Domain 4 CISSP Exam: Communication and Network Security

 

Ref:📕The Official ISC2 CISSP CBK Reference 6th Edition

DOMAIN 4: Communication and Network Security

1 / 135

What is a disadvantage of a bus topology?

2 / 135

What is a LAN extender?

3 / 135

Which of the following is not a widely supported EAP method of authentication?

4 / 135

What is the main reason hubs are prohibited in organizations?

5 / 135

Which of the following is a security effect caused by the use of multimedia collaboration tools for remote meetings?

6 / 135

What is the downside of using MAC filters for wireless access control?

7 / 135

What is a Personal Area Network (PAN)?

8 / 135

Which of the following email security standards provides both authentication and confidentiality services for emails?

9 / 135

What is the benefit of using both static and dynamic routing in a network?

10 / 135

What is the reason for SSH-2 being considered more secure than SSH-1?

11 / 135

What is MPLS commonly labeled as in the context of the OSI Model?

12 / 135

Which band can a wireless router operate on to provide data transfer rates of more than 450 Mbps?

13 / 135

What are the four characteristics of SD-WAN according to Gartner?

14 / 135

What is the benefit of using converged protocols?

15 / 135

Which type of security solution continuously monitor endpoint and network events to detect, investigate, and respond to suspicious activities on all types of endpoints?

16 / 135

What is the primary protocol for securing web traffic that has replaced SSL?

17 / 135

Which physical topology of a network connects all nodes to a central device, and creates a point of failure at the central device?

18 / 135

Which of the following protocols was created to replace WEP and TKIP/WPA, is the preferred standard for security in 802.11 wireless networking, uses AES with a 128-bit key, and is the standard encryption mechanism used in WPA2 and WPA3?

19 / 135

Which security features are included in the ZigBee standard?

20 / 135

Which of the following is a potential security benefit of Li-Fi over Wi-Fi?

21 / 135

Which of the following is a connection of multiple LANs throughout an entire city?

22 / 135

What is the primary use of Frame Relay?

23 / 135

What is the best way to protect against network sniffing?

24 / 135

What is a switch?

25 / 135

What is the difference between a LAN and a WAN?

26 / 135

What is VLAN hopping?

27 / 135

Which VPN protocol encrypts session establishment during the authentication process?

28 / 135

What attacks are possible with Voice over Internet Protocol (VoIP) technology?

29 / 135

Which type of firewall operates at the OSI model session layer and only verifies the TCP handshaking is complete?

30 / 135

What are the most widely used LAN technologies for local area network?

31 / 135

What is the maximum number of networks per class A range of IPv4 address?

32 / 135

What is war droning?

33 / 135

Which network attack involves creating a fake website or email to trick victims into providing sensitive information?

34 / 135

Which layer of the OSI Model is responsible for data transmission between neighboring nodes?

35 / 135

Which type of firewall operates at the OSI models network layer and offers no authentication mechanism but is the fastest design and can mitigate the risk of a particular packet type?

36 / 135

What is the first action to take in creating wireless access with a wireless access point (WAP)?

37 / 135

What is 802.1X/EAP in the context of network security?

38 / 135

What is a concern in terms of integrity in secure voice transmissions?

39 / 135

Which method is used by all microsegmentation techniques for logical separation of functions in a network from their underlying structures?

40 / 135

Which protocol is considered a reliable protocol due to its guarantees of delivery by acknowledging packets, checking for missing or corrupted packets, and requesting retransmission, when necessary?

41 / 135

Which of the following is a feature of software-defined security (SDS)?

42 / 135

In a ring topology, what is the purpose of the digital token that is passed around the circle?

43 / 135

Which statement about coaxial cable is true?

44 / 135

Which protocols are considered to be the core protocols of the transport layer in the TCP/IP model?

45 / 135

Why are IoT devices vulnerable to attacks?

46 / 135

What is one of the major concerns when selecting network cabling, from a security standpoint?

47 / 135

At which OSI layer does a stateful inspection firewall operate?

48 / 135

Which layer do repeaters, concentrators, and amplifiers operate on?

49 / 135

Which of the following is an example of a centralized remote authentication service?

50 / 135

Which IEEE 802.11 standard amendment offers the highest maximum data rate?

51 / 135

Which type of antenna sends signals in all directions away from the antenna?

52 / 135

What is the primary purpose of IKE protocol in IPSec suite?

53 / 135

What is the goal of implementing microsegmentation in a network?

54 / 135

What is a common application for remote control or remote access?

55 / 135

What is a captive portal used for in wireless networks?

56 / 135

What is a botnet used for in a Distributed Denial-of-Service (DDoS) attack?

57 / 135

What function does a spanning tree algorithm serve in bridges?

58 / 135

What is the maximum data transfer rate of Gigabit Ethernet?

59 / 135

Which of the following is a method that a user might use to access corporate compute and storage platforms from another location while working remotely?

60 / 135

What security risk does Instant Messaging face in terms of confidentiality?

61 / 135

What are the two basic modes of Wi-Fi?

62 / 135

What is Fibre Channel over Ethernet (FCoE)?

63 / 135

What is the key benefit of a mesh topology in a network system?

64 / 135

Which layer of the OSI model supports network access for software applications and provides an interface for the user?

65 / 135

Which of the following is a common secure communications protocol that provides security services for communications channels as well as secure authentication services?

66 / 135

Which of the following is an example of a centralized remote authentication service?

67 / 135

What is the current protocol version for SOCKS that also provides authentication?

68 / 135

What is the purpose of a firewall in a network environment?

69 / 135

Which of the following is responsible for controlling how devices on a network gain permission to transmit data, and provides an addressing mechanism and channel access so nodes on a network can communicate with each other, working at the data link layer (layer 2)?

70 / 135

What is the purpose of a broadcast domain?

71 / 135

Which of the following network components provides the most secure method of transmitting data between two parties?

72 / 135

What is network virtualization?

73 / 135

What is the most common application of VPNs?

74 / 135

What is a common and effective attack method in email security?

75 / 135

What was the improvement made by TKIP over WEP?

76 / 135

Which of the following is an advantage of using centralized remote authentication services such as RADIUS?

77 / 135

What is a primary security concern for antennas in wireless access placement?

78 / 135

Which of the following best describes the security feature provided by PEAP in network communication?

79 / 135

Which encryption standard is currently considered highly insecure and should not be used?

80 / 135

Which of the following is the slowest type of firewall?

81 / 135

Which of the following is true for IPv4 and IPv6?

82 / 135

What is a WAN?

83 / 135

What is the primary responsibility of the presentation layer in the OSI model?

84 / 135

A strong authentication system is required when managing remote access to a corporate network. What is the standard to protect sensitive information?

85 / 135

What is the primary purpose of twisting pairs in twisted-pair cabling?

86 / 135

What is the maximum number of VXLANs that can be created in a domain?

87 / 135

What is one downside of content distribution networks?

88 / 135

What is a Local Area Network (LAN)?

89 / 135

Which protocol operates at layer 2 on IP networks and encapsulates the PPP packets to create a point-to-point tunnel connecting two separate systems?

90 / 135

What is VoIP?

91 / 135

Which protocol uses hop count and is an example of distance-vector routing protocol for the network layer?

92 / 135

What is the difference between WPA and WPA2?

93 / 135

What is the purpose of tamper detection in preventing MITM attacks?

94 / 135

Which type of firewall operates only at the session layer (layer 5) of the OSI model, and ensures that the TCP handshaking is complete without inspecting any actual packet?

95 / 135

What is one of the advantages of WPA3 over WPA2?

96 / 135

Which layer(s) does a gateway device operate at and what is its main function?

97 / 135

What is one of the principal issues with wireless technology?

98 / 135

What is a SYN flooding attack?

99 / 135

What is a benefit of IPv6 over IPv4?

100 / 135

What is a best practice for protecting mobile device data?

101 / 135

What is the technical term for the string of characters that identifies a wireless network?

102 / 135

Which of the following is a primary mode of operation when a session is established, in which data is sent over a connection between two devices in both directions at the same time?

103 / 135

What is iSCSI and what is it mainly used for?

104 / 135

Which layer of the TCP/IP reference model is responsible for making sure that data is properly formatted for transmission and that its sent to the appropriate destination IP address?

105 / 135

Which application layer protocol is used for the exchange of user information on the World Wide Web and supports websites?

106 / 135

Which of the following is a commonly used data communications framework?

107 / 135

What is a screened subnet?

108 / 135

What is the first step in securing SMTP servers?

109 / 135

Which type of network allows an organization to share select information with vendors, customers, and other external parties?

110 / 135

What is the purpose of the MITRE ATT&CK knowledge base?

111 / 135

Which layer is responsible for the transmission and reception of raw data across a transmission medium and converts digital bits into electrical signals or other forms of energy?

112 / 135

What is a multihomed firewall?

113 / 135

What is the key difference between 4G and 5G cellular technologies?

114 / 135

What is a benefit of using fiber-optic cable over copper wiring?

115 / 135

What does the XX in a network cables naming convention represent?

116 / 135

What is a foundational concept that underscores proper security management, according to the text in DOMAIN 4: Communication and Network Security?

117 / 135

What is a hijacking attack?

118 / 135

How many channels are allocated for the 2.4 GHz frequency in the United States and why do other countries have different numbers of channels?

119 / 135

What is the maximum number of segments allowed in a network that follows the 5-4-3 rule?

120 / 135

What is the benefit of using centralized remote authentication services for remote access clients?

121 / 135

What is the use of the Kerberos protocol?

122 / 135

What is the purpose of domain separation in network architecture?

123 / 135

Which of the following is NOT one of the basic goals for the use of NAC?

124 / 135

What is one advantage of Network Address Translation (NAT)?

125 / 135

Which layer of the SDN architecture is responsible for determining how traffic should flow based on the status of the infrastructure layer and the requirements specified by the application layer?

126 / 135

Which type of firewall operates at the OSI models network layer (layer 3) and inspects each packet, dropping and/or logging the packet if it breaks the established rules?

127 / 135

What is a bastion host, and how does it add a layer of protection to the internal network?

128 / 135

Which of the following is a remote authentication protocol that an organization can use to strengthen credential management and permissions for remote clients and users?

129 / 135

What is the purpose of conducting a site survey?

130 / 135

What is a benefit of a star topology?

131 / 135

Which VPN protocol operates on any LAN protocol?

132 / 135

What is Tunnel Mode in IPSec?

133 / 135

Which network has the largest coverage and is the most commonly used wide area network (WAN)?

134 / 135

Which of the following protocols is responsible for resolving the hardware address of a host from a given IP address on the internet layer of the TCP/IP reference model?

135 / 135

What is an important mechanism for establishing security expectations with an external party and holding them accountable if those expectations are not met?

Your score is

🔒 Hands-On Cybersecurity Course + INTERNSHIP 🔒

Visit Cyber Course  

 

Mastering Domain 4: Communication and Network Security – CISSP Practice Exam Preparation

Are you gearing up for the CISSP exam? Delve into the essentials of Domain 4: Communication and Network Security with our comprehensive CISSP Practice Exam. This domain is a critical component of the CISSP certification, covering the vast and complex landscape of securing communication channels and network infrastructure.

Why is Domain 4 of CISSP Vital for Your Cybersecurity Career

Domain 4 understanding is essential for cybersecurity aspirants. This domain addresses the principles of designing and protecting network architecture, including cloud environments. It encompasses critical topics such as network protocols, secure network components, secure communication channels, and preventing or mitigating network attacks.

What You’ll Learn in Domain 4: Communication and Network Security

  1. Network Security Basics: Grasp the fundamental concepts of network security, including the OSI and TCP/IP models, and understand how they lay the groundwork for secure communications.
  2. Securing Network Components: Dive into the intricacies of securing network devices like routers, switches, and firewalls. Learn how to harden these devices against potential threats.
  3. Cryptography and Secure Communications: Explore the role of cryptography in securing information in transit. Understand encryption protocols and techniques essential for protecting data across networks.
  4. Managing Network Attacks: Develop skills to identify and respond to various network attacks. Learn about intrusion detection and prevention systems and how they are instrumental in maintaining network integrity.
  5. Cloud Security and Virtualization: Gain insights into cloud computing concepts relevant to network security, including virtualization techniques, cloud security challenges, and best practices for securing cloud environments.

Optimize Your Learning with Our CISSP Practice Exam

Our “CISSP Practice Exam” is designed to test and reinforce your knowledge of Domain 4: Communication and Network Security. The practice exam features high-quality questions with detailed answer explanations, helping you understand not just the ‘what,’ but the ‘why’ behind each concept.

Score High in the CISSP exam with Confidence

By taking our practice exam, you’ll gain the confidence and expertise needed to excel in the Domain 4 CISSP Exam. With targeted practice and thorough understanding, you’re setting yourself up for success in one of the most challenging domains of the CISSP certification.

Start Your Journey to CISSP Success Today

Embark on your journey to becoming a CISSP certified professional. Master Domain 4: Communication and Network Security with our tailored practice exam and step confidently into the exam room. Remember, your expertise in this domain not only helps you pass the Domain 4 CISSP Exam but also equips you with practical skills essential for a thriving career in cybersecurity.

 

 

 

Domain 4 CISSP Exam

Back to All CISSP Domains / Home

 

Share the Post:

Related Posts

RSS  
  • Switching to IT or Cyber Security from Another Career
    Are you thinking about changing your career to IT or cyber security but worried about losing your current high salary? If yes, this guide is crafted just for you, especially if you have a family to support and don’t want to take a big pay cut. Understanding the Challenge A person reached out with a […]
  • How to Succeed in CySA+ Exam with Free Practice Questions
    Hey there! Are you getting ready for your CompTIA CySA+ exam? I’ve got great news for you! My team and I have created over a thousand practice questions to help you prepare, and they are all free! Keep reading to find out how these questions can help you pass with flying colors. What’s Available? **100% […]
  • From Call Center to IT Architect: Taylor’s Incredible Journey
    Introduction Today, we are going to share an amazing story about Taylor, who dramatically changed her career path from working in call centers to becoming an IT architect specialist. This journey is not just inspiring but also filled with practical tips and advice for anyone dreaming of making a big move in their career, especially […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!