SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Bridge
Synchronous Optical Networks (SONETS)
Multistation Access Unit (MAU)
Proxy Firewall
2. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Spam over Internet Telephony (SPIT)
Synchronous Data Link Control (SDLC)
Stateful Firewall
Commonly used in Ethernet.
3. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Ring Topology
Permanent Virtual Circuit (PVC)
Extensible Authentication Protocol (EAP)
Classless inter-domain routing (CIDR)
4. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Packet Filtering Firewall
ARP Poisoning
Pulse Code Modulation (PCM)
Ring Topology
5. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Synchronous Data Link Control (SDLC)
LLC (Logical Link Control - 802.2)
IPv6
Application Proxy vs. Circuit Level
6. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
Ethernet (802.3)
SPIM
Asynchronous Communication
7. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Commonly used in Internet.
ARP (Address Resolution Protocol)
Simplex: One direction.
Asynchronous Communication
8. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Packet Filtering Firewall
Plenum-rated Cables
802.11b
Permanent Virtual Circuit (PVC)
9. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Packet Filtering Firewall
Direct Sequence Spread Spectrum (DSSS)
Remote Access Servers
Reverse Address Resolution Protocol (RARP )
10. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
High Level Data Link Control (HLDC)
Screened Sub-Net
Layers in the OSI Model
Open Relay
11. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Private Branch Exchange (PBX)
Packet Switching
Dedicated Links
Asynchronous Transfer Mode (ATM)
12. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Layers in the TCP/IP Model
OSI Layer 1: Physical
OSI Layer 7: Application
Definition of Protocol
13. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
10baseT
Extensible Authentication Protocol (EAP)
Isochronous Communication Processes
Screened Host Firewall
14. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Network Address Translator (NAT)
Iterated Association
DOS attacks from flooding
Password Authentication Protocol (PAP)
15. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Dynamic Packet Filtering
ICMP (Internet Control Message Protocol)
Virtual Private Network (VPN)
Plenum-rated Cables
16. Protocol that increases address size from 32 bits to 128 bits
IPv6
Screened Sub-Net
802.11
Dedicated Links
17. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Circuit Level Proxy Firewall
Asynchronous Transfer Mode (ATM)
Multi-protocol Label Switching
T1
18. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Password Authentication Protocol (PAP)
Shared Key Authentication (SKA)
Bridge
Proxy Firewall
19. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Mesh Topology
UDP
Private Branch Exchange (PBX)
Reverse Address Resolution Protocol (RARP )
20. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Shared Key Authentication (SKA)
Multi-protocol Label Switching
Coaxial Cables
OSI Layer 1: Physical
21. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
OSI Layer 6: Presentation
Subnetting
DNS (Domain Name System)
Multi-protocol Label Switching
22. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Channel Service Unit/Data Service Unit (CSU/DSU)
Network Address Translator (NAT)
Bluejacking
Packet Filtering Firewall
23. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
Synchronous Communication
Blue Boxing
Spam over Internet Telephony (SPIT)
High Level Data Link Control (HLDC)
24. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
OSI Layer 2: Data Link Layer
Multilevel Switching
Channel Service Unit/Data Service Unit (CSU/DSU)
Permanent Virtual Circuit (PVC)
25. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Layer 2 Tunneling Protocol (L2TP)
Mesh Topology
Permanent Virtual Circuit (PVC)
FDDI-2
26. Identifys a WLAN. Can be used to segment environments into different WLANS.
Service Set ID (SSID)
ThinNet - aka 10base2
Bus Topology
Mesh Topology
27. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Ring Topology
Open System Authentication (OSA)
802.16
Spam over Internet Telephony (SPIT)
28. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Carrier sense multiple access with collision detection (CSMA/CD)
Multilevel Switching
Packet Switching
10baseT
29. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
802.11a
10baseT
DOS attacks from flooding
Spam over Internet Telephony (SPIT)
30. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ThinNet - aka 10base2
Point-To-Point Tunneling Protocol (PPTP)
Shared Key Authentication (SKA)
OSI Layer 2: Data Link Layer
31. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
OSI Layer 3: Network Layer
Frame Relay
Commonly used in logical bus - Ethernet - token ring.
Multilevel Switching
32. Standard that addresses wireless MAN technologies.
Frame Relay
Star Topology
Cable Modem
802.16
33. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Ring Topology
Packet Switching
10baseT
Network Address Translator (NAT)
34. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Frame Relay
Repeaters
X.25
Commonly used in FDDI.
35. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Frame Relay
T1
OSI Layer 3: Network Layer
Classless inter-domain routing (CIDR)
36. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
SOCKS Firewall
Temporal Key Integrity Protocol (TKIP)
UDP
Password Authentication Protocol (PAP)
37. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
OSI Layer 7: Application
Dynamic Packet Filtering
Distributed Environment Challenge
Bridge
38. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Commonly used in Internet.
SOCKS Firewall
Synchronous Communication
Source Routing
39. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Twisted Pair Cables
Port Numbers
Digital Subscriber Line (DSL)
Iterated Association
40. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Bluejacking
Circuit Level Proxy Firewall
CBC-MAC Protocol (CCMP)
Multi-protocol Label Switching
41. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Dedicated Links
Reverse Address Resolution Protocol (RARP )
Token Passing
Challenge Handshake Authentication Protocol (CHAP)
42. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Point-To-Point Tunneling Protocol (PPTP)
Synchronous Communication
802.11a
Noise
43. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Plenum-rated Cables
Layers in the TCP/IP Model
Session Initiation Protocol (SIP)
Loki Attack
44. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Serial Line Internet Protocol (SLIP)
Dynamic Packet Filtering
Simplex: One direction.
FDDI-2
45. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Switched Virtual Circuit (SVC)
Classless inter-domain routing (CIDR)
X.25
Shared Key Authentication (SKA)
46. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Synchronous Data Link Control (SDLC)
Fiber Distributed Data Interface (FDDI)
Repeaters
Screened Host Firewall
47. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
Frame Relay
ARP Poisoning
Coaxial Cables
48. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
Point-To-Point Tunneling Protocol (PPTP)
Layers in the TCP/IP Model
Proxy Firewall
49. Wireless standard that will improve security of wireless communication
DOS attacks from flooding
Synchronous Data Link Control (SDLC)
Fiber Distributed Data Interface (FDDI)
802.11i
50. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Port Numbers
802.16
ARP Poisoning
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests