SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Classless inter-domain routing (CIDR)
Multistation Access Unit (MAU)
Cable Modem
Fiber Distributed Data Interface (FDDI)
2. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Multi-protocol Label Switching
SOCKS Firewall
802.11
Crosstalk
3. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Switched Virtual Circuit (SVC)
Private Branch Exchange (PBX)
Wireless Application Protocol (WAP)
Layers in the TCP/IP Model
4. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
OSI Data encapsulation
Dynamic Packet Filtering
ICMP (Internet Control Message Protocol)
Star Topology
5. Wireless communication that distributes individual signals across the allocated frequencies.
Commonly used in Internet.
Spread Spectrum
Attenuation
Kernel Proxy Firewall
6. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Spread Spectrum
Switched Virtual Circuit (SVC)
Bastion Host
OSI Data encapsulation
7. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
SPIM
Open System Authentication (OSA)
Direct Sequence Spread Spectrum (DSSS)
ARP (Address Resolution Protocol)
8. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
ARP Poisoning
Pulse Code Modulation (PCM)
VLAN
Repeaters
9. Wireless standard that will improve security of wireless communication
Proxy Firewall
OSI Layer 7: Application
802.11i
Coaxial Cables
10. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
802.11i
Crosstalk
Point-To-Point (PPP)
11. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
Trunk Lines
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Commonly used in Ethernet.
12. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Full-Duplex
Crosstalk
IPSec
CBC-MAC Protocol (CCMP)
13. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Application Proxy Firewall
ThinNet - aka 10base2
802.15
Dual-Homed Firewall
14. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Metropolitan Area Network (MAN)
Twisted Pair Cables
802.15
Asynchronous Communication
15. Protocol that increases address size from 32 bits to 128 bits
IPv6
SOCKS Firewall
Permanent Virtual Circuit (PVC)
Commonly used in logical bus - Ethernet - token ring.
16. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
UDP
DNS (Domain Name System)
SOCKS Firewall
OSI Data encapsulation
17. Protocol that translates a MAC address into an IP address.
Dual-Homed Firewall
Synchronous Communication
Direct Sequence Spread Spectrum (DSSS)
Reverse Address Resolution Protocol (RARP )
18. Malware attack that sends commands inside of an ICMP packet.
802.11b
Loki Attack
OSI Layer 7: Application
Private Branch Exchange (PBX)
19. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
IPv6
OSI Layer 1: Physical
802.16
X.25
20. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Star Topology
Extensible Authentication Protocol (EAP)
Application Proxy Firewall
ThinNet - aka 10base2
21. Protocol for allowing multi-cast (one to many) communication
Dedicated Links
X.25
IGMP
Coaxial Cables
22. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
ICMP (Internet Control Message Protocol)
Packet Filtering Firewall
802.15
Iterated Association
23. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Fiber-optic Cables
Layers in the TCP/IP Model
Permanent Virtual Circuit (PVC)
Packet Filtering Firewall
24. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
802.11b
OSI Data encapsulation
TCP
Wireless Application Protocol (WAP)
25. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
OSI Layer 6: Presentation
802.11
Bluejacking
Subnetting
26. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Token Passing
Temporal Key Integrity Protocol (TKIP)
Open Relay
Commonly used in Internet.
27. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
IGMP
Source Routing
Trunk Lines
VoIP
28. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Bastion Host
Channel Service Unit/Data Service Unit (CSU/DSU)
802.15
Commonly used in logical bus - Ethernet - token ring.
29. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
802.11a
Challenge Handshake Authentication Protocol (CHAP)
Wide Area Network (WAN)
Point-To-Point Tunneling Protocol (PPTP)
30. Set of rules that dictates how computer communicate over networks.
Definition of Protocol
Circuit Level Proxy Firewall
Dynamic Packet Filtering
Port Numbers
31. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
802.15
Ring Topology
UDP
Router
32. This network technology determines which system will send data based on which one has the token.
ThinNet - aka 10base2
UDP
Token Passing
Bus Topology
33. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Bluejacking
OSI Layer 3: Network Layer
Dedicated Links
Shared Key Authentication (SKA)
34. Type of firewall that lies between the perimeter router and and LAN.
Wide Area Network (WAN)
Screened Host Firewall
SOCKS Firewall
T3
35. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
OSI Layer 7: Application
Mesh Topology
Temporal Key Integrity Protocol (TKIP)
36. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Channel Service Unit/Data Service Unit (CSU/DSU)
Port Numbers
Open Relay
OSI Layer 2: Data Link Layer
37. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
OSI Layer 7: Application
Committed Information Rate (CIR)
Proxy Firewall
Cable Modem
38. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
TCP
Reverse Address Resolution Protocol (RARP )
Point-To-Point (PPP)
Commonly used in logical bus - Ethernet - token ring.
39. Protocol that translates IP address into a MAC address (physical Ethernet address)
Wired Equivalent Privacy (WEP)
Full-Duplex
ARP (Address Resolution Protocol)
T3
40. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Frequency Hopping Spread Spectrum (FHSS)
Application Proxy Firewall
Layer 2 Tunneling Protocol (L2TP)
Bridge
41. New variant to traditional email spam on VoIP networks.
Spam over Internet Telephony (SPIT)
Session Initiation Protocol (SIP)
Shared Key Authentication (SKA)
Router
42. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Frame Relay
Distributed Environment Challenge
Cable Modem
Half-Duplex
43. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Bus Topology
Circuit Switching
OSI Layer 1: Physical
Noise
44. Communication devices that determine synchronization scheme before data transmission.
Synchronous Communication
Channel Service Unit/Data Service Unit (CSU/DSU)
Circuit Level Proxy Firewall
Packet Filtering Firewall
45. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Classless inter-domain routing (CIDR)
Blue Boxing
10baseT
Layers in the TCP/IP Model
46. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Circuit Switching
Wired Equivalent Privacy (WEP)
Iterated Association
Fiber Distributed Data Interface (FDDI)
47. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Shared Key Authentication (SKA)
Synchronous Data Link Control (SDLC)
Attenuation
Commonly used in Internet.
48. Type of cabling problem signals from one wire crossing over to another wire.
Proxy Firewall Strengths
Packet Switching
Crosstalk
Port Numbers
49. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Remote Access Servers
Application Proxy vs. Circuit Level
Asynchronous Communication
Isochronous Communication Processes
50. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
X.25
Port Numbers
Commonly used in Ethernet.
Repeaters