SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of network layout that separates and group computers logically.
VLAN
Multistation Access Unit (MAU)
Fiber Distributed Data Interface (FDDI)
Repeaters
2. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Session Initiation Protocol (SIP)
Circuit Switching
Synchronous Data Link Control (SDLC)
Cable Modem
3. In the OSI layer 5 - these are the types of what?
Simplex: One direction.
IPSec
Permanent Virtual Circuit (PVC)
Fiber Distributed Data Interface (FDDI)
4. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
Screened Host Firewall
Dynamic Packet Filtering
OSI Layer 2: Data Link Layer
5. Protocol that translates a MAC address into an IP address.
Plenum-rated Cables
Reverse Address Resolution Protocol (RARP )
OSI Layer 5: Session Layer
10baseT
6. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Challenge Handshake Authentication Protocol (CHAP)
Digital Subscriber Line (DSL)
X.25
7. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Switched Virtual Circuit (SVC)
Application Proxy vs. Circuit Level
Asynchronous Communication
OSI Layer 3: Network Layer
8. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Digital Subscriber Line (DSL)
Commonly used in FDDI.
Crosstalk
Commonly used in logical bus - Ethernet - token ring.
9. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Dual-Homed Firewall
Point-To-Point (PPP)
Wide Area Network (WAN)
Layer 2 Tunneling Protocol (L2TP)
10. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Commonly used in Internet.
Pulse Code Modulation (PCM)
Subnetting
Private Branch Exchange (PBX)
11. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Integrated Services Digital Network (ISDN)
Extensible Authentication Protocol (EAP)
Bluejacking
Application Proxy Firewall
12. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
X.25
Point-To-Point Tunneling Protocol (PPTP)
Half-Duplex
Synchronous Communication
13. Protocol that increases address size from 32 bits to 128 bits
IPv6
Noise
Frequency Hopping Spread Spectrum (FHSS)
Tree Topology
14. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Frame Relay
DNS (Domain Name System)
Switched Virtual Circuit (SVC)
Channel Service Unit/Data Service Unit (CSU/DSU)
15. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Point-To-Point (PPP)
Attenuation
OSI Layer 6: Presentation
Half-Duplex
16. Wireless standard that will improve security of wireless communication
802.11i
Spread Spectrum
Metropolitan Area Network (MAN)
Half-Duplex
17. Standard that outlines wireless personal area network (WPAN) technologies.
Circuit Level Proxy Firewall
T3
DOS attacks from flooding
802.15
18. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Port Numbers
Asynchronous Transfer Mode (ATM)
Token Ring (802.5)
Application Proxy vs. Circuit Level
19. Type of topology where computers all are connected to each other - which provides redundancy.
Commonly used in Ethernet.
Commonly used in Internet.
10baseT
Classless inter-domain routing (CIDR)
20. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
SOCKS Firewall
Network Address Translator (NAT)
Blue Boxing
Port Numbers
21. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Attenuation
Token Passing
Wired Equivalent Privacy (WEP)
Proxy Firewall
22. Both directions - only one application can send information at a time
Fiber-optic Cables
T3
Half-Duplex
OSI Layer 1: Physical
23. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Packet Filtering Firewall
Attenuation
IPv6
Packet Switching
24. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
T3
Frame Relay
SOCKS Firewall
Synchronous Communication
25. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Frequency Hopping Spread Spectrum (FHSS)
Temporal Key Integrity Protocol (TKIP)
802.11b
T1
26. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Ring Topology
Commonly used in FDDI.
IPSec
Blue Boxing
27. Wireless communication that distributes individual signals across the allocated frequencies.
Metropolitan Area Network (MAN)
Spread Spectrum
Switched Virtual Circuit (SVC)
Layers in the OSI Model
28. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Commonly used in Ethernet.
DOS attacks from flooding
Application Proxy vs. Circuit Level
Fiber Distributed Data Interface (FDDI)
29. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
High Level Data Link Control (HLDC)
VLAN
Full-Duplex
Definition of Protocol
30. Set of rules that dictates how computer communicate over networks.
Definition of Protocol
Multilevel Switching
Bridge
SPIM
31. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Kernel Proxy Firewall
IGMP
Half-Duplex
Digital Subscriber Line (DSL)
32. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Commonly used in Ethernet.
Circuit Switching
Proxy Firewall
Screened Host Firewall
33. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Wireless Application Protocol (WAP)
Dynamic Packet Filtering
DNS (Domain Name System)
Reverse Address Resolution Protocol (RARP )
34. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
802.11a
Digital Subscriber Line (DSL)
IPSec
Coaxial Cables
35. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Simplex: One direction.
Asynchronous Communication
OSI Data encapsulation
Attenuation
36. This network technology determines which system will send data based on which one has the token.
Synchronous Optical Networks (SONETS)
Classless inter-domain routing (CIDR)
OSI Data encapsulation
Token Passing
37. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
Layers in the TCP/IP Model
Metropolitan Area Network (MAN)
Switched Virtual Circuit (SVC)
38. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
ThinNet - aka 10base2
Dual-Homed Firewall
UDP
39. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
Switched Virtual Circuit (SVC)
Shared Key Authentication (SKA)
Metropolitan Area Network (MAN)
40. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Frame Relay
OSI Data encapsulation
Synchronous Communication
SOCKS Firewall
41. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Coaxial Cables
Virtual Private Network (VPN)
Commonly used in Internet.
802.11b
42. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Bluejacking
OSI Layer 4: Transport Layer
IGMP
ARP Poisoning
43. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Shared Key Authentication (SKA)
Spam over Internet Telephony (SPIT)
Wired Equivalent Privacy (WEP)
Bluejacking
44. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Layers in the TCP/IP Model
Frequency Hopping Spread Spectrum (FHSS)
Attenuation
Layers in the OSI Model
45. Type of firewall that lies between the perimeter router and and LAN.
Screened Host Firewall
Point-To-Point Tunneling Protocol (PPTP)
Password Authentication Protocol (PAP)
Loki Attack
46. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Network Address Translator (NAT)
Permanent Virtual Circuit (PVC)
Spread Spectrum
Dynamic Packet Filtering
47. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
ThickNet - aka 10base5.
Trunk Lines
FDDI-2
Tree Topology
48. Standard that addresses wireless MAN technologies.
Open System Authentication (OSA)
802.16
Kernel Proxy Firewall
OSI Layer 3: Network Layer
49. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Digital Subscriber Line (DSL)
Wireless Application Protocol (WAP)
Frame Relay
Loki Attack
50. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Fiber Distributed Data Interface (FDDI)
Packet Switching
Bridge
Network Address Translator (NAT)