SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An older protocol that was used by ISP's to encapsulate data to be sent over dial up connections
Serial Line Internet Protocol (SLIP)
Circuit Switching
ICMP (Internet Control Message Protocol)
Permanent Virtual Circuit (PVC)
2. 4: Application - 3: Host-to-Host - 2: Internet - 1: Network Access - 3 -1 -1 -2 will map to the OSI model.
Layers in the TCP/IP Model
Circuit Level Proxy Firewall
Carrier sense multiple access with collision detection (CSMA/CD)
Application Proxy vs. Circuit Level
3. Spam over IM
SPIM
Digital Subscriber Line (DSL)
Open System Authentication (OSA)
Isochronous Communication Processes
4. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Full-Duplex
Private Branch Exchange (PBX)
Iterated Association
Half-Duplex
5. Wireless communication that distributes individual signals across the allocated frequencies.
Application Proxy Firewall
High Level Data Link Control (HLDC)
Spread Spectrum
Commonly used in logical bus - Ethernet - token ring.
6. Type of host that is locked down - hardened - system. Systems installed in the DMZ (firewalls - servers) should be installed on this type of host.
Bastion Host
Point-To-Point (PPP)
ICMP (Internet Control Message Protocol)
Wired Equivalent Privacy (WEP)
7. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Proxy Firewall Strengths
Point-To-Point Tunneling Protocol (PPTP)
Kernel Proxy Firewall
OSI Layer 1: Physical
8. This network technology determines which system will send data based on which one has the token.
Wired Equivalent Privacy (WEP)
Token Passing
Digital Subscriber Line (DSL)
T1
9. Identifys a WLAN. Can be used to segment environments into different WLANS.
Synchronous Optical Networks (SONETS)
IGMP
Service Set ID (SSID)
T3
10. Premium service offered by service providers in frame relay networks that guarantees a company a specified amount of bandwidth.
Committed Information Rate (CIR)
DNS (Domain Name System)
Synchronous Data Link Control (SDLC)
Coaxial Cables
11. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Open System Authentication (OSA)
IPSec
Asynchronous Communication
Synchronous Data Link Control (SDLC)
12. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ThinNet - aka 10base2
Commonly used in Ethernet.
Screened Host Firewall
ThickNet - aka 10base5.
13. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
Isochronous Communication Processes
Permanent Virtual Circuit (PVC)
802.11a
Multilevel Switching
14. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Spread Spectrum
Attenuation
Multistation Access Unit (MAU)
Shared Key Authentication (SKA)
15. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Tree Topology
Full-Duplex
Challenge Handshake Authentication Protocol (CHAP)
Screened Host Firewall
16. Set of rules that dictates how computer communicate over networks.
Blue Boxing
Definition of Protocol
Attenuation
Private Branch Exchange (PBX)
17. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
Bluejacking
Carrier sense multiple access with collision detection (CSMA/CD)
High Level Data Link Control (HLDC)
OSI Layer 7: Application
18. Protocol that increases address size from 32 bits to 128 bits
IPv6
Crosstalk
ARP (Address Resolution Protocol)
Screened Sub-Net
19. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
ARP (Address Resolution Protocol)
Commonly used in FDDI.
Point-To-Point Tunneling Protocol (PPTP)
Trunk Lines
20. Protocol that translates IP address into a MAC address (physical Ethernet address)
Port Numbers
Commonly used in logical bus - Ethernet - token ring.
Synchronous Data Link Control (SDLC)
ARP (Address Resolution Protocol)
21. Type of topology where all computers are connected by a unidirectional transmission link - and the cable is in a closed loop.
ThickNet - aka 10base5.
Tree Topology
Circuit Level Proxy Firewall
Commonly used in FDDI.
22. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
OSI Layer 3: Network Layer
IPSec
Isochronous Communication Processes
Dynamic Packet Filtering
23. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Packet Filtering Firewall
Bluejacking
DNS (Domain Name System)
Fiber-optic Cables
24. Standard that outlines wireless personal area network (WPAN) technologies.
802.15
802.11a
Spam over Internet Telephony (SPIT)
Password Authentication Protocol (PAP)
25. Proprietary protocol that enables secondary devices to communicate with primary stations or mainframes in an IBM architecture. Developed in the mid-70's for use in a systems network architecture (SNA) environment. First synchronous - link layer - bit
802.11
Synchronous Data Link Control (SDLC)
Remote Access Servers
802.11a
26. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Remote Access Servers
Extensible Authentication Protocol (EAP)
OSI Layer 2: Data Link Layer
Layers in the OSI Model
27. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Wireless Application Protocol (WAP)
Isochronous Communication Processes
OSI Data encapsulation
IGMP
28. Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.
Cable Modem
Token Ring (802.5)
Channel Service Unit/Data Service Unit (CSU/DSU)
Dynamic Packet Filtering
29. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Pulse Code Modulation (PCM)
Wireless Application Protocol (WAP)
OSI Layer 7: Application
Trunk Lines
30. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
VoIP
Multilevel Switching
Tree Topology
Application Proxy Firewall
31. Protocol that works at the network layer and informs hosts - routers - and devices of network or computer problems. It is the major component of the ping utility.
Bridge
Fiber Distributed Data Interface (FDDI)
ICMP (Internet Control Message Protocol)
Port Numbers
32. Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co
Spread Spectrum
Private Branch Exchange (PBX)
VoIP
Challenge Handshake Authentication Protocol (CHAP)
33. Type of cabling problem signals from one wire crossing over to another wire.
Crosstalk
Attenuation
Loki Attack
Shared Key Authentication (SKA)
34. The well known values range from 0-1023. FTP runs on 20 and 21 - SMTP runs on 25 - TFTP runs on 69 - DNS runs on 53 - HTTP runs on 80 - HTTPS runs on 443 - SNMP runs on 161.
Circuit Switching
Plenum-rated Cables
Port Numbers
Permanent Virtual Circuit (PVC)
35. Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.
ThinNet - aka 10base2
802.11
OSI Data encapsulation
Ethernet (802.3)
36. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Digital Subscriber Line (DSL)
OSI Layer 2: Data Link Layer
Star Topology
Commonly used in logical bus - Ethernet - token ring.
37. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Proxy Firewall Strengths
Shared Key Authentication (SKA)
Temporal Key Integrity Protocol (TKIP)
Asynchronous Communication
38. VPN protocol that can run in other networks (frame relay - X.25 - ATM). Does not provide encryption - lacks the security to be called a true "VPN" solution.
Full-Duplex
Layer 2 Tunneling Protocol (L2TP)
Circuit Switching
Synchronous Data Link Control (SDLC)
39. Type of topology that Uses linear single cable for all computers attached. All traffic travels full cable and can be viewed by all other computers.
Commonly used in Ethernet.
Application Proxy Firewall
Switched Virtual Circuit (SVC)
VoIP
40. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
Iterated Association
DNS (Domain Name System)
Router
OSI Layer 5: Session Layer
41. Altering an ARP table so an IP address is mapped to a different MAC address. Results in traffic being routed to an attacker's computer.
Commonly used in FDDI.
Wireless Application Protocol (WAP)
ARP Poisoning
Simplex: One direction.
42. Type of network device that allows different network segments and/or systems to communicate. When communication takes place - a dedicated connection is set up - so collision and broadcast data is not available to other devices. Combined repeater (hub
Frame Relay
Switch
Attenuation
Shared Key Authentication (SKA)
43. Type of firewall that is a proxy-based firewall solution. It is circuit-based and does not provide any application-based proxies.
SOCKS Firewall
Remote Access Servers
Screened Host Firewall
Distributed Environment Challenge
44. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Wide Area Network (WAN)
Token Ring (802.5)
Metropolitan Area Network (MAN)
Dual-Homed Firewall
45. Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.
High Level Data Link Control (HLDC)
TCP
Definition of Protocol
Asynchronous Transfer Mode (ATM)
46. Type of network device that links 2 or more network segments - where each segment can function as an independent network. Works at the network layer - works with IP addresses - and has more network knowledge than the other hardware.
Plenum-rated Cables
OSI Layer 7: Application
Password Authentication Protocol (PAP)
Router
47. Problems: Central device is a single point of failure.
Channel Service Unit/Data Service Unit (CSU/DSU)
Packet Filtering Firewall
Network Address Translator (NAT)
Star Topology
48. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Dedicated Links
OSI Layer 1: Physical
Packet Switching
Ethernet (802.3)
49. Communication devices that are not synchronized - meaning all devices can send data at will - send a sequence of bits framed with a start and stop bit.
Spam over Internet Telephony (SPIT)
Asynchronous Communication
Router
Virtual Private Network (VPN)
50. Wireless LAN standard that operates in a 5Ghz range - 54Mpbs - and uses OFDM spread spectrum.
CBC-MAC Protocol (CCMP)
Pulse Code Modulation (PCM)
Metropolitan Area Network (MAN)
802.11a