CISSP Telecom And Network Security MCQs

CISSP Telecom And Network Security MCQs

The following CISSP Telecom And Network Security MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of CISSP Telecom And Network Security. We encourage you to answer these 30 multiple-choice questions to assess your proficiency.
Please continue by scrolling down.

1: Type of cabling problem where data is corrupted going from end to end due to surrounding devices.

A.   Virtual Private Network (VPN)

B.   Challenge Handshake Authentication Protocol (CHAP)

C.   Committed Information Rate (CIR)

D.   Noise

2: OSI layer that sets up - maintains - and breaks down the dialog (session) between two applications. Controls dialog organization and synchronization. Protocols that work at this layer are NFS (Network File System) - SQL - NetBIOS - RPC.

A.   Multi-protocol Label Switching

B.   Source Routing

C.   OSI Layer 5: Session Layer

D.   Definition of Protocol

3: Used when companies do not want systems to know internal hosts IP addresses. Enables companies to use private - nonroutable IP addresses.

A.   IPSec

B.   Network Address Translator (NAT)

C.   Layers in the OSI Model

D.   Screened Host Firewall

4: Wireless communication that distributes individual signals across the allocated frequencies.

A.   Stateful Firewall

B.   T3

C.   ThinNet - aka 10base2

D.   Spread Spectrum

A.   Open Relay

B.   Service Set ID (SSID)

C.   Frame Relay

D.   Twisted Pair Cables

6: Combines voice and data over the same IP network media and protocol. Reduces the cost of implementing and maintaining two different networks.

A.   Bastion Host

B.   Iterated Association

C.   ThickNet - aka 10base5.

D.   VoIP

7: Network segment name for a DMZ created by two physical firewalls.

A.   Screened Sub-Net

B.   Spread Spectrum

C.   Stateful Firewall

D.   Synchronous Communication

8: Protocol that addresses vulnerabilities found in PAP. Uses challenge/response mechanism to authenticate the user instead of sending password.

A.   Challenge Handshake Authentication Protocol (CHAP)

B.   OSI Layer 2: Data Link Layer

C.   Switch

D.   Commonly used in Ethernet.

9: Type of ethernet implementation that uses a standard coaxial cable with a maximum cable length of 185 meters. 10Mbps.

A.   T3

B.   Iterated Association

C.   ThinNet - aka 10base2

D.   Application Proxy vs. Circuit Level

10: Set of rules that dictates how computer communicate over networks.

A.   Definition of Protocol

B.   Classless inter-domain routing (CIDR)

C.   Remote Access Servers

D.   SPIM

11: Wireless communication that splits total amount of bandwidth into smaller sub-channels. Send and receiver work in one of the channels for a period of time - and then move into a different channel. It uses a portion of the bandwidth - throughput of 1-

A.   Commonly used in logical bus - Ethernet - token ring.

B.   Router

C.   Frequency Hopping Spread Spectrum (FHSS)

D.   Layers in the OSI Model

12: The process of simulating a 2600Hz frequency tone - which allowed attackers to gain free long distance phone service.

A.   Open System Authentication (OSA)

B.   Blue Boxing

C.   Switch

D.   Wide Area Network (WAN)

13: Protocol where all computers compete for the shard network cable - listen to learn when they can transmit data - susceptible to data collisions. Used by Ethernet.

A.   Temporal Key Integrity Protocol (TKIP)

B.   Carrier sense multiple access with collision detection (CSMA/CD)

C.   DOS attacks from flooding

D.   ICMP (Internet Control Message Protocol)

14: Older LAN implementation that uses a token-passing technology. Can send a beacon frame to indicate that a certain computer is failing and its neighbors should reconfigure and work around the detected fault.

A.   ThickNet - aka 10base5.

B.   802.11

C.   CBC-MAC Protocol (CCMP)

D.   Token Ring (802.5)

15: Most commonly used LAN implementation today. Considered a "chatty" protocol because it allows all systems to hear each other's broadcasts. Has many collisions because all systems share the same medium. Can operate at 10 to 1000 Mbps.

A.   Asynchronous Communication

B.   Carrier sense multiple access with collision detection (CSMA/CD)

C.   Spread Spectrum

D.   Ethernet (802.3)

16: VPN protocol that works at the network layer - handles multiple connections - provides secure authentication and encryption. Tunnel mode option (payload and header encrypted) - or transport mode (only payload is encrypted).

A.   Synchronous Communication

B.   IPSec

C.   Channel Service Unit/Data Service Unit (CSU/DSU)

D.   Stateful Firewall

17: Type of LAN and MAN technology - usually used for backbones - that uses token-passing technology and has redundant rings in case the primary ring goes down.

A.   Fiber Distributed Data Interface (FDDI)

B.   IPv6

C.   Synchronous Optical Networks (SONETS)

D.   Blue Boxing

18: Most expensive type of WAN connection because the fee is based on distance between the two points rather than the amount of bandwidth used. Examples - T1 and T3.

A.   Dynamic Packet Filtering

B.   Switch

C.   Dedicated Links

D.   UDP

19: Standard that addresses wireless MAN technologies.

A.   Ring Topology

B.   Layers in the TCP/IP Model

C.   10baseT

D.   802.16

20: Protocol for allowing multi-cast (one to many) communication

A.   Network Address Translator (NAT)

B.   Synchronous Data Link Control (SDLC)

C.   Half-Duplex

D.   IGMP

21: In the OSI layer 5 - these are the types of what?

A.   802.11b

B.   TCP/IP. TCP is reliable and connection oriented - IP is unreliable and connectionless.

C.   Plenum-rated Cables

D.   Simplex: One direction.

22: Protocol that is reliable and connection-oriented - which means it ensures delivery through acknowledgements - sequencing - detection and correction.

A.   TCP

B.   Remote Access Servers

C.   Layers in the TCP/IP Model

D.   Shared Key Authentication (SKA)

23: Device used within companies to provide multiple services to users throughout a building or facility. Example - dialing 9 to place outbound phone calls. Security concerns: default configurations and passwords - maintenance modems disabled - unused co

A.   Serial Line Internet Protocol (SLIP)

B.   Commonly used in FDDI.

C.   Private Branch Exchange (PBX)

D.   IPSec

24: Application layer request/response protocol widely used for VoIP communication sessions. Transported by UDP - makes use of TCP - and is vulnerable to sniffing attacks.

A.   Session Initiation Protocol (SIP)

B.   Proxy Firewall Strengths

C.   Pulse Code Modulation (PCM)

D.   Spam over Internet Telephony (SPIT)

25: Security wireless standard that rotates encryption keys - stronger IV values - MAC codes for packet integrity. Works in combination with WEP.

A.   Synchronous Data Link Control (SDLC)

B.   Temporal Key Integrity Protocol (TKIP)

C.   Ethernet (802.3)

D.   Token Passing

26: Developed to replace the aging telephone and analog systems. BRI rate that uses two B channels (send/receive) - and one D channel (control information) - and PRI rate that uses up to 23 B channels. Supports voice - data - and video. Provides up to 1.

A.   Layer 2 Tunneling Protocol (L2TP)

B.   Integrated Services Digital Network (ISDN)

C.   Challenge Handshake Authentication Protocol (CHAP)

D.   Synchronous Data Link Control (SDLC)

27: Dynamically builds ACL's to allow internal systems to communicate with external systems. Once the connection is finished - the ACL is removed from the list. 4th generation firewall.

A.   Coaxial Cables

B.   Screened Sub-Net

C.   Wireless Application Protocol (WAP)

D.   Dynamic Packet Filtering

A.   Layers in the TCP/IP Model

B.   802.15

C.   Twisted Pair Cables

D.   Virtual Private Network (VPN)

29: Wireless LAN standard. Variations include 802.11a - b - f - g - and i. Commonly accepts are 802.11b and g.

A.   Classless inter-domain routing (CIDR)

B.   802.11

C.   OSI Layer 7: Application

D.   10baseT

30: Server that can be configured to hang up and call back remote users - but this can be compromise by enabling call forwarding.

A.   Subnetting

B.   Point-To-Point Tunneling Protocol (PPTP)

C.   Remote Access Servers

D.   Open Relay