SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Loki Attack
Bastion Host
OSI Layer 5: Session Layer
Direct Sequence Spread Spectrum (DSSS)
2. Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.
Layer 2 Tunneling Protocol (L2TP)
802.11b
Ring Topology
Session Initiation Protocol (SIP)
3. Protocol for allowing multi-cast (one to many) communication
IGMP
Digital Subscriber Line (DSL)
Definition of Protocol
802.11b
4. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Integrated Services Digital Network (ISDN)
Metropolitan Area Network (MAN)
IPv6
Screened Host Firewall
5. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Tree Topology
DOS attacks from flooding
Challenge Handshake Authentication Protocol (CHAP)
Layers in the TCP/IP Model
6. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
OSI Layer 6: Presentation
802.15
Commonly used in Ethernet.
VLAN
7. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Tree Topology
Switch
Screened Host Firewall
Packet Switching
8. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Extensible Authentication Protocol (EAP)
Subnetting
VLAN
Circuit Level Proxy Firewall
9. A packet switching technology that is used by telecommunication services for data-only traffic. It is a subscriber based service that operates within the network and data link layers.
Point-To-Point (PPP)
X.25
Tree Topology
Synchronous Communication
10. Strengths of a type of Stateful Firewall: High security - better performance than an application firewall. Weaknesses include more complex - ___________ - if rebooted all information is lost.
LLC (Logical Link Control - 802.2)
Open Relay
DOS attacks from flooding
OSI Layer 3: Network Layer
11. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
10baseT
High Level Data Link Control (HLDC)
CBC-MAC Protocol (CCMP)
Virtual Private Network (VPN)
12. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Classless inter-domain routing (CIDR)
Committed Information Rate (CIR)
T1
OSI Layer 2: Data Link Layer
13. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
TCP
Mesh Topology
Multi-protocol Label Switching
Layers in the OSI Model
14. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Packet Filtering Firewall
Subnetting
Open System Authentication (OSA)
Committed Information Rate (CIR)
15. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Challenge Handshake Authentication Protocol (CHAP)
Frequency Hopping Spread Spectrum (FHSS)
Wireless Application Protocol (WAP)
ThickNet - aka 10base5.
16. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Isochronous Communication Processes
Point-To-Point (PPP)
Channel Service Unit/Data Service Unit (CSU/DSU)
IPSec
17. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Password Authentication Protocol (PAP)
Tree Topology
TCP
OSI Layer 3: Network Layer
18. Wireless standard that will improve security of wireless communication
802.11i
Distributed Environment Challenge
Noise
Wired Equivalent Privacy (WEP)
19. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Packet Switching
Circuit Level Proxy Firewall
Private Branch Exchange (PBX)
Source Routing
20. In a token ring network - each computer is connected to this - which acts as a central hub.
10baseT
Pulse Code Modulation (PCM)
Multistation Access Unit (MAU)
Multilevel Switching
21. Type of wireless security standard that uses AES in CBC mode.
OSI Layer 7: Application
CBC-MAC Protocol (CCMP)
Classless inter-domain routing (CIDR)
802.11i
22. This is a standard for fiber-optic cabling and uses self-healing network rings. This standard describes the interfaces that can be used over fiber lines and the signaling that can be employed. Works at the physical layer of the OSI model.
Subnetting
Spam over Internet Telephony (SPIT)
Wireless Application Protocol (WAP)
Synchronous Optical Networks (SONETS)
23. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
OSI Layer 7: Application
Distributed Environment Challenge
Committed Information Rate (CIR)
Application Proxy Firewall
24. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
SPIM
Ethernet (802.3)
Multilevel Switching
Bridge
25. New variant to traditional email spam on VoIP networks.
Asynchronous Transfer Mode (ATM)
Asynchronous Communication
Spam over Internet Telephony (SPIT)
ARP (Address Resolution Protocol)
26. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Dynamic Packet Filtering
Bus Topology
T3
Shared Key Authentication (SKA)
27. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Spam over Internet Telephony (SPIT)
Point-To-Point (PPP)
Circuit Switching
Crosstalk
28. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Open Relay
Screened Sub-Net
Half-Duplex
Layers in the OSI Model
29. Both directions - both applications can send information at a time. Session Layer Communication Modes
Star Topology
Asynchronous Communication
Full-Duplex
Temporal Key Integrity Protocol (TKIP)
30. Wireless LAN standard that operates in a 2.4Ghz range - 11Mbps - DSSS
Proxy Firewall Strengths
802.11b
T3
Twisted Pair Cables
31. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Layers in the TCP/IP Model
Integrated Services Digital Network (ISDN)
Dynamic Packet Filtering
VoIP
32. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Wide Area Network (WAN)
Synchronous Data Link Control (SDLC)
Asynchronous Transfer Mode (ATM)
Spread Spectrum
33. Network segment name for a DMZ created by two physical firewalls.
OSI Layer 4: Transport Layer
Screened Sub-Net
802.11i
Temporal Key Integrity Protocol (TKIP)
34. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Spam over Internet Telephony (SPIT)
Packet Switching
Integrated Services Digital Network (ISDN)
Serial Line Internet Protocol (SLIP)
35. Communication devices that determine synchronization scheme before data transmission.
Packet Filtering Firewall
X.25
Synchronous Data Link Control (SDLC)
Synchronous Communication
36. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Dedicated Links
ICMP (Internet Control Message Protocol)
Layers in the TCP/IP Model
CBC-MAC Protocol (CCMP)
37. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
OSI Layer 6: Presentation
Fiber Distributed Data Interface (FDDI)
Session Initiation Protocol (SIP)
Repeaters
38. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Wireless Application Protocol (WAP)
Distributed Environment Challenge
High Level Data Link Control (HLDC)
Packet Filtering Firewall
39. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Blue Boxing
Screened Sub-Net
Serial Line Internet Protocol (SLIP)
40. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Stateful Firewall
Screened Sub-Net
Spread Spectrum
Carrier sense multiple access with collision detection (CSMA/CD)
41. Protocol that resolves host names into IP addresses and has distributed databases all over the Internet to provide name resolution.
T3
DNS (Domain Name System)
Router
X.25
42. Both directions - only one application can send information at a time
Half-Duplex
802.11i
IPSec
Coaxial Cables
43. This dedicated connection provides up to 1.544 Mbps bandwidth over 1 T1 and 24 time divided channels.
Ethernet (802.3)
Stateful Firewall
T1
OSI Layer 7: Application
44. Protocol that translates a MAC address into an IP address.
VLAN
Screened Host Firewall
Reverse Address Resolution Protocol (RARP )
Bastion Host
45. Type of firewall that can be compromised if the OS does not have packet forwarding or routing turned off.
Attenuation
Application Proxy vs. Circuit Level
Dual-Homed Firewall
VoIP
46. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Committed Information Rate (CIR)
Remote Access Servers
Pulse Code Modulation (PCM)
Crosstalk
47. Wireless communication that distributes individual signals across the allocated frequencies.
Crosstalk
Service Set ID (SSID)
Integrated Services Digital Network (ISDN)
Spread Spectrum
48. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
DOS attacks from flooding
High Level Data Link Control (HLDC)
Port Numbers
Frame Relay
49. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Password Authentication Protocol (PAP)
Packet Filtering Firewall
Serial Line Internet Protocol (SLIP)
Remote Access Servers
50. Security wireless standard that enables data transfers to be encrypted. Static encryption keys among clients - short 40 bit keys - RC4 encryption - ineffective use of 24 bit IV's - and no packet integrity.
Noise
TCP
Wired Equivalent Privacy (WEP)
Committed Information Rate (CIR)