Telecommunications & Network Security Flashcards Preview

CISSP > Telecommunications & Network Security > Flashcards

Flashcards in Telecommunications & Network Security Deck (415)
Loading flashcards...
1

What are the 7 layers of the OSI Model

Physical
Data
Network
Transport
Session
Presentation
Application

2

What is Data encapsulation?

In the OSI Model, Data encapsulation wraps protocol information from the layer immediately above in the data section of the layer immediately below.

3

What are the 4 common network topologies in use today?

Star
Mesh
Ring
Bus

4

Which is the most common network topology in use today? Ring, Bus, Star, Mesh

Star

5

In which topology are all systems interconnected to provide multiple paths to all other resources.
Star, bus, mesh or ring

Mesh

6

In which topology is each individual node connected to a switch, hub or concentrator?
Star, Mesh, Bus, Ring

Star

7

Which network topology is commonly used for the most critical network components, ie routers, switches servers by using multiple NICs, server clustering, etc. to eliminate single points of failure?
Mesh, Bus, Ring, Star

Mesh

8

In which network topology does traffic travel in a single direction?
Star, Bus, Ring, Mesh

Ring

9

In which network topology are all devices connected via a single cable that's terminated on both ends
Star, Bus, Mesh, Ring

Bus

10

What are the 4 basic cable types used in networks?

coaxial, twin-axial, twisted pair and fibre optic

11

Which type of cable is commonly used for cable or satellite television receivers?
twin-axial, coaxial, twisted pair, fibre optic

coaxial

12

Which type of signal conveys information in a series or pulses through the presence or absence of electrical signals as opposed to wave frequencies?
Digital or Analog

Digital

13

Which type of cable is used to achieve high transmission speeds over short distances (often used by SAN's or switches connecting critical servers to a high speed core)
coaxial, fibre optic, twin-axial, twisted pair

Twin-Axial

14

What is Bit Error Ratio?

It's the ratio of incorrectly received bits to total received bits over a specified period of time

15

Which cable is the most common cable used by LAN's today?
Coaxial, Twisted pair, Fibre-optic, twin-axial

twisted pair

16

Twisted pair cabling can be shielded or unshielded. What are the benefits of shielded with regards security?

Reduces electromagnetic emissions which can be intercepted by an attacker. Also protects it from EMI and RFI from other sources.

17

Which term refers to the study of electromagnetic emissions from computers or related equipment?

TEMPEST

18

Which type of CAT cables are available as Shielded Twisted pair only

CAT 7 and CAT 7a

19

Which type of cable uses light signals as opposed to electrical signals?
twisted pair, coaxial, twin-axial, fibre optic

fibre optic

20

Which cable has the advantage or high speed, long distance and best resistance to interference and interference?
twisted pair, coaxial, fibre optic, twin-axial

fibre optic

21

At which layer of the OSI model are network topologies, cable/connector types and interfaces defined

Physical

22

At which layer of the OSI model are NIC cards used?

Physical

23

Which type of card is used to connect a computer to a network?

NIC card

24

What is the term used for a device that amplifies a signal to compensate for attenuation (signal loss)?

Repeater

25

What two devices connect LAN segments together such as servers and workstations?

Hub (concentrator) and Switch

26

What are the two basic types of hubs?

Active and Passive

27

What s the difference between a hub and switch?

A switch sends packets to destination devices as opposed to a hub which will send packets to all devices on the network.

28

At which two layers of the OSI model can a switch operate?

Physical and Data

29

Which layer ensures that messages are delivered to the proper device across a physical network link?

Data

30

Which layer formats messages form layers above into frames for transmission, handles point to point synchronisation and error control and can perform link encryption

Data