SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
802.11a
Point-To-Point (PPP)
Isochronous Communication Processes
Session Initiation Protocol (SIP)
2. Protocol that increases address size from 32 bits to 128 bits
IPv6
Crosstalk
Screened Host Firewall
Carrier sense multiple access with collision detection (CSMA/CD)
3. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
T1
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
OSI Layer 2: Data Link Layer
Synchronous Optical Networks (SONETS)
4. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Open Relay
ThinNet - aka 10base2
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Open System Authentication (OSA)
5. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Synchronous Data Link Control (SDLC)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Dynamic Packet Filtering
Tree Topology
6. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Synchronous Data Link Control (SDLC)
Wide Area Network (WAN)
Bluejacking
Bridge
7. Spam over IM
SPIM
Multistation Access Unit (MAU)
Remote Access Servers
IPSec
8. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
ICMP (Internet Control Message Protocol)
OSI Data encapsulation
Proxy Firewall Strengths
Direct Sequence Spread Spectrum (DSSS)
9. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
Proxy Firewall
Twisted Pair Cables
FDDI-2
10. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
OSI Layer 4: Transport Layer
VLAN
OSI Layer 7: Application
Open Relay
11. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Token Ring (802.5)
Asynchronous Transfer Mode (ATM)
Subnetting
Multistation Access Unit (MAU)
12. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Pulse Code Modulation (PCM)
Commonly used in Internet.
Ethernet (802.3)
Cable Modem
13. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Bastion Host
802.15
UDP
T1
14. Type of network layout that separates and group computers logically.
Token Ring (802.5)
Synchronous Data Link Control (SDLC)
VLAN
Commonly used in Ethernet.
15. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Dynamic Packet Filtering
Point-To-Point Tunneling Protocol (PPTP)
Cable Modem
UDP
16. Protocol for allowing multi-cast (one to many) communication
Carrier sense multiple access with collision detection (CSMA/CD)
IGMP
Fiber Distributed Data Interface (FDDI)
Switched Virtual Circuit (SVC)
17. SMTP server that is configured for sending email from any source to and destination.
Open Relay
Packet Filtering Firewall
ARP Poisoning
Channel Service Unit/Data Service Unit (CSU/DSU)
18. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Point-To-Point Tunneling Protocol (PPTP)
FDDI-2
Asynchronous Communication
802.11
19. Wireless standard that will improve security of wireless communication
Plenum-rated Cables
802.11i
Frame Relay
Kernel Proxy Firewall
20. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
VoIP
Synchronous Data Link Control (SDLC)
Direct Sequence Spread Spectrum (DSSS)
Multilevel Switching
21. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Blue Boxing
Remote Access Servers
ARP (Address Resolution Protocol)
Session Initiation Protocol (SIP)
22. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
Bridge
Coaxial Cables
Commonly used in logical bus - Ethernet - token ring.
23. Type of topology where computers all are connected to each other - which provides redundancy.
Packet Filtering Firewall
Multilevel Switching
Commonly used in Internet.
ARP Poisoning
24. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Layer 2 Tunneling Protocol (L2TP)
Fiber-optic Cables
CBC-MAC Protocol (CCMP)
Cable Modem
25. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
ARP Poisoning
Ring Topology
Service Set ID (SSID)
Bus Topology
26. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Multistation Access Unit (MAU)
Subnetting
Shared Key Authentication (SKA)
Open Relay
27. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Fiber Distributed Data Interface (FDDI)
SOCKS Firewall
Commonly used in Internet.
Challenge Handshake Authentication Protocol (CHAP)
28. Communication devices that determine synchronization scheme before data transmission.
Repeaters
Synchronous Communication
Password Authentication Protocol (PAP)
Multilevel Switching
29. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Dynamic Packet Filtering
Circuit Switching
Temporal Key Integrity Protocol (TKIP)
10baseT
30. Malware attack that sends commands inside of an ICMP packet.
Circuit Switching
Loki Attack
Carrier sense multiple access with collision detection (CSMA/CD)
Open System Authentication (OSA)
31. In the OSI layer 5 - these are the types of what?
Metropolitan Area Network (MAN)
LLC (Logical Link Control - 802.2)
Commonly used in logical bus - Ethernet - token ring.
Simplex: One direction.
32. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
T3
Commonly used in Ethernet.
Multistation Access Unit (MAU)
Private Branch Exchange (PBX)
33. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
SOCKS Firewall
Commonly used in logical bus - Ethernet - token ring.
Asynchronous Communication
Circuit Switching
34. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
ThinNet - aka 10base2
Switch
Port Numbers
ThickNet - aka 10base5.
35. Type of network layout that is a large geographical region connecting more that one LAN.
Application Proxy vs. Circuit Level
Wide Area Network (WAN)
Isochronous Communication Processes
Bluejacking
36. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Challenge Handshake Authentication Protocol (CHAP)
Digital Subscriber Line (DSL)
IPv6
OSI Layer 1: Physical
37. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Bus Topology
Tree Topology
Stateful Firewall
Asynchronous Transfer Mode (ATM)
38. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Wide Area Network (WAN)
CBC-MAC Protocol (CCMP)
Dedicated Links
Classless inter-domain routing (CIDR)
39. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Shared Key Authentication (SKA)
Session Initiation Protocol (SIP)
Subnetting
FDDI-2
40. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
802.15
DOS attacks from flooding
Frame Relay
Open System Authentication (OSA)
41. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Bus Topology
Loki Attack
802.11
Attenuation
42. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Application Proxy vs. Circuit Level
OSI Layer 6: Presentation
Asynchronous Transfer Mode (ATM)
ARP Poisoning
43. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
OSI Layer 2: Data Link Layer
802.11
Multi-protocol Label Switching
Challenge Handshake Authentication Protocol (CHAP)
44. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Bluejacking
Cable Modem
OSI Layer 2: Data Link Layer
Password Authentication Protocol (PAP)
45. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Open System Authentication (OSA)
Classless inter-domain routing (CIDR)
Distributed Environment Challenge
Open Relay
46. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Iterated Association
Bus Topology
Synchronous Optical Networks (SONETS)
Extensible Authentication Protocol (EAP)
47. In a token ring network - each computer is connected to this - which acts as a central hub.
Multistation Access Unit (MAU)
Proxy Firewall
802.15
ThinNet - aka 10base2
48. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Multistation Access Unit (MAU)
IGMP
Reverse Address Resolution Protocol (RARP )
Wireless Application Protocol (WAP)
49. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
IGMP
Wired Equivalent Privacy (WEP)
High Level Data Link Control (HLDC)
Reverse Address Resolution Protocol (RARP )
50. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
OSI Layer 4: Transport Layer
Bridge
Twisted Pair Cables
Application Proxy Firewall