Domain 4 CISSP Exam: Communication and Network Security

DOMAIN 4: Communication and Network Security

1 / 135

What is 802.1X/EAP in the context of network security?

2 / 135

What is the maximum number of networks per class A range of IPv4 address?

3 / 135

What is the benefit of using centralized remote authentication services for remote access clients?

4 / 135

Which of the following is an example of a centralized remote authentication service?

5 / 135

Which of the following is NOT one of the basic goals for the use of NAC?

6 / 135

Which type of firewall operates at the OSI model session layer and only verifies the TCP handshaking is complete?

7 / 135

What is the maximum data transfer rate of Gigabit Ethernet?

8 / 135

What is the primary protocol for securing web traffic that has replaced SSL?

9 / 135

Which type of network allows an organization to share select information with vendors, customers, and other external parties?

10 / 135

What is the benefit of using converged protocols?

11 / 135

What is the difference between a LAN and a WAN?

12 / 135

How many channels are allocated for the 2.4 GHz frequency in the United States and why do other countries have different numbers of channels?

13 / 135

What is the primary purpose of IKE protocol in IPSec suite?

14 / 135

Which type of antenna sends signals in all directions away from the antenna?

15 / 135

What does the XX in a network cables naming convention represent?

16 / 135

What is the maximum number of VXLANs that can be created in a domain?

17 / 135

Which of the following is a connection of multiple LANs throughout an entire city?

18 / 135

Which IEEE 802.11 standard amendment offers the highest maximum data rate?

19 / 135

Which layer of the SDN architecture is responsible for determining how traffic should flow based on the status of the infrastructure layer and the requirements specified by the application layer?

20 / 135

What is Fibre Channel over Ethernet (FCoE)?

21 / 135

What is the primary purpose of twisting pairs in twisted-pair cabling?

22 / 135

What is the use of the Kerberos protocol?

23 / 135

What is the key difference between 4G and 5G cellular technologies?

24 / 135

Which of the following is a security effect caused by the use of multimedia collaboration tools for remote meetings?

25 / 135

What is the main reason hubs are prohibited in organizations?

26 / 135

Which layer of the OSI model supports network access for software applications and provides an interface for the user?

27 / 135

What is the first step in securing SMTP servers?

28 / 135

What was the improvement made by TKIP over WEP?

29 / 135

What is a LAN extender?

30 / 135

At which OSI layer does a stateful inspection firewall operate?

31 / 135

What is the difference between WPA and WPA2?

32 / 135

Which VPN protocol operates on any LAN protocol?

33 / 135

Which protocol is considered a reliable protocol due to its guarantees of delivery by acknowledging packets, checking for missing or corrupted packets, and requesting retransmission, when necessary?

34 / 135

What is a benefit of using fiber-optic cable over copper wiring?

35 / 135

In a ring topology, what is the purpose of the digital token that is passed around the circle?

36 / 135

Which protocol operates at layer 2 on IP networks and encapsulates the PPP packets to create a point-to-point tunnel connecting two separate systems?

37 / 135

What is a botnet used for in a Distributed Denial-of-Service (DDoS) attack?

38 / 135

What is network virtualization?

39 / 135

Which of the following is a feature of software-defined security (SDS)?

40 / 135

Why are IoT devices vulnerable to attacks?

41 / 135

Which VPN protocol encrypts session establishment during the authentication process?

42 / 135

Which network has the largest coverage and is the most commonly used wide area network (WAN)?

43 / 135

Which type of firewall operates only at the session layer (layer 5) of the OSI model, and ensures that the TCP handshaking is complete without inspecting any actual packet?

44 / 135

Which of the following is a potential security benefit of Li-Fi over Wi-Fi?

45 / 135

Which physical topology of a network connects all nodes to a central device, and creates a point of failure at the central device?

46 / 135

What is MPLS commonly labeled as in the context of the OSI Model?

47 / 135

Which security features are included in the ZigBee standard?

48 / 135

Which of the following protocols is responsible for resolving the hardware address of a host from a given IP address on the internet layer of the TCP/IP reference model?

49 / 135

Which of the following best describes the security feature provided by PEAP in network communication?

50 / 135

Which type of security solution continuously monitor endpoint and network events to detect, investigate, and respond to suspicious activities on all types of endpoints?

51 / 135

What function does a spanning tree algorithm serve in bridges?

52 / 135

Which of the following is an example of a centralized remote authentication service?

53 / 135

What is the primary responsibility of the presentation layer in the OSI model?

54 / 135

Which layer(s) does a gateway device operate at and what is its main function?

55 / 135

Which of the following is the slowest type of firewall?

56 / 135

Which statement about coaxial cable is true?

57 / 135

What is a WAN?

58 / 135

Which type of firewall operates at the OSI models network layer (layer 3) and inspects each packet, dropping and/or logging the packet if it breaks the established rules?

59 / 135

What is the primary use of Frame Relay?

60 / 135

What is the technical term for the string of characters that identifies a wireless network?

61 / 135

What is a best practice for protecting mobile device data?

62 / 135

What is the key benefit of a mesh topology in a network system?

63 / 135

What is a common application for remote control or remote access?

64 / 135

Which layer of the OSI Model is responsible for data transmission between neighboring nodes?

65 / 135

What is a SYN flooding attack?

66 / 135

What is a disadvantage of a bus topology?

67 / 135

Which of the following is an advantage of using centralized remote authentication services such as RADIUS?

68 / 135

What is the first action to take in creating wireless access with a wireless access point (WAP)?

69 / 135

Which encryption standard is currently considered highly insecure and should not be used?

70 / 135

What is VoIP?

71 / 135

What is a multihomed firewall?

72 / 135

What is a common and effective attack method in email security?

73 / 135

What is iSCSI and what is it mainly used for?

74 / 135

Which of the following network components provides the most secure method of transmitting data between two parties?

75 / 135

Which method is used by all microsegmentation techniques for logical separation of functions in a network from their underlying structures?

76 / 135

Which network attack involves creating a fake website or email to trick victims into providing sensitive information?

77 / 135

What are the most widely used LAN technologies for local area network?

78 / 135

What is the purpose of the MITRE ATT&CK knowledge base?

79 / 135

What is the goal of implementing microsegmentation in a network?

80 / 135

A strong authentication system is required when managing remote access to a corporate network. What is the standard to protect sensitive information?

81 / 135

Which of the following is true for IPv4 and IPv6?

82 / 135

What is one of the major concerns when selecting network cabling, from a security standpoint?

83 / 135

What is the current protocol version for SOCKS that also provides authentication?

84 / 135

Which layer do repeaters, concentrators, and amplifiers operate on?

85 / 135

Which of the following is a commonly used data communications framework?

86 / 135

Which of the following is responsible for controlling how devices on a network gain permission to transmit data, and provides an addressing mechanism and channel access so nodes on a network can communicate with each other, working at the data link layer (layer 2)?

87 / 135

What is VLAN hopping?

88 / 135

What is a screened subnet?

89 / 135

What is a benefit of IPv6 over IPv4?

90 / 135

What are the two basic modes of Wi-Fi?

91 / 135

What is a switch?

92 / 135

What is a hijacking attack?

93 / 135

Which layer of the TCP/IP reference model is responsible for making sure that data is properly formatted for transmission and that its sent to the appropriate destination IP address?

94 / 135

What is one of the advantages of WPA3 over WPA2?

95 / 135

What is the purpose of a broadcast domain?

96 / 135

What is the purpose of a firewall in a network environment?

97 / 135

What is a Local Area Network (LAN)?

98 / 135

Which of the following is a remote authentication protocol that an organization can use to strengthen credential management and permissions for remote clients and users?

99 / 135

What is a benefit of a star topology?

100 / 135

What is a concern in terms of integrity in secure voice transmissions?

101 / 135

Which of the following email security standards provides both authentication and confidentiality services for emails?

102 / 135

Which of the following is not a widely supported EAP method of authentication?

103 / 135

Which layer is responsible for the transmission and reception of raw data across a transmission medium and converts digital bits into electrical signals or other forms of energy?

104 / 135

What is war droning?

105 / 135

What is an important mechanism for establishing security expectations with an external party and holding them accountable if those expectations are not met?

106 / 135

Which protocol uses hop count and is an example of distance-vector routing protocol for the network layer?

107 / 135

Which type of firewall operates at the OSI models network layer and offers no authentication mechanism but is the fastest design and can mitigate the risk of a particular packet type?

108 / 135

Which of the following is a method that a user might use to access corporate compute and storage platforms from another location while working remotely?

109 / 135

Which band can a wireless router operate on to provide data transfer rates of more than 450 Mbps?

110 / 135

What is the downside of using MAC filters for wireless access control?

111 / 135

What is the maximum number of segments allowed in a network that follows the 5-4-3 rule?

112 / 135

What is the benefit of using both static and dynamic routing in a network?

113 / 135

What attacks are possible with Voice over Internet Protocol (VoIP) technology?

114 / 135

Which of the following is a common secure communications protocol that provides security services for communications channels as well as secure authentication services?

115 / 135

What is the purpose of domain separation in network architecture?

116 / 135

What security risk does Instant Messaging face in terms of confidentiality?

117 / 135

What is the most common application of VPNs?

118 / 135

What is Tunnel Mode in IPSec?

119 / 135

Which of the following is a primary mode of operation when a session is established, in which data is sent over a connection between two devices in both directions at the same time?

120 / 135

What is a bastion host, and how does it add a layer of protection to the internal network?

121 / 135

What are the four characteristics of SD-WAN according to Gartner?

122 / 135

What is one downside of content distribution networks?

123 / 135

What is one of the principal issues with wireless technology?

124 / 135

What is one advantage of Network Address Translation (NAT)?

125 / 135

What is the purpose of tamper detection in preventing MITM attacks?

126 / 135

What is a primary security concern for antennas in wireless access placement?

127 / 135

Which of the following protocols was created to replace WEP and TKIP/WPA, is the preferred standard for security in 802.11 wireless networking, uses AES with a 128-bit key, and is the standard encryption mechanism used in WPA2 and WPA3?

128 / 135

Which application layer protocol is used for the exchange of user information on the World Wide Web and supports websites?

129 / 135

What is the reason for SSH-2 being considered more secure than SSH-1?

130 / 135

What is a captive portal used for in wireless networks?

131 / 135

What is a Personal Area Network (PAN)?

132 / 135

Which protocols are considered to be the core protocols of the transport layer in the TCP/IP model?

133 / 135

What is a foundational concept that underscores proper security management, according to the text in DOMAIN 4: Communication and Network Security?

134 / 135

What is the best way to protect against network sniffing?

135 / 135

What is the purpose of conducting a site survey?

Your score is

🔒 Hands-On Cybersecurity Course + INTERNSHIP 🔒

Visit our Cyber Course  

Mastering CISSP Domain 4: Communication and Network Security

Importance of Domain 4

Domain 4: Communication and Network Security of the CISSP (Certified Information Systems Security Professional) exam is an essential area for cybersecurity professionals.

Key Topics Covered in Domain 4

  1. Fundamentals of Network Security
  2. Security of Network Components
  3. Encryption and Secure Communication
  4. Responding to Network Attacks
  5. Cloud Security and Virtualization

Learning Path

    1. Study Domain 4 Practice Exam
    2. Explore Domain 3: Security Architecture and Engineering
    3. Master Domain 5: Identity and Access Management

Additional Support

We’re here to support your CISSP certification journey. Good luck with your preparation!

cissp-domain-4-image
Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!