Skip to main content

Communication And Network Security

Domain 04 Practice Set: 01

CISSP DOMAIN 04: Communication And Network Security (Assessment Mode)

  CISSP Domain 4:This domain covers the design, implementation, and management of secure communication channels and network infrastructure. Key topics include network protocols, secure network design principles, network components, transmission methods, and security controls for ensuring the confidentiality, integrity, and availability of data in transit.   These questions aim to test your understanding of critical security concepts and technologies involved in securing communication channels and network infrastructures, aligning with the objectives of Domain 4 of the CISSP exam.

Domain 04: Practice Set 01

Disclaimer: The practice exam questions provided are representative of the certification exam, but not the actual questions you will see on the certification exam. Practice exams are for self-assessment.

Page : 1/10

1. What is the purpose of DNSSEC (Domain Name System Security Extensions)?
2. Which cryptographic protocol is used to secure data transmitted over a wireless network?
3. Which protocol is commonly used to retrieve emails from a server?
4. Which protocol is commonly used for sending email from a client to a server?
5. Which protocol is used to secure communications between a web server and a web browser?

Page : 2/10

6. What is the primary function of a Content Delivery Network (CDN)?
7. Which of the following technologies helps prevent ARP spoofing attacks?
8. Which of the following best describes the function of a SIEM (Security Information and Event Management) system?
9. Which type of attack involves flooding a network with a large number of ICMP Echo Request packets?
10. What is the main advantage of using MPLS (Multiprotocol Label Switching) in a network?

Page : 3/10

11. Which protocol is used to dynamically assign IP addresses to devices on a network?
12. Which protocol operates at the network layer and is responsible for logical addressing?
13. What is the main advantage of using a firewall with stateful inspection over a stateless firewall?
14. Which of the following is a primary function of a DNS (Domain Name System)?
15. In the context of wireless network security, what is the purpose of the 802.1X standard?

Page : 4/10

16. Which type of firewall operates at the application layer to filter traffic?
17. What is the main advantage of using a Next-Generation Firewall (NGFW) over a traditional firewall?
18. Which technology allows multiple virtual networks to operate on the same physical network infrastructure?
19. What is the function of a WAF (Web Application Firewall)?
20. Which of the following best describes a DMZ (Demilitarized Zone) in network security?

Page : 5/10

21. What is the primary function of the Secure Shell (SSH) protocol?
22. Which of the following network devices can be used to segment a network into different broadcast domains?
23. Which type of attack involves intercepting and altering communication between two parties without their knowledge?
24. Which network protocol is designed to provide secure, authenticated communications for directory services, particularly in Microsoft Active Directory environments?
25. What is the primary security benefit of using TLS over SSL for securing network communications?

Page : 6/10

26. What is the purpose of Network Address Translation (NAT)?
27. Which type of malware records every keystroke made by a user?
28. In a wireless network, which of the following encryption methods is considered the most secure?
29. Which type of firewall inspects incoming and outgoing packets at the network layer?
30. What is the main security purpose of implementing a VLAN in a network?

Page : 7/10

31. Which of the following technologies is used to detect and prevent MAC address spoofing in a network?
32. Which of the following network topologies is most resilient to a single point of failure?
33. Which of the following network security mechanisms uses a combination of digital certificates and asymmetric cryptography to provide secure communications over an untrusted network?
34. What is the primary purpose of implementing a VPN (Virtual Private Network) in a corporate environment?
35. Which advanced network security technique involves segmenting a network into smaller, isolated sections to prevent lateral movement of threats?

Page : 8/10

36. Which of the following is a characteristic of the BGP (Border Gateway Protocol) that makes it susceptible to routing attacks such as prefix hijacking?
37. Which protocol is primarily used to synchronize time across network devices?
38. What is the primary function of a network IDS (Intrusion Detection System)?
39. In a software-defined network (SDN), which component is responsible for making centralized decisions about the flow of network traffic?
40. Which of the following technologies can be used to detect unauthorized devices on a network through passive monitoring and analysis of network traffic?

Page : 9/10

41. What is the primary purpose of implementing Network Access Control (NAC) in a corporate network?
42. What is the purpose of implementing a honeypot in a network?
43. Which of the following is a benefit of implementing an IDS/IPS in a network?
44. Which protocol is used to securely transfer files over the internet?
45. Which type of attack is characterized by an attacker intercepting and potentially altering communication between two parties who believe they are directly communicating with each other?

Page : 10/10

46. What is the primary purpose of implementing QoS (Quality of Service) in a network?
47. Which of the following protocols supports multicast traffic in IPv6, enabling the efficient distribution of data to multiple destinations?
48. Which of the following protocols provides confidentiality, integrity, and authenticity of messages on the internet?
49. Which of the following is a primary function of a load balancer in a network?
50. What does the term "network segmentation" refer to in the context of network security?
CISSP Practice Test, Quiz & Flashcards

More practice question and flash cards

Risk & Security Management

Domain_01_CISSP Practice Set 01

Asset Security

Domain_02_CISSP Practice Set 01

Security Architecture & Engineering

Domain_03_CISSP Practice Set 01

Communication & Network Security

Domain_04_CISSP Practice Set 01

Identity & Access Management

Domain_05_CISSP Practice Set 01

Domain 04: Mindmaps, Flashcards and more…

Learn More

CISSP Practice Sets Status

CISSP practice sets and Questions counter

5

CISSP Practice Sets

250

Questions

5.8

Test Submited by Users