ISC2-CISSP Domain 4: Communication and Network Security Welcome to your ISC2-CISSP Domain 4: Communication and Network Security 1. CISSP: Communication and Network Security In the context of network security, which of the following is the MOST critical consideration when implementing a new encryption protocol for secure communications? A. The length of the encryption keys. B. Compatibility with existing network infrastructure. C. The speed of the encryption and decryption process. D. Resistance to known cryptographic attacks. None 2. CISSP: Communication and Network Security In a distributed network environment, which of the following is the MOST effective method for ensuring secure communication between nodes? A. Implementing a centralized authentication server. B. Enforcing strict firewall rules at each node. C. Utilizing end-to-end encryption protocols. D. Applying network segmentation techniques. None 3. CISSP: Communication and Network Security When designing a network security architecture, which of the following factors is MOST crucial in protecting against Man-in-the-Middle (MitM) attacks? A. Implementing strong session management controls. B. Utilizing public key infrastructure (PKI) for authentication. C. Deploying intrusion detection systems (IDS). D. Enforcing network access control (NAC) policies. None 4. CISSP: Communication and Network Security Which of the following technologies provides the BEST security for voice over IP (VoIP) communications against eavesdropping? A. Virtual Private Network (VPN). B. Transport Layer Security (TLS). C. Secure Real-time Transport Protocol (SRTP). D. Wired Equivalent Privacy (WEP). None 5. CISSP: Communication and Network Security In the deployment of a wireless network, which of the following measures is MOST effective in preventing unauthorized access to network traffic? A. MAC address filtering. B. Use of WPA3 encryption. C. Implementing hidden SSIDs. D. Enabling DHCP snooping. None 6. CISSP: Communication and Network Security For organizations adopting cloud services, which of the following is the MOST critical factor in securing data in transit to and from the cloud? A. Data loss prevention (DLP) solutions. B. Cloud access security brokers (CASBs). C. Encryption with robust key management. D. Secure shell (SSH) protocols. None 7. CISSP: Communication and Network Security In the implementation of a secure network architecture, which of the following is the MOST effective strategy for mitigating the risks associated with IoT devices? A. Network segmentation and isolation of IoT devices. B. Frequent password updates for IoT devices. C. Use of antivirus software on IoT devices. D. Regular firmware updates for IoT devices. None 8. CISSP: Communication and Network Security When considering the security of multicast communications within a network, which of the following protocols offers the BEST mechanism for ensuring confidentiality and integrity of the data? A. Multiprotocol Label Switching (MPLS). B. Internet Group Management Protocol (IGMP). C. Group Domain of Interpretation (GDOI). D. Simple Network Management Protocol (SNMP). None 9. CISSP: Communication and Network Security In securing a network against session hijacking attacks, which of the following measures is the MOST effective? A. Implementing network-level authentication. B. Use of session tokens with expiration. C. Enabling HTTP Strict Transport Security (HSTS). D. Application of port security on switches. None 10. CISSP: Communication and Network Security When integrating an enterprise network with an Internet of Things (IoT) framework, which of the following considerations is MOST critical to ensure the confidentiality of data in transit? A. Selection of IoT devices with built-in encryption capabilities. B. Deployment of a unified threat management (UTM) system. C. Implementation of a robust network intrusion detection system (NIDS). D. Use of application layer security protocols. None 11. CISSP: Communication and Network Security In the design of a secure communication protocol, which of the following is MOST essential for preventing replay attacks? A. Time-stamped token systems. B. Asymmetric encryption algorithms. C. Mandatory access controls. D. Secure socket layer (SSL) certificates. None 12. CISSP: Communication and Network Security For a multinational corporation implementing secure video conferencing across global offices, which of the following encryption solutions offers the BEST balance between security and performance? A. Quantum cryptography. B. Elliptic Curve Cryptography (EC C. C) Advanced Encryption Standard (AES) 256-bit. D. RSA 4096-bit. None 13. CISSP: Communication and Network Security Which of the following strategies is MOST effective in securing a mobile ad hoc network (MANET) against node impersonation attacks? A. Implementing digital signatures for data packets. B. Enforcing strict role-based access controls (RBA C. C) Utilizing a pre-shared key (PSK) system. D. Deploying a virtual private network (VPN) for all nodes. None 14. CISSP: Communication and Network Security In the deployment of IPv6 networks, which of the following measures is MOST crucial for mitigating the risk associated with router advertisement RA spoofing attacks? A. Disabling IPv6 auto-configuration features. B. Implementing RA guard mechanisms on all routers. C. Applying strict firewall rules to filter incoming RA messages. D. Utilizing static IP addresses instead of DHCPv6. None 15. CISSP: Communication and Network Security When securing a software-defined networking (SDN) infrastructure, which of the following is the MOST effective countermeasure against control plane saturation attacks? A. Rate limiting control plane traffic. B. Encrypting data plane traffic. C. Segmenting the management plane. D. Implementing redundant SDN controllers. None 16. CISSP: Communication and Network Security For organizations using cloud-based services, which of the following encryption approaches provides the BEST security for data at rest in the cloud? A. Server-side encryption with cloud service provider-managed keys. B. Client-side encryption with organization-managed keys. C. Encryption using Transport Layer Security (TLS). D. Homomorphic encryption for data processing. None 17. CISSP: Communication and Network Security In the context of wireless network security, which of the following is the MOST effective way to protect against War Driving attacks aiming to discover and exploit Wi-Fi networks? A. Disabling SSID broadcasting. B. Implementing Wi-Fi Protected Access 3 (WPA3) encryption. C. Enabling MAC address filtering. D. Using directional antennas. None 18. CISSP: Communication and Network Security Which of the following is the MOST critical factor in securing satellite communications against interception and unauthorized access? A. Implementing geolocation-based access controls. B. Using spread spectrum technology. C. Enforcing physical security measures at ground stations. D. Applying end-to-end encryption protocols. None 19. CISSP: Communication and Network Security In deploying a next-generation firewall (NGFW) in an enterprise network, which of the following capabilities is MOST critical for deep packet inspection (DPI) to effectively identify and block sophisticated threats? A. Stateful packet inspection. B. Application-aware filtering. C. Port-based blocking. D. Signature-based detection. None 20. CISSP: Communication and Network Security For securing an organization's email communications, which of the following is the MOST effective method to ensure the confidentiality and integrity of email messages? A. Sender Policy Framework (SPF) records. B. Domain-based Message Authentication, Reporting, and Conformance (DMAR C. C) Pretty Good Privacy (PGP) encryption. D. Transport Layer Security (TLS) for email transport. None 1 out of 20 Time is Up! Time's up