SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol that translates a MAC address into an IP address.
802.11a
Network Address Translator (NAT)
Reverse Address Resolution Protocol (RARP )
Metropolitan Area Network (MAN)
2. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Application Proxy vs. Circuit Level
10baseT
Switch
Commonly used in Ethernet.
3. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Fiber Distributed Data Interface (FDDI)
Session Initiation Protocol (SIP)
Repeaters
Commonly used in Internet.
4. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Source Routing
Synchronous Communication
Subnetting
TCP
5. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Spread Spectrum
ARP Poisoning
Plenum-rated Cables
Bus Topology
6. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Plenum-rated Cables
ICMP (Internet Control Message Protocol)
Network Address Translator (NAT)
Synchronous Communication
7. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Service Set ID (SSID)
Point-To-Point (PPP)
OSI Layer 3: Network Layer
Half-Duplex
8. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Switched Virtual Circuit (SVC)
IPv6
Digital Subscriber Line (DSL)
Frame Relay
9. Both directions - only one application can send information at a time
Ring Topology
Half-Duplex
Tree Topology
Bus Topology
10. Communication devices that determine synchronization scheme before data transmission.
Isochronous Communication Processes
802.15
Synchronous Communication
OSI Layer 2: Data Link Layer
11. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Digital Subscriber Line (DSL)
Screened Sub-Net
Multistation Access Unit (MAU)
Session Initiation Protocol (SIP)
12. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in logical bus - Ethernet - token ring.
Extensible Authentication Protocol (EAP)
Token Passing
802.11b
13. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Crosstalk
Asynchronous Communication
OSI Layer 5: Session Layer
OSI Layer 2: Data Link Layer
14. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Subnetting
Attenuation
Repeaters
Network Address Translator (NAT)
15. Type of cabling problem signals from one wire crossing over to another wire.
LLC (Logical Link Control - 802.2)
802.15
Source Routing
Crosstalk
16. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Shared Key Authentication (SKA)
Ring Topology
VoIP
Source Routing
17. Standard that addresses wireless MAN technologies.
DNS (Domain Name System)
802.16
Service Set ID (SSID)
Carrier sense multiple access with collision detection (CSMA/CD)
18. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Permanent Virtual Circuit (PVC)
Remote Access Servers
Committed Information Rate (CIR)
ICMP (Internet Control Message Protocol)
19. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
OSI Data encapsulation
Circuit Level Proxy Firewall
Noise
Frequency Hopping Spread Spectrum (FHSS)
20. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Spread Spectrum
Wireless Application Protocol (WAP)
Frame Relay
FDDI-2
21. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Challenge Handshake Authentication Protocol (CHAP)
Asynchronous Communication
Distributed Environment Challenge
Point-To-Point Tunneling Protocol (PPTP)
22. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
TCP
T1
Multilevel Switching
802.11
23. Protocol that translates IP address into a MAC address (physical Ethernet address)
ARP (Address Resolution Protocol)
VLAN
10baseT
Fiber Distributed Data Interface (FDDI)
24. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Source Routing
Dynamic Packet Filtering
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Frame Relay
25. In a token ring network - each computer is connected to this - which acts as a central hub.
Star Topology
Isochronous Communication Processes
Application Proxy vs. Circuit Level
Multistation Access Unit (MAU)
26. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Integrated Services Digital Network (ISDN)
Metropolitan Area Network (MAN)
Spread Spectrum
Distributed Environment Challenge
27. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Session Initiation Protocol (SIP)
Temporal Key Integrity Protocol (TKIP)
Service Set ID (SSID)
Open System Authentication (OSA)
28. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Iterated Association
Bluejacking
SOCKS Firewall
Definition of Protocol
29. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Extensible Authentication Protocol (EAP)
Subnetting
OSI Layer 3: Network Layer
Token Ring (802.5)
30. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Source Routing
Virtual Private Network (VPN)
802.11
Fiber-optic Cables
31. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
OSI Layer 1: Physical
FDDI-2
802.11
Synchronous Optical Networks (SONETS)
32. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Frame Relay
T1
OSI Layer 3: Network Layer
Digital Subscriber Line (DSL)
33. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
T1
Cable Modem
IPv6
Bus Topology
34. Protocol for allowing multi-cast (one to many) communication
ARP Poisoning
IGMP
Bridge
Layer 2 Tunneling Protocol (L2TP)
35. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Application Proxy vs. Circuit Level
Open System Authentication (OSA)
Spam over Internet Telephony (SPIT)
T1
36. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Noise
OSI Layer 1: Physical
Stateful Firewall
Blue Boxing
37. SMTP server that is configured for sending email from any source to and destination.
Shared Key Authentication (SKA)
Proxy Firewall
Blue Boxing
Open Relay
38. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Plenum-rated Cables
Circuit Level Proxy Firewall
Network Address Translator (NAT)
Private Branch Exchange (PBX)
39. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Frame Relay
Cable Modem
Spam over Internet Telephony (SPIT)
Point-To-Point Tunneling Protocol (PPTP)
40. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Loki Attack
OSI Data encapsulation
High Level Data Link Control (HLDC)
Spam over Internet Telephony (SPIT)
41. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
ARP (Address Resolution Protocol)
Remote Access Servers
Challenge Handshake Authentication Protocol (CHAP)
Asynchronous Communication
42. Type of topology where computers all are connected to each other - which provides redundancy.
Commonly used in Internet.
IGMP
Layers in the OSI Model
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
43. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Kernel Proxy Firewall
DOS attacks from flooding
SOCKS Firewall
Wide Area Network (WAN)
44. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Token Ring (802.5)
Bastion Host
Stateful Firewall
OSI Layer 2: Data Link Layer
45. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
ThickNet - aka 10base5.
Wired Equivalent Privacy (WEP)
IPSec
802.11a
46. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
ThinNet - aka 10base2
Extensible Authentication Protocol (EAP)
Proxy Firewall Strengths
Blue Boxing
47. Type of network layout that separates and group computers logically.
802.11i
VLAN
Tree Topology
Isochronous Communication Processes
48. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
Mesh Topology
Commonly used in Ethernet.
ThickNet - aka 10base5.
49. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Classless inter-domain routing (CIDR)
Channel Service Unit/Data Service Unit (CSU/DSU)
Permanent Virtual Circuit (PVC)
Isochronous Communication Processes
50. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Asynchronous Transfer Mode (ATM)
Application Proxy vs. Circuit Level
DOS attacks from flooding
Committed Information Rate (CIR)