SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of cable where STP and UTP (shielded and unshielded) cables are the most popular - cheapest - and easiest to work with. However - easiest to tap into - have cross talk issues - and are vulnerable to electromagnetic interference (EMI).
Serial Line Internet Protocol (SLIP)
Switched Virtual Circuit (SVC)
Twisted Pair Cables
Layers in the OSI Model
2. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ARP (Address Resolution Protocol)
Temporal Key Integrity Protocol (TKIP)
ThinNet - aka 10base2
High Level Data Link Control (HLDC)
3. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
ARP (Address Resolution Protocol)
Application Proxy vs. Circuit Level
Blue Boxing
OSI Data encapsulation
4. Identifys a WLAN. Can be used to segment environments into different WLANS.
Classless inter-domain routing (CIDR)
Service Set ID (SSID)
Router
Half-Duplex
5. A simplified version of X.25 - without the error checking that was done on the network. It handles error checking at the end node - which helps improve speed dramatically.
Token Passing
Multi-protocol Label Switching
Shared Key Authentication (SKA)
Frame Relay
6. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Repeaters
VoIP
Switched Virtual Circuit (SVC)
Network Address Translator (NAT)
7. Type of wireless authentication where the device does not need to provide a key for authentication. Usually - only the SSID is required and plaintext transmission occurs.
FDDI-2
Open System Authentication (OSA)
OSI Layer 7: Application
Plenum-rated Cables
8. In a token ring network - each computer is connected to this - which acts as a central hub.
Asynchronous Transfer Mode (ATM)
IPSec
Multistation Access Unit (MAU)
Frame Relay
9. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
10baseT
Router
FDDI-2
T3
10. Type of network layout that is a large geographical region connecting more that one LAN.
Commonly used in logical bus - Ethernet - token ring.
Wide Area Network (WAN)
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Application Proxy vs. Circuit Level
11. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Simplex: One direction.
Stateful Firewall
Metropolitan Area Network (MAN)
Open System Authentication (OSA)
12. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Session Initiation Protocol (SIP)
Frequency Hopping Spread Spectrum (FHSS)
LLC (Logical Link Control - 802.2)
Fiber Distributed Data Interface (FDDI)
13. Set of rules that dictates how computer communicate over networks.
Ethernet (802.3)
Commonly used in FDDI.
Definition of Protocol
Trunk Lines
14. Standard that addresses wireless MAN technologies.
Commonly used in FDDI.
Plenum-rated Cables
T1
802.16
15. OSI layer that has services and protocols required by the user's applications for network functionality. Example protocols include HTTP - SMTP - FTP - Telnet.
VLAN
OSI Layer 7: Application
Layers in the TCP/IP Model
Session Initiation Protocol (SIP)
16. Standard that outlines wireless personal area network (WPAN) technologies.
Commonly used in Internet.
802.15
Simplex: One direction.
ICMP (Internet Control Message Protocol)
17. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Synchronous Data Link Control (SDLC)
Commonly used in Internet.
Cable Modem
CBC-MAC Protocol (CCMP)
18. Faster because processing is done in the kernel. One network stack is created for each packet. 5th generation firewall - runs at the application layer.
Kernel Proxy Firewall
Serial Line Internet Protocol (SLIP)
Attenuation
Multi-protocol Label Switching
19. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
OSI Data encapsulation
VLAN
802.11a
Permanent Virtual Circuit (PVC)
20. Type of wireless security standard that uses AES in CBC mode.
Serial Line Internet Protocol (SLIP)
CBC-MAC Protocol (CCMP)
Plenum-rated Cables
Switched Virtual Circuit (SVC)
21. Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.
Carrier sense multiple access with collision detection (CSMA/CD)
IPv6
UDP
Digital Subscriber Line (DSL)
22. Both directions - both applications can send information at a time. Session Layer Communication Modes
Proxy Firewall Strengths
Full-Duplex
Application Proxy Firewall
Crosstalk
23. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Proxy Firewall Strengths
OSI Layer 4: Transport Layer
10baseT
Digital Subscriber Line (DSL)
24. Type of firewall that lies between the perimeter router and and LAN.
ThickNet - aka 10base5.
X.25
Screened Host Firewall
Dual-Homed Firewall
25. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
VoIP
OSI Layer 2: Data Link Layer
Mesh Topology
Screened Sub-Net
26. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
OSI Layer 7: Application
Ethernet (802.3)
ThickNet - aka 10base5.
Open System Authentication (OSA)
27. OSI layer 2 Sub-layers. The first provides a standard interface for the network protocol being used. The second provides a standard interface for the physical layer protocol being used.
Integrated Services Digital Network (ISDN)
LLC (Logical Link Control - 802.2)
TCP
IGMP
28. Wireless standard that will improve security of wireless communication
OSI Layer 6: Presentation
Remote Access Servers
802.11i
Bus Topology
29. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
Layers in the TCP/IP Model
802.11a
Application Proxy vs. Circuit Level
IPSec
30. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Permanent Virtual Circuit (PVC)
SPIM
Proxy Firewall
OSI Layer 2: Data Link Layer
31. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
OSI Layer 5: Session Layer
Packet Filtering Firewall
OSI Layer 6: Presentation
X.25
32. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
Synchronous Optical Networks (SONETS)
802.16
Dual-Homed Firewall
33. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
OSI Layer 3: Network Layer
ARP (Address Resolution Protocol)
Application Proxy Firewall
Bastion Host
34. Uses tunneling protocols and encryption to provide a secure network connection between two network hosts. Private and secure connections can be made across an unsecured network. Example protocols are PPTP - L2TP - and IPSec.
Attenuation
Virtual Private Network (VPN)
Wired Equivalent Privacy (WEP)
TCP
35. Network segment name for a DMZ created by two physical firewalls.
Wide Area Network (WAN)
Screened Sub-Net
Service Set ID (SSID)
Multilevel Switching
36. Type of network device that divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understands MAC addresses - not IP addresses.
Bridge
Stateful Firewall
Layers in the OSI Model
CBC-MAC Protocol (CCMP)
37. These are used to connect multiple switches for traffic of the same classification. Example - two voice switches at a local phone company's central office.
Spread Spectrum
Router
Trunk Lines
OSI Layer 2: Data Link Layer
38. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Token Ring (802.5)
Trunk Lines
Iterated Association
Temporal Key Integrity Protocol (TKIP)
39. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
Crosstalk
OSI Layer 1: Physical
Cable Modem
Virtual Private Network (VPN)
40. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
Point-To-Point (PPP)
Bus Topology
Tree Topology
802.11b
41. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Bastion Host
TCP
Subnetting
Point-To-Point (PPP)
42. Network where a virtual connection that acts like a dedicated link between two systems is set up. Traffic travels in a predictable and constant manner. Example - telephone.
Blue Boxing
Bastion Host
OSI Layer 3: Network Layer
Circuit Switching
43. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
OSI Layer 6: Presentation
Circuit Switching
Noise
Layers in the OSI Model
44. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Loki Attack
Star Topology
Synchronous Optical Networks (SONETS)
Pulse Code Modulation (PCM)
45. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Bridge
Asynchronous Communication
T3
Router
46. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
LLC (Logical Link Control - 802.2)
Router
Commonly used in Ethernet.
Temporal Key Integrity Protocol (TKIP)
47. Type of cabling problem signals from one wire crossing over to another wire.
ThinNet - aka 10base2
Crosstalk
Iterated Association
Trunk Lines
48. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
ARP (Address Resolution Protocol)
OSI Data encapsulation
Frequency Hopping Spread Spectrum (FHSS)
802.11b
49. Network cabling that is placed in these types of areas must meet a specific fire rating. These cables typically have a jacked cover made of fluoropolymers.
Fiber Distributed Data Interface (FDDI)
Plenum-rated Cables
Mesh Topology
Spread Spectrum
50. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Virtual Private Network (VPN)
Kernel Proxy Firewall
802.11
Layer 2 Tunneling Protocol (L2TP)