SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Stateful Firewall
Star Topology
Circuit Level Proxy Firewall
802.11a
2. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Bus Topology
Remote Access Servers
ICMP (Internet Control Message Protocol)
Kernel Proxy Firewall
3. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Synchronous Communication
Synchronous Optical Networks (SONETS)
Switch
DNS (Domain Name System)
4. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Fiber Distributed Data Interface (FDDI)
OSI Layer 1: Physical
802.16
Layers in the OSI Model
5. Set of rules that dictates how computer communicate over networks.
Password Authentication Protocol (PAP)
Definition of Protocol
802.11i
Asynchronous Transfer Mode (ATM)
6. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Virtual Private Network (VPN)
Channel Service Unit/Data Service Unit (CSU/DSU)
802.11a
Token Ring (802.5)
7. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Metropolitan Area Network (MAN)
Private Branch Exchange (PBX)
Commonly used in logical bus - Ethernet - token ring.
Frame Relay
8. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Bus Topology
Crosstalk
Kernel Proxy Firewall
Point-To-Point (PPP)
9. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
Cable Modem
ThinNet - aka 10base2
Proxy Firewall
Spread Spectrum
10. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Bluejacking
OSI Layer 3: Network Layer
Frame Relay
802.11
11. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Frame Relay
Permanent Virtual Circuit (PVC)
LLC (Logical Link Control - 802.2)
Loki Attack
12. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Source Routing
Reverse Address Resolution Protocol (RARP )
X.25
Password Authentication Protocol (PAP)
13. Both directions - only one application can send information at a time
Carrier sense multiple access with collision detection (CSMA/CD)
Spread Spectrum
Half-Duplex
Screened Host Firewall
14. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Network Address Translator (NAT)
X.25
OSI Data encapsulation
TCP
15. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Star Topology
Wireless Application Protocol (WAP)
Mesh Topology
FDDI-2
16. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Integrated Services Digital Network (ISDN)
Source Routing
Port Numbers
DOS attacks from flooding
17. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Asynchronous Communication
Multilevel Switching
Attenuation
Mesh Topology
18. Provides high-speed access - up to 50 Mbps - to the Internet through existing cable coaxial and fiber lines. Major security concern is the fact that neighbors use the same coaxial network and can monitor each others traffic.
Virtual Private Network (VPN)
Cable Modem
Frame Relay
Commonly used in Ethernet.
19. Spam over IM
SPIM
Synchronous Data Link Control (SDLC)
OSI Layer 1: Physical
Virtual Private Network (VPN)
20. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
Full-Duplex
802.11b
Isochronous Communication Processes
21. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Multi-protocol Label Switching
Commonly used in Ethernet.
Multistation Access Unit (MAU)
Loki Attack
22. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Temporal Key Integrity Protocol (TKIP)
Integrated Services Digital Network (ISDN)
FDDI-2
Tree Topology
23. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Token Ring (802.5)
IPSec
Source Routing
Virtual Private Network (VPN)
24. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
Dynamic Packet Filtering
Asynchronous Communication
Point-To-Point (PPP)
25. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
SOCKS Firewall
802.11a
Proxy Firewall Strengths
Fiber Distributed Data Interface (FDDI)
26. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Noise
Isochronous Communication Processes
UDP
Multilevel Switching
27. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Extensible Authentication Protocol (EAP)
VLAN
Pulse Code Modulation (PCM)
Circuit Level Proxy Firewall
28. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Commonly used in FDDI.
Dedicated Links
Layers in the TCP/IP Model
OSI Layer 4: Transport Layer
29. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Direct Sequence Spread Spectrum (DSSS)
Synchronous Data Link Control (SDLC)
Bus Topology
ARP (Address Resolution Protocol)
30. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Spread Spectrum
Shared Key Authentication (SKA)
Coaxial Cables
Network Address Translator (NAT)
31. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Bridge
T3
Classless inter-domain routing (CIDR)
DNS (Domain Name System)
32. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Circuit Switching
Point-To-Point Tunneling Protocol (PPTP)
LLC (Logical Link Control - 802.2)
Temporal Key Integrity Protocol (TKIP)
33. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Application Proxy vs. Circuit Level
Private Branch Exchange (PBX)
Commonly used in Internet.
Network Address Translator (NAT)
34. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Direct Sequence Spread Spectrum (DSSS)
ThickNet - aka 10base5.
Network Address Translator (NAT)
Pulse Code Modulation (PCM)
35. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
OSI Layer 7: Application
Direct Sequence Spread Spectrum (DSSS)
Virtual Private Network (VPN)
VLAN
36. Type of topology where computers all are connected to each other - which provides redundancy.
Bridge
SOCKS Firewall
Temporal Key Integrity Protocol (TKIP)
Commonly used in Internet.
37. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
FDDI-2
Bluejacking
Full-Duplex
Dynamic Packet Filtering
38. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Packet Switching
Bastion Host
Trunk Lines
Coaxial Cables
39. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Distributed Environment Challenge
T1
Bridge
Private Branch Exchange (PBX)
40. Type of firewall that Inspects incoming/outgoing messages for malicious information. If approved - transfers an isolated copy from one network to another. 2nd generation firewall.
Stateful Firewall
Proxy Firewall
Open Relay
Password Authentication Protocol (PAP)
41. Problems: Central device is a single point of failure.
802.11a
IGMP
ARP Poisoning
Star Topology
42. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
IGMP
LLC (Logical Link Control - 802.2)
Noise
Integrated Services Digital Network (ISDN)
43. Type of firewall that uses a proxy for each service and can understand and make decisions on the protocols used and the commands within those protocols - runs at the application layer.
Application Proxy Firewall
Wide Area Network (WAN)
Plenum-rated Cables
Ring Topology
44. Network segment name for a DMZ created by two physical firewalls.
Screened Sub-Net
Wireless Application Protocol (WAP)
Router
Bastion Host
45. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
OSI Data encapsulation
UDP
Simplex: One direction.
Kernel Proxy Firewall
46. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
High Level Data Link Control (HLDC)
Repeaters
Proxy Firewall
T1
47. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Screened Host Firewall
OSI Layer 2: Data Link Layer
TCP
Multilevel Switching
48. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Commonly used in FDDI.
Proxy Firewall Strengths
Asynchronous Communication
Fiber-optic Cables
49. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Permanent Virtual Circuit (PVC)
802.11a
X.25
Source Routing
50. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
CBC-MAC Protocol (CCMP)
Serial Line Internet Protocol (SLIP)
Twisted Pair Cables
Star Topology