SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Synchronous Communication
Layers in the OSI Model
Synchronous Data Link Control (SDLC)
Committed Information Rate (CIR)
2. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
Open Relay
Synchronous Data Link Control (SDLC)
CBC-MAC Protocol (CCMP)
UDP
3. Spam over IM
Blue Boxing
DNS (Domain Name System)
T1
SPIM
4. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
Spread Spectrum
Digital Subscriber Line (DSL)
10baseT
Integrated Services Digital Network (ISDN)
5. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
VoIP
DNS (Domain Name System)
ThickNet - aka 10base5.
Tree Topology
6. Problems: Requires more expense in cabling and extra effort to track down cable faults.
Asynchronous Communication
Subnetting
Point-To-Point (PPP)
Mesh Topology
7. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Classless inter-domain routing (CIDR)
Commonly used in FDDI.
Port Numbers
Kernel Proxy Firewall
8. Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.
Fiber Distributed Data Interface (FDDI)
Frequency Hopping Spread Spectrum (FHSS)
Port Numbers
Multilevel Switching
9. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Password Authentication Protocol (PAP)
Digital Subscriber Line (DSL)
Spread Spectrum
X.25
10. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
Multilevel Switching
Tree Topology
Bus Topology
Switch
11. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
Plenum-rated Cables
OSI Layer 3: Network Layer
T3
Distributed Environment Challenge
12. Wireless standard that will improve security of wireless communication
802.11i
Permanent Virtual Circuit (PVC)
SPIM
TCP
13. Protocol that translates IP address into a MAC address (physical Ethernet address)
Packet Switching
ARP (Address Resolution Protocol)
Proxy Firewall Strengths
Application Proxy vs. Circuit Level
14. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Synchronous Optical Networks (SONETS)
Switch
Bastion Host
Distributed Environment Challenge
15. 7: Application - 6: Presentation - 5: Session - 4: Transport - 3: Network - 2: Data Link - 1: Physical - Remember 'All People Seem To Need Data Processing'
Twisted Pair Cables
Reverse Address Resolution Protocol (RARP )
Layers in the OSI Model
Attenuation
16. Type of switch that uses tags that are assigned to each destination network. The network compares the tag with its tag information base - appends the appropriate tag - and forwards to the next switch. This increases the transmission speed - allows la
Multi-protocol Label Switching
Bastion Host
Integrated Services Digital Network (ISDN)
Token Ring (802.5)
17. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Asynchronous Transfer Mode (ATM)
Dynamic Packet Filtering
Attenuation
Synchronous Data Link Control (SDLC)
18. Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.
Dedicated Links
Reverse Address Resolution Protocol (RARP )
Bridge
Session Initiation Protocol (SIP)
19. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Remote Access Servers
Isochronous Communication Processes
OSI Data encapsulation
Mesh Topology
20. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Attenuation
Star Topology
802.11b
Fiber Distributed Data Interface (FDDI)
21. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
Session Initiation Protocol (SIP)
Source Routing
802.15
Ring Topology
22. Standard for transmitting data across the Internet. One is reliable and connection oriented. The other is unreliable and connectionless.
Layers in the TCP/IP Model
OSI Layer 2: Data Link Layer
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
IPSec
23. Protocol that transfers data in fixed cells (53 bytes) - is a WAN technology - and transmits data at very high rates. Supports voice - data - and video applications.
Carrier sense multiple access with collision detection (CSMA/CD)
Committed Information Rate (CIR)
Dynamic Packet Filtering
Asynchronous Transfer Mode (ATM)
24. Both directions - both applications can send information at a time. Session Layer Communication Modes
Full-Duplex
Token Passing
VLAN
T3
25. A Temporary circuit set up for a single connection. Set up and torn down as they are needed.
Switched Virtual Circuit (SVC)
Iterated Association
T3
Subnetting
26. Type of firewall that is also know as a screening router and is accomplished by ACL's (Lines of text called rules). Traffic can be filtered by address - ports - and protocol types. 1st generation firewall - runs at the network layer.
Isochronous Communication Processes
Dual-Homed Firewall
Packet Filtering Firewall
OSI Layer 2: Data Link Layer
27. Encapsulation protocol for telecommunication connections. Replaced SLIP and is ideal for connection different types of devices over serial lines.
ICMP (Internet Control Message Protocol)
Crosstalk
Point-To-Point (PPP)
Bus Topology
28. Type of network device that is the simplest type of connectivity because it only repeats and amplifies electric signals between cable segments. Works at the physical layer.
Spam over Internet Telephony (SPIT)
Repeaters
ARP Poisoning
Screened Sub-Net
29. Problems: Central device is a single point of failure.
Point-To-Point Tunneling Protocol (PPTP)
Star Topology
High Level Data Link Control (HLDC)
Classless inter-domain routing (CIDR)
30. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
Bus Topology
Frame Relay
Definition of Protocol
TCP
31. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
VoIP
ARP (Address Resolution Protocol)
Repeaters
Commonly used in Ethernet.
32. Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.
Metropolitan Area Network (MAN)
VoIP
T1
Iterated Association
33. OSI layer that provides end to end transmission between computer systems. Protocols that use this layer are TCP (Transmission Control Protocol) - UDP (User Datagram Protocol) - SPX (Sequenced Packet Exchange) - and SSL.
Password Authentication Protocol (PAP)
OSI Layer 4: Transport Layer
Multilevel Switching
OSI Layer 5: Session Layer
34. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Virtual Private Network (VPN)
Loki Attack
Application Proxy Firewall
Router
35. Type of cabling problem signals from one wire crossing over to another wire.
OSI Layer 5: Session Layer
ARP (Address Resolution Protocol)
Crosstalk
Loki Attack
36. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Token Passing
Bastion Host
Private Branch Exchange (PBX)
VoIP
37. Type of cable that is more expensive than UTP and STP - more resistant to EMI - can carry baseband and board band technologies.
Router
IPSec
802.15
Coaxial Cables
38. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
Private Branch Exchange (PBX)
Point-To-Point Tunneling Protocol (PPTP)
Commonly used in Internet.
Permanent Virtual Circuit (PVC)
39. Standard that outlines wireless personal area network (WPAN) technologies.
Isochronous Communication Processes
10baseT
Repeaters
802.15
40. Network segment name for a DMZ created by two physical firewalls.
Screened Sub-Net
Isochronous Communication Processes
Point-To-Point Tunneling Protocol (PPTP)
ARP (Address Resolution Protocol)
41. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Subnetting
Ethernet (802.3)
Iterated Association
Proxy Firewall
42. The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.
Commonly used in logical bus - Ethernet - token ring.
Blue Boxing
Dedicated Links
Permanent Virtual Circuit (PVC)
43. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Integrated Services Digital Network (ISDN)
Reverse Address Resolution Protocol (RARP )
Switch
Open Relay
44. Communication devices that determine synchronization scheme before data transmission.
Fiber-optic Cables
Isochronous Communication Processes
Metropolitan Area Network (MAN)
Synchronous Communication
45. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
Plenum-rated Cables
Bastion Host
Asynchronous Communication
SOCKS Firewall
46. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Noise
Packet Switching
Network Address Translator (NAT)
Metropolitan Area Network (MAN)
47. Type of network that allows large IP ranges to be divided into smaller - logical - and easier to maintain network segments.
Subnetting
Token Passing
Layers in the TCP/IP Model
Commonly used in logical bus - Ethernet - token ring.
48. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Coaxial Cables
Reverse Address Resolution Protocol (RARP )
Asynchronous Transfer Mode (ATM)
Channel Service Unit/Data Service Unit (CSU/DSU)
49. Type of topology that where all computers are connected to a central device (AKA hub) - which provides more resilience for the network.
OSI Layer 6: Presentation
Multistation Access Unit (MAU)
Plenum-rated Cables
Commonly used in logical bus - Ethernet - token ring.
50. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
OSI Layer 5: Session Layer
Bluejacking
Simplex: One direction.
Pulse Code Modulation (PCM)