SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Telecom And Network Security
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of cabling problem where data is corrupted going from end to end due to surrounding devices.
Bridge
Noise
Synchronous Communication
Asynchronous Communication
2. Layer 3 - layer 4 - and other layer switches have more enhanced functionality than layer 2 switches. Combines switching and routing technologies - packet inspection - traffic prioritization - and quality of service (QoS).
Multilevel Switching
Open System Authentication (OSA)
VLAN
Remote Access Servers
3. Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.
Mesh Topology
Network Address Translator (NAT)
Private Branch Exchange (PBX)
Multilevel Switching
4. Firewall that does not require a proxy for each service; does not provide detailed access control; but does provide for a wider range of protocols.
Application Proxy vs. Circuit Level
Synchronous Optical Networks (SONETS)
High Level Data Link Control (HLDC)
Multilevel Switching
5. As they travel down the OSI model on the source computer - each layer adds its own information so the corresponding layer on the destination machine knows how to process the data.
Asynchronous Communication
IGMP
OSI Data encapsulation
Open Relay
6. Blue tooth vulnerability where an attacker sends messages to a receiver that is in discovery mode.
Packet Filtering Firewall
Bluejacking
CBC-MAC Protocol (CCMP)
Subnetting
7. Protocol based on the SDLC protocol - except it is an open protocol - supports full-duplex connections - and provides a higher throughput. It also provides polling - which enables secondary units to communicate with primary units.
High Level Data Link Control (HLDC)
Commonly used in Internet.
DNS (Domain Name System)
T1
8. Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.
Attenuation
Asynchronous Transfer Mode (ATM)
IPSec
Challenge Handshake Authentication Protocol (CHAP)
9. Works like a private line for a customer with an agreed upon bandwidth. Path is programmed into the WAN devices.
ThinNet - aka 10base2
VoIP
Permanent Virtual Circuit (PVC)
Dual-Homed Firewall
10. Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.
VoIP
Token Ring (802.5)
802.16
Dedicated Links
11. OSI layer that provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals. Protocols at this level HSSI (High Speed Serial Interface) - X.21 - EIA/TIA 232 and 449.
UDP
Dedicated Links
DNS (Domain Name System)
OSI Layer 1: Physical
12. Type of wireless security standard that uses AES in CBC mode.
Ring Topology
Spam over Internet Telephony (SPIT)
CBC-MAC Protocol (CCMP)
Challenge Handshake Authentication Protocol (CHAP)
13. OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.
OSI Layer 5: Session Layer
Cable Modem
802.11a
Plenum-rated Cables
14. Used when a LAN device needs to communicate with WAN devices over telephone lines. Ensures the necessary electrical signaling and format are used. Interfaces with Data Terminal Equipment (DTE) and Data Circuit-Terminal Equipment (DCE).
Frame Relay
Channel Service Unit/Data Service Unit (CSU/DSU)
Ring Topology
Remote Access Servers
15. The original technique to digitized voice with 8 bits of sampling 8 -000 times per second - which yields 64 Kbps for one voice channel.
Pulse Code Modulation (PCM)
Multistation Access Unit (MAU)
Shared Key Authentication (SKA)
Synchronous Data Link Control (SDLC)
16. Both directions - both applications can send information at a time. Session Layer Communication Modes
Commonly used in Internet.
Full-Duplex
Layers in the TCP/IP Model
LLC (Logical Link Control - 802.2)
17. Communication process that must deliver data with set time constraints. Applications are typically video related where audio and must match perfectly. VoIP is another example.
Ethernet (802.3)
Bus Topology
Isochronous Communication Processes
Integrated Services Digital Network (ISDN)
18. Type of network layout that is a large geographical region connecting more that one LAN.
Mesh Topology
Wide Area Network (WAN)
X.25
Layer 2 Tunneling Protocol (L2TP)
19. OSI layer that prepares data for the network medium by framing it into LAN/WAN frames. Defines how the physical layer transmits the network packets. Protocols at this layer ARP (Address Resolution Protocol) - RARP (Reverse Address Resolution Protocol
Packet Filtering Firewall
Stateful Firewall
OSI Layer 2: Data Link Layer
Bridge
20. Protocol that is best-effort - connectionless - and does not sent acknowledgements.
Synchronous Communication
UDP
Permanent Virtual Circuit (PVC)
Reverse Address Resolution Protocol (RARP )
21. Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.
Bluejacking
IPSec
Ethernet (802.3)
Circuit Switching
22. OSI layer that formats data into a standardized format and deals with the syntax of data - not the meaning. Example formats are ASCII - GIF - JPG - MPEG.
OSI Layer 6: Presentation
Multilevel Switching
Kernel Proxy Firewall
Noise
23. Standard that outlines wireless personal area network (WPAN) technologies.
802.15
Router
Frame Relay
DNS (Domain Name System)
24. OSI layer that provides routing - addressing - and fragmentation of packets. This layer can determine alternative routes to avoid network congestion. Protocols that use this layer are IP - ICMP - RIP - OSPF (Open Shortest Path First) - BGP (Border Ga
OSI Layer 3: Network Layer
Reverse Address Resolution Protocol (RARP )
Repeaters
IPv6
25. VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).
Channel Service Unit/Data Service Unit (CSU/DSU)
Star Topology
IPSec
Packet Filtering Firewall
26. Type of topology that uses a bus that does not have a one linear cable - but instead uses branches of cables. Commonly used in Ethernet.
OSI Layer 5: Session Layer
Tree Topology
Service Set ID (SSID)
Token Passing
27. A technique that allows multiple layers of nesting. Example - IPSec tunnel can originate or terminate at a different IPSec site along the way.
Iterated Association
Wireless Application Protocol (WAP)
Layers in the OSI Model
OSI Data encapsulation
28. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same cable.
Asynchronous Communication
Bus Topology
FDDI-2
Noise
29. Type of firewall that keeps track of each communication session. It must maintain a state table that contains data about each connection. 3rd generation firewall - runs at the network layer.
Stateful Firewall
Cable Modem
Source Routing
Loki Attack
30. Type of ethernet implementation that uses twisted-pair copper wiring and transmits at 100Mbps.
CBC-MAC Protocol (CCMP)
ThickNet - aka 10base5.
10baseT
Extensible Authentication Protocol (EAP)
31. Malware attack that sends commands inside of an ICMP packet.
Coaxial Cables
Circuit Switching
Loki Attack
Remote Access Servers
32. Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.
ARP (Address Resolution Protocol)
ThinNet - aka 10base2
ARP Poisoning
IPv6
33. Transmits high speed bandwidth over phone lines. Provides data rates up to 52 Mpbs using line of 1000 feet or less. Must be within 2.5 miles of a central office.
Proxy Firewall
Digital Subscriber Line (DSL)
FDDI-2
Switch
34. Type of wireless authentication where a shared WEP key is used to encrypt a nonce for authentication.
Digital Subscriber Line (DSL)
Layer 2 Tunneling Protocol (L2TP)
Integrated Services Digital Network (ISDN)
Shared Key Authentication (SKA)
35. Problems: If one station experiences a problem - it can negatively affect surrounding computers on the same ring.
OSI Layer 5: Session Layer
Blue Boxing
Dual-Homed Firewall
Ring Topology
36. Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.
Dynamic Packet Filtering
Cable Modem
Pulse Code Modulation (PCM)
Remote Access Servers
37. Protocol that is used by remote users to authenticate over PPP lines. Sends passwords over clear text. Vulnerable to MITM attacks.
Switch
Password Authentication Protocol (PAP)
Layer 2 Tunneling Protocol (L2TP)
Synchronous Data Link Control (SDLC)
38. Type of cabling problem where loss of signal strength occurs as it travels due to cable exceeding its recommended length.
Loki Attack
Attenuation
802.11a
SPIM
39. Type of cable that carries data as light waves - expensive - can transmit data at high speeds - difficult to tap into - and is resistant to EMI. Most secure cabling option - but vulnerable to dispersion.
Trunk Lines
Fiber-optic Cables
TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
Carrier sense multiple access with collision detection (CSMA/CD)
40. In a token ring network - each computer is connected to this - which acts as a central hub.
Open System Authentication (OSA)
Multistation Access Unit (MAU)
Asynchronous Communication
Wide Area Network (WAN)
41. Type of backbone network that joins together LAN to other LANs and WANs to LANs - etc. Typically known as Synchronous Optical Networks (SONETS) or FDDI rings.
Metropolitan Area Network (MAN)
Dynamic Packet Filtering
Screened Host Firewall
ICMP (Internet Control Message Protocol)
42. Type of firewall that lies between the perimeter router and and LAN.
Synchronous Optical Networks (SONETS)
SPIM
Private Branch Exchange (PBX)
Screened Host Firewall
43. Created because it was clear that available IP addresses were running out. Provides flexibility to increase or decrease the IP classes sizes as necessary.
Mesh Topology
Classless inter-domain routing (CIDR)
Ring Topology
Private Branch Exchange (PBX)
44. Protocol based on the first version - however this version allows for fixed bandwidth to be allocated for specific applications.
802.16
FDDI-2
Frequency Hopping Spread Spectrum (FHSS)
OSI Layer 5: Session Layer
45. Type of ethernet implementation that uses a thicker coaxial cable - which allows a longer cable length to be used.
Dedicated Links
Definition of Protocol
802.16
ThickNet - aka 10base5.
46. Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-
Direct Sequence Spread Spectrum (DSSS)
Point-To-Point (PPP)
Proxy Firewall
Frequency Hopping Spread Spectrum (FHSS)
47. If the packet header information is used to determine destinations rather than the routes configured into the router. Packets with this information should be dropped.
Source Routing
Wireless Application Protocol (WAP)
Bridge
Network Address Translator (NAT)
48. More complexity and drastically increases the difficultly of access control. Many different devices - services - and users make it difficult to know which entities to trust and to what degree.
Stateful Firewall
Synchronous Communication
Dual-Homed Firewall
Distributed Environment Challenge
49. VPN protocol that works at the data link layer - can only run in IP networks - and provides encryption and encapsulation. This is Microsoft's VPN solution.
802.11
Point-To-Point Tunneling Protocol (PPTP)
Bridge
Channel Service Unit/Data Service Unit (CSU/DSU)
50. Strengths of a type of firewall: Better security than packet filtering. Looks at all info in the packet - up to the application layer. Breaks the connection between trusted and untrusted systems. Weaknesses include limited number of applications supp
Proxy Firewall Strengths
Repeaters
Coaxial Cables
Stateful Firewall