SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
SOCKS Firewall
Integrated Services Digital Network (ISDN)
Full-Duplex
OSI Layer 1: Physical
2. In the OSI layer 5 - these are the types of what?
802.11b
Simplex: One direction.
Frame Relay
Point-To-Point Tunneling Protocol (PPTP)
3. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
T3
Cable Modem
Dynamic Packet Filtering
Subnetting
4. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Layers in the OSI Model
SPIM
Bus Topology
Challenge Handshake Authentication Protocol (CHAP)
5. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Fiber-optic Cables
IGMP
Commonly used in Ethernet.
Port Numbers
6. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Asynchronous Communication
Trunk Lines
Subnetting
ARP Poisoning
7. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
T3
802.15
IPv6
Application Proxy Firewall
8. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
ThickNet - aka 10base5.
Layers in the TCP/IP Model
Ring Topology
High Level Data Link Control (HLDC)
9. Wireless standard that will improve security of wireless communication
802.11i
Password Authentication Protocol (PAP)
Twisted Pair Cables
Noise
10. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
High Level Data Link Control (HLDC)
Distributed Environment Challenge
Asynchronous Transfer Mode (ATM)
ICMP (Internet Control Message Protocol)
11. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Carrier sense multiple access with collision detection (CSMA/CD)
Virtual Private Network (VPN)
ICMP (Internet Control Message Protocol)
Session Initiation Protocol (SIP)
12. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Pulse Code Modulation (PCM)
Direct Sequence Spread Spectrum (DSSS)
802.11b
Point-To-Point Tunneling Protocol (PPTP)
13. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Router
Spread Spectrum
Packet Filtering Firewall
Bastion Host
14. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
ThinNet - aka 10base2
UDP
Application Proxy vs. Circuit Level
Switch
15. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Kernel Proxy Firewall
Digital Subscriber Line (DSL)
Channel Service Unit/Data Service Unit (CSU/DSU)
10baseT
16. SMTP server that is configured for sending email from any source to and destination.
802.11b
Stateful Firewall
OSI Layer 3: Network Layer
Open Relay
17. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Plenum-rated Cables
Noise
OSI Layer 7: Application
802.11b
18. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
ARP (Address Resolution Protocol)
Attenuation
Reverse Address Resolution Protocol (RARP )
Blue Boxing
19. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Attenuation
OSI Layer 3: Network Layer
OSI Layer 7: Application
Multistation Access Unit (MAU)
20. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
OSI Data encapsulation
Reverse Address Resolution Protocol (RARP )
802.16
Open System Authentication (OSA)
21. Type of wireless security standard that uses AES in CBC mode.
Bastion Host
Screened Host Firewall
CBC-MAC Protocol (CCMP)
Multilevel Switching
22. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
802.11i
Distributed Environment Challenge
OSI Layer 6: Presentation
Iterated Association
23. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Bluejacking
Wired Equivalent Privacy (WEP)
T1
T3
24. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Ring Topology
Multistation Access Unit (MAU)
T3
Bus Topology
25. Problems: Central device is a single point of failure.
Synchronous Optical Networks (SONETS)
OSI Layer 1: Physical
Wireless Application Protocol (WAP)
Star Topology
26. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Wireless Application Protocol (WAP)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Dual-Homed Firewall
Asynchronous Communication
27. Spam over IM
SPIM
Isochronous Communication Processes
IGMP
SOCKS Firewall
28. Communication devices that determine synchronization scheme before data transmission.
Synchronous Communication
Tree Topology
802.16
Commonly used in Internet.
29. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
DOS attacks from flooding
Commonly used in Ethernet.
Open System Authentication (OSA)
ARP (Address Resolution Protocol)
30. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Commonly used in Internet.
Stateful Firewall
Circuit Level Proxy Firewall
Wide Area Network (WAN)
31. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
OSI Layer 5: Session Layer
Asynchronous Transfer Mode (ATM)
Commonly used in Internet.
Digital Subscriber Line (DSL)
32. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Fiber Distributed Data Interface (FDDI)
Metropolitan Area Network (MAN)
Synchronous Data Link Control (SDLC)
OSI Layer 6: Presentation
33. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
T1
SPIM
Service Set ID (SSID)
Challenge Handshake Authentication Protocol (CHAP)
34. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Proxy Firewall Strengths
Ring Topology
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Network Address Translator (NAT)
35. New variant to traditional email spam on VoIP networks.
Commonly used in Ethernet.
Metropolitan Area Network (MAN)
Virtual Private Network (VPN)
Spam over Internet Telephony (SPIT)
36. Set of rules that dictates how computer communicate over networks.
Proxy Firewall Strengths
Definition of Protocol
802.15
Attenuation
37. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Definition of Protocol
LLC (Logical Link Control - 802.2)
Circuit Level Proxy Firewall
Metropolitan Area Network (MAN)
38. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Password Authentication Protocol (PAP)
Packet Filtering Firewall
Bus Topology
Twisted Pair Cables
39. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
ThickNet - aka 10base5.
Asynchronous Communication
Subnetting
Router
40. Wireless communication that distributes individual signals across the allocated frequencies.
Bastion Host
Classless inter-domain routing (CIDR)
Spread Spectrum
Bus Topology
41. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Cable Modem
Switched Virtual Circuit (SVC)
IPSec
Serial Line Internet Protocol (SLIP)
42. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
T3
Token Passing
Router
ThinNet - aka 10base2
43. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Coaxial Cables
OSI Layer 4: Transport Layer
Iterated Association
OSI Layer 5: Session Layer
44. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Plenum-rated Cables
Full-Duplex
ARP Poisoning
Synchronous Data Link Control (SDLC)
45. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Token Ring (802.5)
Private Branch Exchange (PBX)
Proxy Firewall
Simplex: One direction.
46. Network segment name for a DMZ created by two physical firewalls.
Multilevel Switching
Spread Spectrum
Screened Sub-Net
LLC (Logical Link Control - 802.2)
47. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
OSI Layer 6: Presentation
Coaxial Cables
Simplex: One direction.
VoIP
48. Protocol for allowing multi-cast (one to many) communication
X.25
Packet Filtering Firewall
IGMP
Shared Key Authentication (SKA)
49. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
VoIP
Dual-Homed Firewall
Pulse Code Modulation (PCM)
Classless inter-domain routing (CIDR)
50. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
ThinNet - aka 10base2
Twisted Pair Cables
Switched Virtual Circuit (SVC)
Synchronous Communication