SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Ethernet (802.3)
X.25
Synchronous Optical Networks (SONETS)
OSI Layer 2: Data Link Layer
2. Problems: Central device is a single point of failure.
Wide Area Network (WAN)
Star Topology
Commonly used in Ethernet.
T1
3. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
OSI Layer 3: Network Layer
Proxy Firewall
VoIP
Kernel Proxy Firewall
4. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
Network Address Translator (NAT)
802.15
Layers in the TCP/IP Model
5. Protocol that increases address size from 32 bits to 128 bits
Plenum-rated Cables
Spread Spectrum
TCP
IPv6
6. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
ARP Poisoning
Dedicated Links
Carrier sense multiple access with collision detection (CSMA/CD)
OSI Layer 6: Presentation
7. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Shared Key Authentication (SKA)
IPv6
ThinNet - aka 10base2
CBC-MAC Protocol (CCMP)
8. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Repeaters
Frame Relay
Kernel Proxy Firewall
Temporal Key Integrity Protocol (TKIP)
9. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
ARP Poisoning
Layer 2 Tunneling Protocol (L2TP)
T3
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
10. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Dedicated Links
Circuit Level Proxy Firewall
Synchronous Communication
Packet Filtering Firewall
11. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
OSI Data encapsulation
Synchronous Communication
Plenum-rated Cables
802.15
12. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
OSI Layer 4: Transport Layer
Application Proxy vs. Circuit Level
Packet Filtering Firewall
Tree Topology
13. Malware attack that sends commands inside of an ICMP packet.
802.15
Loki Attack
Repeaters
Direct Sequence Spread Spectrum (DSSS)
14. Protocol that translates IP address into a MAC address (physical Ethernet address)
Screened Sub-Net
ARP (Address Resolution Protocol)
Multi-protocol Label Switching
Service Set ID (SSID)
15. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
Direct Sequence Spread Spectrum (DSSS)
Multistation Access Unit (MAU)
Open System Authentication (OSA)
16. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Iterated Association
Multistation Access Unit (MAU)
Asynchronous Transfer Mode (ATM)
Pulse Code Modulation (PCM)
17. This network technology determines which system will send data based on which one has the token.
Proxy Firewall Strengths
FDDI-2
IPv6
Token Passing
18. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Ethernet (802.3)
OSI Layer 6: Presentation
LLC (Logical Link Control - 802.2)
Spread Spectrum
19. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Simplex: One direction.
802.11a
OSI Layer 5: Session Layer
Tree Topology
20. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
T1
Frame Relay
Circuit Level Proxy Firewall
Token Passing
21. Wireless standard that will improve security of wireless communication
802.11i
SPIM
Commonly used in FDDI.
Digital Subscriber Line (DSL)
22. Type of cabling problem signals from one wire crossing over to another wire.
Service Set ID (SSID)
Crosstalk
Dual-Homed Firewall
Open System Authentication (OSA)
23. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Frame Relay
Blue Boxing
Channel Service Unit/Data Service Unit (CSU/DSU)
FDDI-2
24. Network segment name for a DMZ created by two physical firewalls.
Bridge
SPIM
Screened Sub-Net
Open System Authentication (OSA)
25. In a token ring network - each computer is connected to this - which acts as a central hub.
802.11a
Multistation Access Unit (MAU)
Wide Area Network (WAN)
Subnetting
26. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Layers in the OSI Model
OSI Layer 4: Transport Layer
Synchronous Optical Networks (SONETS)
Frame Relay
27. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Screened Sub-Net
Synchronous Optical Networks (SONETS)
Layers in the OSI Model
Circuit Switching
28. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
ThinNet - aka 10base2
Frame Relay
Multilevel Switching
SOCKS Firewall
29. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Token Passing
Digital Subscriber Line (DSL)
802.11b
Dual-Homed Firewall
30. Communication devices that determine synchronization scheme before data transmission.
Remote Access Servers
DNS (Domain Name System)
Frequency Hopping Spread Spectrum (FHSS)
Synchronous Communication
31. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Dynamic Packet Filtering
Direct Sequence Spread Spectrum (DSSS)
Twisted Pair Cables
Fiber-optic Cables
32. Spam over IM
Definition of Protocol
Commonly used in Ethernet.
SPIM
Layers in the TCP/IP Model
33. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Star Topology
Wireless Application Protocol (WAP)
Asynchronous Communication
OSI Layer 2: Data Link Layer
34. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
OSI Layer 5: Session Layer
Session Initiation Protocol (SIP)
LLC (Logical Link Control - 802.2)
Synchronous Data Link Control (SDLC)
35. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Coaxial Cables
Multistation Access Unit (MAU)
OSI Layer 1: Physical
ICMP (Internet Control Message Protocol)
36. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
OSI Layer 2: Data Link Layer
Serial Line Internet Protocol (SLIP)
OSI Layer 3: Network Layer
Bus Topology
37. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Shared Key Authentication (SKA)
Direct Sequence Spread Spectrum (DSSS)
Bluejacking
SPIM
38. Standard that outlines wireless personal area network (WPAN) technologies.
802.15
Circuit Level Proxy Firewall
Proxy Firewall Strengths
Distributed Environment Challenge
39. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Classless inter-domain routing (CIDR)
Metropolitan Area Network (MAN)
Coaxial Cables
Open System Authentication (OSA)
40. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Switched Virtual Circuit (SVC)
Temporal Key Integrity Protocol (TKIP)
Classless inter-domain routing (CIDR)
Synchronous Communication
41. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
VoIP
Proxy Firewall
Application Proxy Firewall
Trunk Lines
42. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Fiber Distributed Data Interface (FDDI)
Ethernet (802.3)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
802.15
43. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Circuit Level Proxy Firewall
Bastion Host
Isochronous Communication Processes
Screened Sub-Net
44. In the OSI layer 5 - these are the types of what?
Simplex: One direction.
OSI Layer 3: Network Layer
Bastion Host
Token Ring (802.5)
45. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Virtual Private Network (VPN)
OSI Layer 1: Physical
Cable Modem
OSI Layer 5: Session Layer
46. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Commonly used in Ethernet.
Wireless Application Protocol (WAP)
Proxy Firewall Strengths
Screened Sub-Net
47. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Synchronous Data Link Control (SDLC)
Fiber Distributed Data Interface (FDDI)
Integrated Services Digital Network (ISDN)
Repeaters
48. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
VoIP
Extensible Authentication Protocol (EAP)
Commonly used in FDDI.
Port Numbers
49. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Twisted Pair Cables
Wired Equivalent Privacy (WEP)
OSI Layer 1: Physical
Layer 2 Tunneling Protocol (L2TP)
50. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Switch
Open System Authentication (OSA)
Definition of Protocol
Mesh Topology