus - Ethernet - token ring.
Password Authentication Protocol (PAP)
35. Protocol for allowing multi-cast (one to many) communication
Blue Boxing
IGMP
Half-Duplex
Fiber-optic Cables
36. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Metropolitan Area Network (MAN)
Application Proxy Firewall
Tree Topology
Wired Equivalent Privacy (WEP)
37. New variant to traditional email spam on VoIP networks.
Shared Key Authentication (SKA)
OSI Layer 6: Presentation
OSI Layer 1: Physical
Spam over Internet Telephony (SPIT)
38. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Proxy Firewall
OSI Layer 4: Transport Layer
Challenge Handshake Authentication Protocol (CHAP)
Stateful Firewall
39. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Source Routing
Synchronous Data Link Control (SDLC)
ARP Poisoning
Loki Attack
40. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Screened Host Firewall
IGMP
Proxy Firewall
Application Proxy Firewall
41. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
ARP (Address Resolution Protocol)
ARP Poisoning
Attenuation
Ethernet (802.3)
42. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Crosstalk
802.11b
Remote Access Servers
OSI Layer 2: Data Link Layer
43. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
SOCKS Firewall
802.11
Screened Sub-Net
Commonly used in logical bus - Ethernet - token ring.
44. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Token Passing
Spam over Internet Telephony (SPIT)
Switched Virtual Circuit (SVC)
Dynamic Packet Filtering
45. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Serial Line Internet Protocol (SLIP)
Commonly used in Ethernet.
OSI Layer 6: Presentation
X.25
46. Communication devices that determine synchronization scheme before data transmission.
Twisted Pair Cables
10baseT
X.25
Synchronous Communication
47. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Packet Switching
10baseT
Metropolitan Area Network (MAN)
Password Authentication Protocol (PAP)
48. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Definition of Protocol
Carrier sense multiple access with collision detection (CSMA/CD)
Spread Spectrum
Ring Topology
49. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Layer 2 Tunneling Protocol (L2TP)
LLC (Logical Link Control - 802.2)
Session Initiation Protocol (SIP)
FDDI-2
50. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Screened Host Firewall
DOS attacks from flooding
Circuit Switching
Packet Filtering Firewall