SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Dynamic Packet Filtering
Serial Line Internet Protocol (SLIP)
Point-To-Point Tunneling Protocol (PPTP)
Proxy Firewall
2. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
X.25
Commonly used in FDDI.
FDDI-2
802.11i
3. Type of network layout that is a large geographical region connecting more that one LAN.
Subnetting
Wide Area Network (WAN)
Commonly used in Internet.
X.25
4. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Packet Filtering Firewall
OSI Layer 2: Data Link Layer
Commonly used in logical bus - Ethernet - token ring.
802.11b
5. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
High Level Data Link Control (HLDC)
802.16
Noise
Switched Virtual Circuit (SVC)
6. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Dynamic Packet Filtering
Synchronous Communication
Noise
Proxy Firewall
7. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Fiber Distributed Data Interface (FDDI)
ThickNet - aka 10base5.
Frequency Hopping Spread Spectrum (FHSS)
802.11
8. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
SPIM
Noise
802.11a
Repeaters
9. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
IPSec
Simplex: One direction.
CBC-MAC Protocol (CCMP)
Switch
10. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
IPv6
Multilevel Switching
Dual-Homed Firewall
Challenge Handshake Authentication Protocol (CHAP)
11. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
OSI Data encapsulation
Packet Switching
OSI Layer 6: Presentation
Commonly used in FDDI.
12. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
Metropolitan Area Network (MAN)
UDP
Screened Sub-Net
802.11i
13. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Twisted Pair Cables
Reverse Address Resolution Protocol (RARP )
802.11a
Synchronous Optical Networks (SONETS)
14. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Remote Access Servers
Wireless Application Protocol (WAP)
Spread Spectrum
Iterated Association
15. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Packet Filtering Firewall
Layers in the OSI Model
802.11b
802.11i
16. Type of cabling problem signals from one wire crossing over to another wire.
Layer 2 Tunneling Protocol (L2TP)
Crosstalk
Bluejacking
Trunk Lines
17. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
OSI Layer 7: Application
Crosstalk
Commonly used in FDDI.
Circuit Level Proxy Firewall
18. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
OSI Layer 1: Physical
ThickNet - aka 10base5.
FDDI-2
Circuit Switching
19. Protocol that translates a MAC address into an IP address.
Reverse Address Resolution Protocol (RARP )
Distributed Environment Challenge
Cable Modem
Screened Host Firewall
20. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Packet Filtering Firewall
Cable Modem
Point-To-Point (PPP)
Screened Sub-Net
21. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Wide Area Network (WAN)
IPSec
ARP Poisoning
Multilevel Switching
22. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Commonly used in FDDI.
Multi-protocol Label Switching
DNS (Domain Name System)
Shared Key Authentication (SKA)
23. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Channel Service Unit/Data Service Unit (CSU/DSU)
802.11a
Synchronous Data Link Control (SDLC)
Point-To-Point Tunneling Protocol (PPTP)
24. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Integrated Services Digital Network (ISDN)
T3
OSI Layer 1: Physical
802.15
25. Problems: Central device is a single point of failure.
Star Topology
Direct Sequence Spread Spectrum (DSSS)
OSI Layer 4: Transport Layer
Dynamic Packet Filtering
26. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
VoIP
LLC (Logical Link Control - 802.2)
Stateful Firewall
T1
27. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Virtual Private Network (VPN)
Layers in the TCP/IP Model
Tree Topology
10baseT
28. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Channel Service Unit/Data Service Unit (CSU/DSU)
Private Branch Exchange (PBX)
Simplex: One direction.
Source Routing
29. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Session Initiation Protocol (SIP)
Dedicated Links
Subnetting
Committed Information Rate (CIR)
30. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
DOS attacks from flooding
Kernel Proxy Firewall
Bus Topology
Serial Line Internet Protocol (SLIP)
31. New variant to traditional email spam on VoIP networks.
IPSec
Spam over Internet Telephony (SPIT)
Plenum-rated Cables
Pulse Code Modulation (PCM)
32. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Screened Sub-Net
Fiber Distributed Data Interface (FDDI)
Metropolitan Area Network (MAN)
Network Address Translator (NAT)
33. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Network Address Translator (NAT)
OSI Layer 4: Transport Layer
Layers in the TCP/IP Model
Token Ring (802.5)
34. In a token ring network - each computer is connected to this - which acts as a central hub.
10baseT
Spread Spectrum
Multistation Access Unit (MAU)
Challenge Handshake Authentication Protocol (CHAP)
35. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Commonly used in logical bus - Ethernet - token ring.
Cable Modem
Committed Information Rate (CIR)
Serial Line Internet Protocol (SLIP)
36. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
VLAN
Token Ring (802.5)
ThinNet - aka 10base2
VoIP
37. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Commonly used in Internet.
DOS attacks from flooding
Switched Virtual Circuit (SVC)
802.11a
38. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Token Ring (802.5)
CBC-MAC Protocol (CCMP)
T1
Coaxial Cables
39. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Packet Switching
DOS attacks from flooding
Half-Duplex
Wireless Application Protocol (WAP)
40. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
Virtual Private Network (VPN)
X.25
VLAN
41. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Switched Virtual Circuit (SVC)
Point-To-Point Tunneling Protocol (PPTP)
Circuit Switching
Synchronous Communication
42. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Kernel Proxy Firewall
Distributed Environment Challenge
OSI Layer 6: Presentation
Virtual Private Network (VPN)
43. Set of rules that dictates how computer communicate over networks.
Dynamic Packet Filtering
OSI Layer 5: Session Layer
Definition of Protocol
Metropolitan Area Network (MAN)
44. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
OSI Layer 1: Physical
Commonly used in FDDI.
Permanent Virtual Circuit (PVC)
Iterated Association
45. SMTP server that is configured for sending email from any source to and destination.
IPSec
Bluejacking
Open Relay
Full-Duplex
46. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Dedicated Links
Iterated Association
Metropolitan Area Network (MAN)
Permanent Virtual Circuit (PVC)
47. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Proxy Firewall Strengths
Password Authentication Protocol (PAP)
Extensible Authentication Protocol (EAP)
Commonly used in FDDI.
48. Identifys a WLAN. Can be used to segment environments into different WLANS.
Dedicated Links
Service Set ID (SSID)
Password Authentication Protocol (PAP)
Wireless Application Protocol (WAP)
49. In the OSI layer 5 - these are the types of what?
Multilevel Switching
Integrated Services Digital Network (ISDN)
Private Branch Exchange (PBX)
Simplex: One direction.
50. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Router
Packet Filtering Firewall
OSI Layer 4: Transport Layer
Layers in the OSI Model
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests