The following CISSP Telecom And Network Security MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of CISSP Telecom And Network Security. We encourage you to answer these 30 multiple-choice questions to assess your proficiency.
Please continue by scrolling down.
A. Virtual Private Network (VPN)
B. Challenge Handshake Authentication Protocol (CHAP)
C. Committed Information Rate (CIR)
D. Noise
A. Multi-protocol Label Switching
B. Source Routing
C. OSI Layer 5: Session Layer
D. Definition of Protocol
A. IPSec
B. Network Address Translator (NAT)
C. Layers in the OSI Model
D. Screened Host Firewall
A. Stateful Firewall
B. T3
C. ThinNet - aka 10base2
D. Spread Spectrum
A. Open Relay
B. Service Set ID (SSID)
C. Frame Relay
D. Twisted Pair Cables
A. Bastion Host
B. Iterated Association
C. ThickNet - aka 10base5.
D. VoIP
A. Screened Sub-Net
B. Spread Spectrum
C. Stateful Firewall
D. Synchronous Communication
A. Challenge Handshake Authentication Protocol (CHAP)
B. OSI Layer 2: Data Link Layer
C. Switch
D. Commonly used in Ethernet.
A. T3
B. Iterated Association
C. ThinNet - aka 10base2
D. Application Proxy vs. Circuit Level
A. Definition of Protocol
B. Classless inter-domain routing (CIDR)
C. Remote Access Servers
D. SPIM
A. Commonly used in logical bus - Ethernet - token ring.
B. Router
C. Frequency Hopping Spread Spectrum (FHSS)
D. Layers in the OSI Model
A. Open System Authentication (OSA)
B. Blue Boxing
C. Switch
D. Wide Area Network (WAN)
A. Temporal Key Integrity Protocol (TKIP)
B. Carrier sense multiple access with collision detection (CSMA/CD)
C. DOS attacks from flooding
D. ICMP (Internet Control Message Protocol)
A. ThickNet - aka 10base5.
B. 802.11
C. CBC-MAC Protocol (CCMP)
D. Token Ring (802.5)
A. Asynchronous Communication
B. Carrier sense multiple access with collision detection (CSMA/CD)
C. Spread Spectrum
D. Ethernet (802.3)
A. Synchronous Communication
B. IPSec
C. Channel Service Unit/Data Service Unit (CSU/DSU)
D. Stateful Firewall
A. Fiber Distributed Data Interface (FDDI)
B. IPv6
C. Synchronous Optical Networks (SONETS)
D. Blue Boxing
A. Dynamic Packet Filtering
B. Switch
C. Dedicated Links
D. UDP
A. Ring Topology
B. Layers in the TCP/IP Model
C. 10baseT
D. 802.16
A. Network Address Translator (NAT)
B. Synchronous Data Link Control (SDLC)
C. Half-Duplex
D. IGMP
A. 802.11b
B. TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.
C. Plenum-rated Cables
D. Simplex: One direction.
A. TCP
B. Remote Access Servers
C. Layers in the TCP/IP Model
D. Shared Key Authentication (SKA)
A. Serial Line Internet Protocol (SLIP)
B. Commonly used in FDDI.
C. Private Branch Exchange (PBX)
D. IPSec
A. Session Initiation Protocol (SIP)
B. Proxy Firewall Strengths
C. Pulse Code Modulation (PCM)
D. Spam over Internet Telephony (SPIT)
A. Synchronous Data Link Control (SDLC)
B. Temporal Key Integrity Protocol (TKIP)
C. Ethernet (802.3)
D. Token Passing
A. Layer 2 Tunneling Protocol (L2TP)
B. Integrated Services Digital Network (ISDN)
C. Challenge Handshake Authentication Protocol (CHAP)
D. Synchronous Data Link Control (SDLC)
A. Coaxial Cables
B. Screened Sub-Net
C. Wireless Application Protocol (WAP)
D. Dynamic Packet Filtering
A. Layers in the TCP/IP Model
B. 802.15
C. Twisted Pair Cables
D. Virtual Private Network (VPN)
A. Classless inter-domain routing (CIDR)
B. 802.11
C. OSI Layer 7: Application
D. 10baseT
A. Subnetting
B. Point-To-Point Tunneling Protocol (PPTP)
C. Remote Access Servers
D. Open Relay