SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Dual-Homed Firewall
Challenge Handshake Authentication Protocol (CHAP)
Wide Area Network (WAN)
Full-Duplex
2. Strengths of a type of firewall: application independence - high performance - and scalability. Weaknesses include low security - no protection above the network layer.
Cable Modem
Packet Filtering Firewall
OSI Layer 4: Transport Layer
Screened Host Firewall
3. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Permanent Virtual Circuit (PVC)
X.25
Frequency Hopping Spread Spectrum (FHSS)
Subnetting
4. Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.
Bluejacking
Plenum-rated Cables
Frame Relay
Temporal Key Integrity Protocol (TKIP)
5. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Password Authentication Protocol (PAP)
TCP
Commonly used in logical bus - Ethernet - token ring.
Switched Virtual Circuit (SVC)
6. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
Virtual Private Network (VPN)
Commonly used in FDDI.
802.11
Multilevel Switching
7. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Packet Filtering Firewall
Spam over Internet Telephony (SPIT)
Committed Information Rate (CIR)
Commonly used in FDDI.
8. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Repeaters
Coaxial Cables
Switch
Session Initiation Protocol (SIP)
9. Type of firewall that looks at header information to make decisions on whether a packet is deemed acceptable. This type does not look as deep within the packet as an application level proxy - runs at the session layer.
Shared Key Authentication (SKA)
Circuit Level Proxy Firewall
Cable Modem
IPSec
10. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Loki Attack
Challenge Handshake Authentication Protocol (CHAP)
Application Proxy vs. Circuit Level
X.25
11. Wireless communication that applies sub-bits to a message (chips) and the receiver uses the chips to re-assemble the message based on the chipping code. It uses all available bandwidth - high throughput of 11Mbps.
Asynchronous Transfer Mode (ATM)
OSI Layer 6: Presentation
Direct Sequence Spread Spectrum (DSSS)
Wide Area Network (WAN)
12. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Packet Filtering Firewall
Permanent Virtual Circuit (PVC)
Synchronous Optical Networks (SONETS)
IGMP
13. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
T1
Extensible Authentication Protocol (EAP)
Bridge
Crosstalk
14. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Bastion Host
OSI Layer 3: Network Layer
Wireless Application Protocol (WAP)
802.11
15. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
Circuit Switching
Shared Key Authentication (SKA)
Attenuation
16. Both directions - only one application can send information at a time
Half-Duplex
Point-To-Point Tunneling Protocol (PPTP)
Remote Access Servers
Bastion Host
17. Network segment name for a DMZ created by two physical firewalls.
Fiber-optic Cables
OSI Layer 6: Presentation
Screened Sub-Net
Attenuation
18. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
Open System Authentication (OSA)
Shared Key Authentication (SKA)
SPIM
Token Ring (802.5)
19. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Private Branch Exchange (PBX)
DOS attacks from flooding
Dynamic Packet Filtering
Fiber Distributed Data Interface (FDDI)
20. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Extensible Authentication Protocol (EAP)
Switched Virtual Circuit (SVC)
Integrated Services Digital Network (ISDN)
ThickNet - aka 10base5.
21. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
OSI Layer 4: Transport Layer
Plenum-rated Cables
Source Routing
TCP
22. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Synchronous Communication
Coaxial Cables
Asynchronous Communication
Committed Information Rate (CIR)
23. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
High Level Data Link Control (HLDC)
Simplex: One direction.
Loki Attack
Remote Access Servers
24. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
Screened Sub-Net
Screened Host Firewall
802.11
FDDI-2
25. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
FDDI-2
DOS attacks from flooding
Shared Key Authentication (SKA)
OSI Layer 3: Network Layer
26. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Dedicated Links
Multistation Access Unit (MAU)
DNS (Domain Name System)
Reverse Address Resolution Protocol (RARP )
27. Protocol for allowing multi-cast (one to many) communication
Coaxial Cables
Definition of Protocol
IGMP
OSI Layer 6: Presentation
28. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Frame Relay
Layers in the OSI Model
Channel Service Unit/Data Service Unit (CSU/DSU)
Switched Virtual Circuit (SVC)
29. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
OSI Layer 4: Transport Layer
Bluejacking
ICMP (Internet Control Message Protocol)
Network Address Translator (NAT)
30. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
OSI Layer 6: Presentation
802.15
Point-To-Point Tunneling Protocol (PPTP)
T1
31. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Repeaters
Classless inter-domain routing (CIDR)
Commonly used in Ethernet.
Dual-Homed Firewall
32. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
OSI Layer 7: Application
Kernel Proxy Firewall
10baseT
Mesh Topology
33. Type of authentication protocol that provides a framework to enable may types of authentication techniques to be used during PPP connections. It extends the possibilities to one-time passwords - token cards - biometrics - Kerberos - and digital certi
Extensible Authentication Protocol (EAP)
Attenuation
Password Authentication Protocol (PAP)
Token Ring (802.5)
34. Spam over IM
Synchronous Data Link Control (SDLC)
802.16
Extensible Authentication Protocol (EAP)
SPIM
35. Type of network layout that is a large geographical region connecting more that one LAN.
Definition of Protocol
Dedicated Links
High Level Data Link Control (HLDC)
Wide Area Network (WAN)
36. SMTP server that is configured for sending email from any source to and destination.
Open Relay
Proxy Firewall
Challenge Handshake Authentication Protocol (CHAP)
TCP
37. This network technology determines which system will send data based on which one has the token.
Multistation Access Unit (MAU)
Carrier sense multiple access with collision detection (CSMA/CD)
802.11
Token Passing
38. Type of network layout that separates and group computers logically.
Packet Filtering Firewall
Pulse Code Modulation (PCM)
VLAN
ThickNet - aka 10base5.
39. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Reverse Address Resolution Protocol (RARP )
Direct Sequence Spread Spectrum (DSSS)
Wired Equivalent Privacy (WEP)
Commonly used in Internet.
40. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Asynchronous Transfer Mode (ATM)
Iterated Association
Service Set ID (SSID)
Proxy Firewall
41. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
Open Relay
FDDI-2
Metropolitan Area Network (MAN)
Token Passing
42. New variant to traditional email spam on VoIP networks.
Virtual Private Network (VPN)
Commonly used in Internet.
Spam over Internet Telephony (SPIT)
Bus Topology
43. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Trunk Lines
802.11a
Synchronous Optical Networks (SONETS)
Reverse Address Resolution Protocol (RARP )
44. This dedicated connection provides 45Mbps of bandwidth over 28 T1 lines and 672 time divided channels.
Spread Spectrum
Integrated Services Digital Network (ISDN)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
T3
45. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Point-To-Point (PPP)
Mesh Topology
Circuit Switching
Iterated Association
46. A WAN protocol that works at the data link layer and performs packet switching. Economical choice because the fee is based on bandwidth usage rather than a dedicated pipeline.
Dedicated Links
Dynamic Packet Filtering
Frame Relay
FDDI-2
47. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
Dedicated Links
Permanent Virtual Circuit (PVC)
Multilevel Switching
48. Protocol stack used instead of TCP/IP on wireless devices. The "gap" in this protocol involves translating its secure traffic to SSL or TLS - which is typically done by a 3rd party.
Switched Virtual Circuit (SVC)
Dual-Homed Firewall
Direct Sequence Spread Spectrum (DSSS)
Wireless Application Protocol (WAP)
49. Protocol that translates a MAC address into an IP address.
Classless inter-domain routing (CIDR)
Reverse Address Resolution Protocol (RARP )
OSI Layer 4: Transport Layer
Crosstalk
50. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Classless inter-domain routing (CIDR)
OSI Data encapsulation
Application Proxy Firewall
Bus Topology