Decoded: The Cybersecurity Podcast

ISC2 CC Domain 4: Network Security Exam Study by Edward Henriquez


Listen Later

Domain 4: Network Security (20 Questions)


What is the purpose of a firewall?

A. Detect malware

B. Filter traffic between networks

C. Encrypt sensitive information

D. Manage network bandwidth

Answer: B


What type of attack floods a network to make resources unavailable?

A. Man-in-the-middle

B. Phishing

C. Denial of Service (DoS)

D. Replay

Answer: C


Which protocol encrypts data between a browser and server?

A. FTP

B. HTTP

C. HTTPS

D. Telnet

Answer: C


What is the primary function of a VPN?

A. Secure email communications

B. Provide an encrypted remote-access tunnel

C. Monitor network activity

D. Block unauthorized users

Answer: B


What is the goal of network segmentation?

A. Reduce network congestion

B. Isolate sensitive data/systems

C. Increase encryption efficiency

D. Enhance speed

Answer: B


What device connects network segments?

A. Switch

B. Router

C. Firewall

D. Load Balancer

Answer: B


Which protocol resolves domain names to IPs?

A. HTTP

B. DNS

C. SMTP

D. SNMP

Answer: B


What does an IDS do?

A. Block unauthorized traffic

B. Detect/alert suspicious activity

C. Encrypt communications

D. Filter email spam

Answer: B


Which prevents ARP spoofing?

A. Dynamic IP allocation

B. Static ARP tables

C. NAT

D. Gateway reconfiguration

Answer: B


What is a key benefit of a proxy?

A. Hide internal IPs from external users

B. Block malicious traffic at the packet level

C. Encrypt all network traffic

D. Prevent social media access

Answer: A


What is port scanning?

A. Identify open ports on a device

B. Encrypt incoming traffic

C. Test firewall configurations

D. Block unauthorized IPs

Answer: A


What is the purpose of tools like Wireshark?

A. Test software vulnerabilities

B. Analyze/capture network traffic

C. Encrypt data in transit

D. Configure firewalls

Answer: B


Which control allows traffic based on rules?

A. Intrusion Prevention System (IPS)

B. Firewall

C. Network Access Control (NAC)

D. Honeypot

Answer: B


What is a key advantage of a honeypot?

A. Prevent phishing

B. Attract attackers to identify malicious activity

C. Improve encryption

D. Block brute-force attacks

Answer: B


What is the role of DNSSEC?

A. Secure email

B. Prevent DNS spoofing, ensure integrity

C. Encrypt DNS queries

D. Improve bandwidth

Answer: B


Which protocol provides secure file transfer?

A. FTP

B. SFTP

C. Telnet

D. HTTP

Answer: B


What type of attack alters communications?

A. Man-in-the-middle

B. DoS

C. Social engineering

D. Replay

Answer: A


What is the function of NAC?

A. Encrypt sensitive traffic

B. Enforce device security policies

C. Prevent malware

D. Monitor unauthorized logins

Answer: B


Which wireless security protocol is most secure?

A. WEP

B. WPA

C. WPA2

D. WPA3

Answer: D


What is the purpose of VLANs?

A. Increase speed

B. Segment/isolate traffic for security

C. Encrypt all traffic

D. Prevent malware

Answer: B


Patreon Support:


https://www.patreon.com/DecodedPodcast

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez