SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
SOCKS Firewall
IPSec
802.11b
Packet Switching
2. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
ThickNet - aka 10base5.
Switch
ICMP (Internet Control Message Protocol)
Commonly used in FDDI.
3. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Classless inter-domain routing (CIDR)
X.25
Packet Filtering Firewall
Circuit Switching
4. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Frame Relay
Twisted Pair Cables
ARP Poisoning
Reverse Address Resolution Protocol (RARP )
5. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
OSI Layer 3: Network Layer
High Level Data Link Control (HLDC)
Twisted Pair Cables
Repeaters
6. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Layers in the TCP/IP Model
Synchronous Optical Networks (SONETS)
Session Initiation Protocol (SIP)
Full-Duplex
7. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Session Initiation Protocol (SIP)
FDDI-2
Packet Filtering Firewall
OSI Layer 6: Presentation
8. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Extensible Authentication Protocol (EAP)
Subnetting
Plenum-rated Cables
Layers in the OSI Model
9. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
802.11i
Permanent Virtual Circuit (PVC)
Commonly used in logical bus - Ethernet - token ring.
Dedicated Links
10. Malware attack that sends commands inside of an ICMP packet.
Packet Filtering Firewall
Loki Attack
Channel Service Unit/Data Service Unit (CSU/DSU)
ARP Poisoning
11. Spam over IM
SPIM
OSI Data encapsulation
CBC-MAC Protocol (CCMP)
Committed Information Rate (CIR)
12. Communication devices that determine synchronization scheme before data transmission.
Synchronous Communication
Point-To-Point (PPP)
10baseT
Challenge Handshake Authentication Protocol (CHAP)
13. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
OSI Layer 4: Transport Layer
Dedicated Links
Frame Relay
Digital Subscriber Line (DSL)
14. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
IPSec
Bus Topology
OSI Data encapsulation
Commonly used in Ethernet.
15. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
OSI Layer 4: Transport Layer
Trunk Lines
Open Relay
OSI Layer 1: Physical
16. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
LLC (Logical Link Control - 802.2)
Bridge
Point-To-Point (PPP)
Synchronous Optical Networks (SONETS)
17. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Coaxial Cables
10baseT
SOCKS Firewall
Synchronous Data Link Control (SDLC)
18. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Kernel Proxy Firewall
Bridge
SOCKS Firewall
Stateful Firewall
19. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
VoIP
Coaxial Cables
Frame Relay
Iterated Association
20. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
Wireless Application Protocol (WAP)
ARP Poisoning
Service Set ID (SSID)
21. Type of cabling problem signals from one wire crossing over to another wire.
OSI Layer 5: Session Layer
Synchronous Optical Networks (SONETS)
CBC-MAC Protocol (CCMP)
Crosstalk
22. Type of firewall that lies between the perimeter router and and LAN.
ARP (Address Resolution Protocol)
Screened Host Firewall
Temporal Key Integrity Protocol (TKIP)
Frame Relay
23. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Twisted Pair Cables
Fiber Distributed Data Interface (FDDI)
Screened Sub-Net
LLC (Logical Link Control - 802.2)
24. Network where a dedicated virtual link is not set up - and packets can use many different dynamic paths to get to the same destination. This causes variable delays. Examples are frame relay and X.25
Packet Switching
Digital Subscriber Line (DSL)
Commonly used in FDDI.
Trunk Lines
25. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Serial Line Internet Protocol (SLIP)
Remote Access Servers
Isochronous Communication Processes
Application Proxy Firewall
26. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Bridge
Direct Sequence Spread Spectrum (DSSS)
Wireless Application Protocol (WAP)
High Level Data Link Control (HLDC)
27. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Mesh Topology
Remote Access Servers
LLC (Logical Link Control - 802.2)
Ring Topology
28. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Layers in the OSI Model
Spam over Internet Telephony (SPIT)
IGMP
Dedicated Links
29. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Dynamic Packet Filtering
Synchronous Optical Networks (SONETS)
Bus Topology
Session Initiation Protocol (SIP)
30. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Reverse Address Resolution Protocol (RARP )
Multi-protocol Label Switching
LLC (Logical Link Control - 802.2)
Asynchronous Communication
31. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Application Proxy vs. Circuit Level
Switch
Dedicated Links
ARP Poisoning
32. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
802.11i
Frame Relay
Cable Modem
10baseT
33. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Router
Commonly used in FDDI.
Full-Duplex
SOCKS Firewall
34. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
Router
802.11
DNS (Domain Name System)
Multi-protocol Label Switching
35. Type of network layout that is a large geographical region connecting more that one LAN.
Wide Area Network (WAN)
Half-Duplex
Definition of Protocol
VLAN
36. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
DOS attacks from flooding
ARP Poisoning
OSI Layer 4: Transport Layer
Challenge Handshake Authentication Protocol (CHAP)
37. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Full-Duplex
Distributed Environment Challenge
Coaxial Cables
Packet Switching
38. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
Commonly used in logical bus - Ethernet - token ring.
Token Ring (802.5)
Application Proxy vs. Circuit Level
SOCKS Firewall
39. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
Metropolitan Area Network (MAN)
Token Ring (802.5)
VLAN
Multistation Access Unit (MAU)
40. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Password Authentication Protocol (PAP)
Network Address Translator (NAT)
Point-To-Point Tunneling Protocol (PPTP)
Source Routing
41. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Stateful Firewall
OSI Layer 1: Physical
Point-To-Point (PPP)
Definition of Protocol
42. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Subnetting
Kernel Proxy Firewall
Classless inter-domain routing (CIDR)
T1
43. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Service Set ID (SSID)
Packet Switching
Definition of Protocol
Bus Topology
44. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Commonly used in FDDI.
OSI Layer 5: Session Layer
LLC (Logical Link Control - 802.2)
45. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Serial Line Internet Protocol (SLIP)
Ethernet (802.3)
Half-Duplex
802.11b
46. Standard that outlines wireless personal area network (WPAN) technologies.
802.15
Synchronous Optical Networks (SONETS)
LLC (Logical Link Control - 802.2)
Dynamic Packet Filtering
47. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Circuit Level Proxy Firewall
Challenge Handshake Authentication Protocol (CHAP)
Proxy Firewall Strengths
Noise
48. Protocol for allowing multi-cast (one to many) communication
ThickNet - aka 10base5.
IGMP
Permanent Virtual Circuit (PVC)
Bastion Host
49. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
Serial Line Internet Protocol (SLIP)
Wide Area Network (WAN)
Full-Duplex
50. Set of rules that dictates how computer communicate over networks.
Full-Duplex
Definition of Protocol
Proxy Firewall
Remote Access Servers