SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Dynamic Packet Filtering
Loki Attack
Star Topology
Virtual Private Network (VPN)
2. In a token ring network - each computer is connected to this - which acts as a central hub.
TCP
OSI Layer 6: Presentation
Multistation Access Unit (MAU)
Asynchronous Transfer Mode (ATM)
3. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
SOCKS Firewall
Dual-Homed Firewall
Integrated Services Digital Network (ISDN)
Dedicated Links
4. Malware attack that sends commands inside of an ICMP packet.
Digital Subscriber Line (DSL)
OSI Layer 3: Network Layer
Loki Attack
Synchronous Communication
5. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Proxy Firewall
Commonly used in FDDI.
VoIP
TCP
6. Communication devices that determine synchronization scheme before data transmission.
Network Address Translator (NAT)
Packet Switching
Synchronous Communication
Screened Host Firewall
7. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Serial Line Internet Protocol (SLIP)
Isochronous Communication Processes
Bastion Host
Attenuation
8. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Distributed Environment Challenge
LLC (Logical Link Control - 802.2)
Token Passing
Subnetting
9. Type of topology where computers all are connected to each other - which provides redundancy.
OSI Layer 7: Application
Commonly used in Internet.
Bastion Host
Multi-protocol Label Switching
10. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Network Address Translator (NAT)
Kernel Proxy Firewall
Point-To-Point (PPP)
Spam over Internet Telephony (SPIT)
11. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Wide Area Network (WAN)
802.16
DNS (Domain Name System)
Private Branch Exchange (PBX)
12. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
T1
Serial Line Internet Protocol (SLIP)
Commonly used in FDDI.
Multilevel Switching
13. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Plenum-rated Cables
Repeaters
Loki Attack
Asynchronous Communication
14. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Synchronous Data Link Control (SDLC)
Serial Line Internet Protocol (SLIP)
ARP (Address Resolution Protocol)
Loki Attack
15. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
High Level Data Link Control (HLDC)
ARP (Address Resolution Protocol)
Bus Topology
ThinNet - aka 10base2
16. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
T3
Proxy Firewall
Kernel Proxy Firewall
SOCKS Firewall
17. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
Integrated Services Digital Network (ISDN)
T3
Crosstalk
X.25
18. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
OSI Layer 6: Presentation
Frame Relay
OSI Layer 2: Data Link Layer
Dedicated Links
19. Both directions - both applications can send information at a time. Session Layer Communication Modes
Challenge Handshake Authentication Protocol (CHAP)
Full-Duplex
Wireless Application Protocol (WAP)
High Level Data Link Control (HLDC)
20. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
10baseT
Temporal Key Integrity Protocol (TKIP)
LLC (Logical Link Control - 802.2)
Bus Topology
21. Network segment name for a DMZ created by two physical firewalls.
Commonly used in Ethernet.
Synchronous Optical Networks (SONETS)
Screened Sub-Net
Temporal Key Integrity Protocol (TKIP)
22. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Commonly used in logical bus - Ethernet - token ring.
Commonly used in FDDI.
Remote Access Servers
Tree Topology
23. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Challenge Handshake Authentication Protocol (CHAP)
X.25
Service Set ID (SSID)
Fiber-optic Cables
24. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Layers in the TCP/IP Model
Iterated Association
DOS attacks from flooding
Synchronous Data Link Control (SDLC)
25. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
OSI Layer 7: Application
Crosstalk
Classless inter-domain routing (CIDR)
Trunk Lines
26. Problems: Central device is a single point of failure.
Wireless Application Protocol (WAP)
Multilevel Switching
Star Topology
ARP Poisoning
27. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Blue Boxing
Dynamic Packet Filtering
Ring Topology
VoIP
28. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
OSI Layer 5: Session Layer
Service Set ID (SSID)
Commonly used in logical bus - Ethernet - token ring.
Asynchronous Communication
29. Both directions - only one application can send information at a time
Half-Duplex
Noise
Mesh Topology
Asynchronous Communication
30. New variant to traditional email spam on VoIP networks.
Spam over Internet Telephony (SPIT)
Synchronous Communication
IGMP
OSI Layer 7: Application
31. Protocol that increases address size from 32 bits to 128 bits
LLC (Logical Link Control - 802.2)
IPv6
Serial Line Internet Protocol (SLIP)
Star Topology
32. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Private Branch Exchange (PBX)
Bluejacking
Application Proxy Firewall
Password Authentication Protocol (PAP)
33. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Layers in the OSI Model
FDDI-2
Network Address Translator (NAT)
Repeaters
34. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Temporal Key Integrity Protocol (TKIP)
Commonly used in Ethernet.
Attenuation
Service Set ID (SSID)
35. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Source Routing
Application Proxy vs. Circuit Level
Dynamic Packet Filtering
Screened Sub-Net
36. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Ring Topology
Carrier sense multiple access with collision detection (CSMA/CD)
Subnetting
FDDI-2
37. Spam over IM
SPIM
IGMP
Dual-Homed Firewall
Bus Topology
38. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Challenge Handshake Authentication Protocol (CHAP)
Spam over Internet Telephony (SPIT)
Extensible Authentication Protocol (EAP)
Commonly used in FDDI.
39. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Crosstalk
TCP
Committed Information Rate (CIR)
FDDI-2
40. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Classless inter-domain routing (CIDR)
Open System Authentication (OSA)
Application Proxy vs. Circuit Level
Frequency Hopping Spread Spectrum (FHSS)
41. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Attenuation
High Level Data Link Control (HLDC)
Dedicated Links
Switch
42. Wireless standard that will improve security of wireless communication
X.25
802.11i
Private Branch Exchange (PBX)
Fiber-optic Cables
43. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
DOS attacks from flooding
Kernel Proxy Firewall
Plenum-rated Cables
Crosstalk
44. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
UDP
Layer 2 Tunneling Protocol (L2TP)
Integrated Services Digital Network (ISDN)
Point-To-Point Tunneling Protocol (PPTP)
45. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
OSI Layer 1: Physical
Token Ring (802.5)
Commonly used in logical bus - Ethernet - token ring.
TCP
46. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Tree Topology
Classless inter-domain routing (CIDR)
LLC (Logical Link Control - 802.2)
Spam over Internet Telephony (SPIT)
47. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Cable Modem
OSI Layer 3: Network Layer
Router
Star Topology
48. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Bus Topology
Direct Sequence Spread Spectrum (DSSS)
VoIP
OSI Layer 3: Network Layer
49. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Half-Duplex
Fiber Distributed Data Interface (FDDI)
Subnetting
Mesh Topology
50. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Channel Service Unit/Data Service Unit (CSU/DSU)
Screened Host Firewall
Crosstalk
Loki Attack