SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Cable Modem
ICMP (Internet Control Message Protocol)
Permanent Virtual Circuit (PVC)
Packet Switching
2. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Committed Information Rate (CIR)
Frame Relay
Point-To-Point (PPP)
IGMP
3. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Mesh Topology
Repeaters
Asynchronous Transfer Mode (ATM)
Commonly used in Internet.
4. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
FDDI-2
OSI Layer 7: Application
Half-Duplex
Wireless Application Protocol (WAP)
5. Both directions - both applications can send information at a time. Session Layer Communication Modes
LLC (Logical Link Control - 802.2)
Temporal Key Integrity Protocol (TKIP)
802.11
Full-Duplex
6. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
UDP
Asynchronous Communication
Circuit Switching
Subnetting
7. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Commonly used in FDDI.
Session Initiation Protocol (SIP)
DOS attacks from flooding
Shared Key Authentication (SKA)
8. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
802.11b
Trunk Lines
Frequency Hopping Spread Spectrum (FHSS)
9. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Temporal Key Integrity Protocol (TKIP)
10baseT
Digital Subscriber Line (DSL)
DNS (Domain Name System)
10. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Bridge
FDDI-2
Ring Topology
Extensible Authentication Protocol (EAP)
11. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Synchronous Data Link Control (SDLC)
Packet Filtering Firewall
Port Numbers
OSI Layer 3: Network Layer
12. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Synchronous Data Link Control (SDLC)
Screened Host Firewall
10baseT
Fiber Distributed Data Interface (FDDI)
13. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Source Routing
Trunk Lines
OSI Layer 6: Presentation
Cable Modem
14. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Router
Frame Relay
Stateful Firewall
Session Initiation Protocol (SIP)
15. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Dedicated Links
Dual-Homed Firewall
Packet Switching
Bus Topology
16. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Switched Virtual Circuit (SVC)
Coaxial Cables
Token Ring (802.5)
IPv6
17. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Cable Modem
ICMP (Internet Control Message Protocol)
Bus Topology
Session Initiation Protocol (SIP)
18. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Digital Subscriber Line (DSL)
Point-To-Point Tunneling Protocol (PPTP)
Open Relay
Commonly used in Internet.
19. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Channel Service Unit/Data Service Unit (CSU/DSU)
OSI Layer 4: Transport Layer
Subnetting
Packet Filtering Firewall
20. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Wide Area Network (WAN)
Serial Line Internet Protocol (SLIP)
Point-To-Point Tunneling Protocol (PPTP)
OSI Layer 1: Physical
21. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
Cable Modem
Token Passing
DOS attacks from flooding
22. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Application Proxy Firewall
Permanent Virtual Circuit (PVC)
Synchronous Optical Networks (SONETS)
Layer 2 Tunneling Protocol (L2TP)
23. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
ARP (Address Resolution Protocol)
802.11a
Temporal Key Integrity Protocol (TKIP)
802.11i
24. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Dual-Homed Firewall
Channel Service Unit/Data Service Unit (CSU/DSU)
DNS (Domain Name System)
Fiber Distributed Data Interface (FDDI)
25. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Open System Authentication (OSA)
Proxy Firewall Strengths
ICMP (Internet Control Message Protocol)
Ethernet (802.3)
26. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
VLAN
Crosstalk
802.11
27. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
OSI Layer 1: Physical
Committed Information Rate (CIR)
Ring Topology
Full-Duplex
28. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Carrier sense multiple access with collision detection (CSMA/CD)
Serial Line Internet Protocol (SLIP)
Asynchronous Communication
Metropolitan Area Network (MAN)
29. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
IGMP
Packet Switching
Commonly used in Internet.
Proxy Firewall
30. Type of topology where computers all are connected to each other - which provides redundancy.
Full-Duplex
Commonly used in Internet.
ThinNet - aka 10base2
Half-Duplex
31. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
VoIP
OSI Layer 6: Presentation
VLAN
Isochronous Communication Processes
32. Type of firewall that lies between the perimeter router and and LAN.
Dedicated Links
Full-Duplex
Password Authentication Protocol (PAP)
Screened Host Firewall
33. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Proxy Firewall Strengths
Token Ring (802.5)
Channel Service Unit/Data Service Unit (CSU/DSU)
Packet Filtering Firewall
34. Type of network layout that separates and group computers logically.
Open Relay
VLAN
Iterated Association
UDP
35. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
ICMP (Internet Control Message Protocol)
Password Authentication Protocol (PAP)
Packet Filtering Firewall
Digital Subscriber Line (DSL)
36. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
IPSec
Subnetting
Permanent Virtual Circuit (PVC)
ARP Poisoning
37. Set of rules that dictates how computer communicate over networks.
OSI Layer 3: Network Layer
Bastion Host
Definition of Protocol
Token Passing
38. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Circuit Level Proxy Firewall
Half-Duplex
Multilevel Switching
LLC (Logical Link Control - 802.2)
39. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
Fiber-optic Cables
Permanent Virtual Circuit (PVC)
DOS attacks from flooding
40. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
FDDI-2
Bluejacking
Layers in the TCP/IP Model
Ethernet (802.3)
41. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Wide Area Network (WAN)
Distributed Environment Challenge
Switched Virtual Circuit (SVC)
Packet Filtering Firewall
42. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Synchronous Communication
Point-To-Point (PPP)
ICMP (Internet Control Message Protocol)
Fiber-optic Cables
43. New variant to traditional email spam on VoIP networks.
Channel Service Unit/Data Service Unit (CSU/DSU)
Network Address Translator (NAT)
Spam over Internet Telephony (SPIT)
OSI Layer 5: Session Layer
44. Protocol for allowing multi-cast (one to many) communication
ICMP (Internet Control Message Protocol)
802.15
Asynchronous Communication
IGMP
45. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Direct Sequence Spread Spectrum (DSSS)
Bus Topology
Packet Switching
Multilevel Switching
46. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Dynamic Packet Filtering
Carrier sense multiple access with collision detection (CSMA/CD)
Circuit Level Proxy Firewall
OSI Layer 6: Presentation
47. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Classless inter-domain routing (CIDR)
Digital Subscriber Line (DSL)
Serial Line Internet Protocol (SLIP)
DOS attacks from flooding
48. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
High Level Data Link Control (HLDC)
Layer 2 Tunneling Protocol (L2TP)
Commonly used in FDDI.
Temporal Key Integrity Protocol (TKIP)
49. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Application Proxy vs. Circuit Level
Open System Authentication (OSA)
Frequency Hopping Spread Spectrum (FHSS)
802.11i
50. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
High Level Data Link Control (HLDC)
Committed Information Rate (CIR)
ThinNet - aka 10base2
802.11i