Home > Articles

CISSP Cert Guide: Telecommunications and Network Security

  • Print
  • + Share This
Prepare for the Telecommunications and Network Security section of the CISSP Certification exam.
This chapter is from the book

This chapter is from the book

Exam Preparation Tasks

Review All Key Topics

Review the most important topics in this chapter, noted with the Key Topics icon in the outer margin of the page. Table 3-11 lists a reference of these key topics and the page numbers on which each is found.

Table 3-11 Key Topics

Key Topic Element

Description

Page Number

Figure 3-1

Protocol Mappings

70

Figure 3-2

TCP/IP and OSI models

71

Figure 3-4

TCP three-way handshake

74

Figure 3-6

Encapsulation and de-encapsulation

76

Table 3-1

Common UDP and TCP ports

77

Table 3-2

Classful IP addressing

80

Table 3-3

Private IP address ranges

81

Table 3-4

Twisted-pair categories

89

Table 3-6

Ethernet implementations

95

Ordered steps

CSMA/CD

99

Ordered steps

CSMA/CA

100

Section

Cloud computing services

117

Table 3-7

T carriers

121

Table 3-8

E-carriers

122

Table 3-9

Optical carriers

122

Section

WLAN Standards

138

Table 3-10

WPA and WPA2

141

Define Key Terms

Define the following key terms from this chapter and check your answers in the glossary:

  • Open Systems Interconnect (OSI) model
  • Application layer
  • Presentation layer
  • Session layer
  • Transport layer (layer 4)
  • Network layer (layer 3)
  • Data Link layer (layer 2)
  • Physical layer (layer 1)
  • TCP/IP model
  • TCP three-way handshake
  • Internet Protocol (IP)
  • Internet Message Control Protocol (ICMP)
  • Internet Group Messaging Protocol (IGMP)
  • Address Resolution Protocol (ARP)
  • Encapsulation
  • Private IP addresses
  • Media Access Control (MAC) addresses
  • Digital
  • Asynchronous transmission
  • Synchronous transmission
  • Baseband
  • Time Division Multiplexing (TDM)
  • Broadband
  • Frequency Division Multiplexing (FDM)
  • Unicast
  • Multicast
  • Broadcast
  • Attenuation
  • Coaxial
  • Thicknet
  • Thinnet
  • Twisted Pair
  • Radio Frequency Interference (RFI)
  • EMI
  • Fiberoptic
  • Single mode
  • Multi-mode
  • Ring
  • Bus
  • Star
  • Mesh
  • Hybrid
  • Ethernet
  • Token Ring
  • Fiber Distributed Data Interface (FDDI)
  • Carrier Sense Multiple Access Collision Detection (CSMA/CD)
  • Carrier Sense Multiple Access Collision Avoidance (CSMA/CA)
  • token passing
  • polling
  • Dynamic Host Configuration Protocol (DHCP)
  • DNS
  • File Transfer Protocol (FTP)
  • FTPS
  • Secure File Transfer Protocol (SFTP)
  • HTTP
  • Hypertext Transfer Protocol Secure (HTTPS)
  • SHTTP
  • Internet Message Access Protocol (IMAP)
  • Network Address Translation (NAT)
  • Port Address Translation (PAT)
  • Post Office Protocol (POP)
  • Simple Mail Transfer Protocol (SMTP)
  • Simple Network Management Protocol (SNMP)
  • distance vector
  • link state
  • hybrid
  • Routing Internet Protocol (RIP)
  • Open Shortest Path First (OSPF)
  • Interior Gateway Protocol
  • Enhanced IGRP (EIGRP)
  • Virtual Router Redundancy Protocol (VRRP)
  • Intermediate System to Intermediate System (IS-IS)
  • Border Gateway Protocol (BGP)
  • patch panels
  • multiplexer
  • demultiplexer
  • hub
  • switches
  • VLANs
  • layer 3 switch
  • layer 4 switches
  • routers
  • gateway
  • Network Access Server (NAS)
  • firewall
  • packet filtering firewalls
  • stateful firewalls
  • proxy firewalls
  • circuit level proxies
  • SOCKS firewall
  • application-level proxies
  • dynamic packet filtering firewall
  • kernel proxy firewall
  • bastion host
  • dual-homed firewall
  • three legged firewall
  • DMZ
  • screened host
  • screened subnet
  • virtual firewalls
  • proxy firewall
  • private branch exchange (PBX)
  • honeypots
  • honeynets
  • cloud computing
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
  • LAN
  • intranet
  • extranet
  • Metropolitan Area Network (MAN)
  • Metro Ethernet
  • wide area networks (WANs)
  • T carriers
  • fractional T1
  • E carriers
  • Synchronous Optical Networks (SONET)
  • Channel Service Unit/Data Service Unit (CSU/DSU)
  • circuit-switching networks
  • packet-switching networks
  • Asynchronous Transfer Mode (ATM)
  • X.25
  • Switched Multimegabit Data Service (SMDS)
  • Point-to-Point Protocol (PPP)
  • HSSI
  • PSTN
  • VOIP
  • Signaling System 7 (SS7)
  • Session Initiation Protocol (SIP)
  • dial-up
  • SLIP
  • Integrated Services Digital Network (ISDN)
  • Basic Rate (BRI)
  • Primary Rate (PRI)
  • Digital Subscribers Line (DSL)
  • Asymmetric DSL (ADSL)
  • High Bit Data Rate DSL (HDSL)
  • Very High Bit Data Rate DSL (VDSL)
  • cable modems
  • Data-Over-Cable Service Interface Specifications (DOCSIS)
  • Virtual Private Network (VPN)
  • PPTP
  • L2TP
  • IPsec
  • Authentication Header (AH)
  • Encapsulating Security Payload (ESP)
  • Internet Security Association and Key Management Protocol (ISAKMP)
  • Internet Key Exchange (IKE)
  • TACACS+
  • RADIUS
  • supplicant
  • authenticator
  • authenticating server
  • Password Authentication Protocol (PAP)
  • Challenge Handshake Authentication Protocol (CHAP)
  • Extensible Authentication Protocol (EAP)
  • Telnet
  • Transport Layer Security/Secure Sockets Layer (TLS/SSL)
  • Frequency Hopping Spread Spectrum (FHSS)
  • Direct Sequence Spread Spectrum (DSSS)
  • Orthogonal Frequency Division Multiplexing (OFDM)
  • Frequency Division Multiple Access (FDMA)
  • Code Division Multiple Access (CDMA)
  • Global System Mobile (GSM)
  • phone cloning
  • access point
  • Service Set Identifier (SSID)
  • Infrastructure mode
  • Ad Hoc mode
  • 802.11a
  • 802.11b
  • 802.11f
  • 802.11g
  • 802.11n
  • Multiple Input Multiple Output
  • Bluetooth
  • bluejacking
  • bluesnarfing
  • infrared
  • Wired Equivalent Privacy (WEP)
  • Wi-Fi Protected Access (WPA)
  • WPA2
  • noise
  • attenuation
  • crosstalk
  • Ping of Death
  • Distributed Denial of Service (DDOS)
  • Smurf attack
  • ping scanning
  • DNS cache poisoning attack
  • DNSSEC (DNS security)
  • URL hiding
  • domain grabbing
  • cybersquatting
  • email spoofing
  • phishing
  • spear phishing
  • whaling
  • spam
  • wardriving
  • warchalking
  • SYN ACK attack
  • session highjacking attack
  • port scan
  • teardrop
  • IP address spoofing

Review Questions

  1. At which layer of the OSI model does the encapsulation process begin?

    1. Transport
    2. Application
    3. Physical
    4. Session
  2. Which two layers of the OSI model are represented by the Link layer of the TCP/IP model? (Choose two.)

    1. Data Link
    2. Physical
    3. Session
    4. Application
    5. Presentation
  3. Which of the following represents the range of port numbers that are referred to as “well-known” port numbers?

    1. 49152–65535
    2. 0–1023
    3. 1024–49151
    4. all above 500
  4. What is the port number for HTTP?

    1. 23
    2. 443
    3. 80
    4. 110
  5. What protocol in the TCP/IP suite resolves IP addresses to MAC addresses?

    1. ARP
    2. TCP
    3. IP
    4. ICMP
  6. How many bits are contained in an IPv4 IP address?

    1. 128
    2. 48
    3. 32
    4. 64
  7. Which of the following is a Class C address?

    1. 172.16.5.6
    2. 192.168.5.54
    3. 10.6.5.8
    4. 224.6.6.6
  8. Which of the following is a private IP address?

    1. 10.2.6.6
    2. 172.15.6.6
    3. 191.6.6.6
    4. 223.54.5.5
  9. Which service converts private IP addresses to public IP addresses?

    1. DHCP
    2. DNS
    3. NAT
    4. WEP
  10. Which type of transmission uses stop and start bits?

    1. Asynchronous
    2. Unicast
    3. Multicast
    4. Synchronous

Answers and Explanations

  1. b. The Application Layer (layer 7) is where the encapsulation process begins. This layer receives the raw data from the application in use and provides services such as file transfer and message exchange to the application (and thus the user).
  2. a, b. The Link layer of the TCP/IP model provides the services provided by both the Data Link and the Physical layers in the OSI model.
  3. b. System Ports, also called well-known ports, are assigned by the IETF for standards-track protocols, as per [RFC6335].
  4. c. The listed ports numbers are as follows:

    • 23–Telnet
    • 443–HTTPS
    • 80–HTTP
    • 110–POP3
  5. a. Address Resolution Protocol (ARP) resolves IP addresses to MAC addresses.
  6. c. IPv4 addresses are 32 bits in length and can be represented in either binary or in dotted decimal format.
  7. b. The calls C range of addresses is from 192.0.0.0 -223.255.255.255.
  8. a.

    Here are the private IP address ranges:

    Class

    Range

    Class A

    10.0.0.0 – 10.255.255.255

    Class B

    172.16.0.0 – 172.31.255.255

    Class C

    192.168.0.0 – 192.168.255.255

  9. c. Network Address Translation (NAT) is a service that can be supplied by a router or by a server. The device that provides the service stands between the local LAN and the Internet. When packets need to go to the Internet, the packets go through the NAT service first. The NAT service changes the private IP address to a public address that is routable on the Internet. When the response is returned from the Web, the NAT service receives it and translates the address back to the original private IP address and sends it back to the originator.
  10. a. With asynchronous transmission, the systems use what are called start and stop bits to communicate when each byte is starting and stopping. This method also uses what are called parity bits to be used for the purpose of ensuring that each byte has not changed or been corrupted en route. This introduces additional overhead to the transmission.
  • + Share This
  • 🔖 Save To Your Account