SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Proxy Firewall
Extensible Authentication Protocol (EAP)
Plenum-rated Cables
Multi-protocol Label Switching
2. Wireless communication that distributes individual signals across the allocated frequencies.
Bridge
Asynchronous Communication
Layers in the TCP/IP Model
Spread Spectrum
3. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
802.11i
Port Numbers
Noise
Permanent Virtual Circuit (PVC)
4. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Extensible Authentication Protocol (EAP)
IPv6
10baseT
Isochronous Communication Processes
5. Protocol that increases address size from 32 bits to 128 bits
802.11
Noise
Integrated Services Digital Network (ISDN)
IPv6
6. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
ICMP (Internet Control Message Protocol)
Token Passing
Plenum-rated Cables
Frame Relay
7. Problems: Central device is a single point of failure.
Star Topology
Extensible Authentication Protocol (EAP)
Loki Attack
Network Address Translator (NAT)
8. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
Challenge Handshake Authentication Protocol (CHAP)
OSI Layer 7: Application
IPv6
Fiber-optic Cables
9. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Point-To-Point Tunneling Protocol (PPTP)
Bluejacking
Channel Service Unit/Data Service Unit (CSU/DSU)
Spread Spectrum
10. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Simplex: One direction.
Asynchronous Transfer Mode (ATM)
Proxy Firewall
Pulse Code Modulation (PCM)
11. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Permanent Virtual Circuit (PVC)
Wide Area Network (WAN)
Ethernet (802.3)
Simplex: One direction.
12. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
Synchronous Optical Networks (SONETS)
OSI Layer 6: Presentation
Shared Key Authentication (SKA)
Application Proxy vs. Circuit Level
13. Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.
DNS (Domain Name System)
CBC-MAC Protocol (CCMP)
Integrated Services Digital Network (ISDN)
Synchronous Communication
14. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Commonly used in Internet.
Iterated Association
Serial Line Internet Protocol (SLIP)
Tree Topology
15. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Point-To-Point (PPP)
ThickNet - aka 10base5.
Kernel Proxy Firewall
10baseT
16. Standard that addresses wireless MAN technologies.
802.15
802.11b
802.16
Application Proxy vs. Circuit Level
17. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Source Routing
Fiber Distributed Data Interface (FDDI)
T1
Commonly used in logical bus - Ethernet - token ring.
18. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Application Proxy Firewall
Tree Topology
Commonly used in logical bus - Ethernet - token ring.
Dynamic Packet Filtering
19. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Challenge Handshake Authentication Protocol (CHAP)
Commonly used in Ethernet.
Screened Sub-Net
ARP (Address Resolution Protocol)
20. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Channel Service Unit/Data Service Unit (CSU/DSU)
Proxy Firewall
Fiber-optic Cables
Simplex: One direction.
21. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Synchronous Optical Networks (SONETS)
Temporal Key Integrity Protocol (TKIP)
Bridge
Carrier sense multiple access with collision detection (CSMA/CD)
22. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
802.11b
Packet Switching
OSI Layer 7: Application
Application Proxy vs. Circuit Level
23. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
T1
Channel Service Unit/Data Service Unit (CSU/DSU)
Distributed Environment Challenge
24. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
Layers in the OSI Model
DOS attacks from flooding
Router
OSI Layer 3: Network Layer
25. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Port Numbers
Token Ring (802.5)
High Level Data Link Control (HLDC)
Packet Filtering Firewall
26. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Cable Modem
Coaxial Cables
Open Relay
DNS (Domain Name System)
27. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Remote Access Servers
Carrier sense multiple access with collision detection (CSMA/CD)
Private Branch Exchange (PBX)
IPSec
28. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Twisted Pair Cables
DOS attacks from flooding
OSI Layer 1: Physical
802.11a
29. Type of topology where computers all are connected to each other - which provides redundancy.
Packet Filtering Firewall
DNS (Domain Name System)
Commonly used in Internet.
Circuit Level Proxy Firewall
30. Type of cabling problem signals from one wire crossing over to another wire.
Reverse Address Resolution Protocol (RARP )
Dedicated Links
Packet Filtering Firewall
Crosstalk
31. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Half-Duplex
VoIP
Coaxial Cables
VLAN
32. Type of firewall that lies between the perimeter router and and LAN.
Half-Duplex
OSI Layer 6: Presentation
Temporal Key Integrity Protocol (TKIP)
Screened Host Firewall
33. Both directions - only one application can send information at a time
OSI Layer 3: Network Layer
Subnetting
Half-Duplex
Simplex: One direction.
34. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Application Proxy Firewall
Committed Information Rate (CIR)
Token Passing
Dynamic Packet Filtering
35. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
802.11b
Carrier sense multiple access with collision detection (CSMA/CD)
Fiber Distributed Data Interface (FDDI)
Trunk Lines
36. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Proxy Firewall
Synchronous Data Link Control (SDLC)
Twisted Pair Cables
Commonly used in logical bus - Ethernet - token ring.
37. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Wired Equivalent Privacy (WEP)
802.15
Asynchronous Transfer Mode (ATM)
Extensible Authentication Protocol (EAP)
38. Network segment name for a DMZ created by two physical firewalls.
Screened Sub-Net
Packet Filtering Firewall
Loki Attack
OSI Layer 5: Session Layer
39. Malware attack that sends commands inside of an ICMP packet.
Asynchronous Transfer Mode (ATM)
Application Proxy vs. Circuit Level
Simplex: One direction.
Loki Attack
40. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Ring Topology
Attenuation
Screened Host Firewall
Full-Duplex
41. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Layers in the OSI Model
Crosstalk
Token Passing
Star Topology
42. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
T3
Permanent Virtual Circuit (PVC)
FDDI-2
Token Ring (802.5)
43. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Digital Subscriber Line (DSL)
Direct Sequence Spread Spectrum (DSSS)
Frame Relay
802.11b
44. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Session Initiation Protocol (SIP)
TCP
Password Authentication Protocol (PAP)
X.25
45. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Router
Stateful Firewall
Noise
Wired Equivalent Privacy (WEP)
46. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Temporal Key Integrity Protocol (TKIP)
Service Set ID (SSID)
Packet Filtering Firewall
Circuit Switching
47. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Open Relay
Spread Spectrum
Cable Modem
VLAN
48. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
High Level Data Link Control (HLDC)
OSI Layer 5: Session Layer
Commonly used in Ethernet.
Frame Relay
49. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Bus Topology
Layers in the TCP/IP Model
Application Proxy Firewall
Half-Duplex
50. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Asynchronous Communication
Wide Area Network (WAN)
X.25
Repeaters