Question 1: An organization hosts its public web server in a segment that sits between the Internet and the internal LAN, with firewalls controlling traffic between all three zones to prevent direct access from the Internet to internal resources. What is this architectural segment called?
Question 2: A network administrator discovers that if the primary core switch fails, the entire data center loses connectivity because there is no alternate path or redundant device to assume the gateway role. What concept best describes this situation?
Question 3: An attacker plugs a rogue laptop into an unused switch port in an empty conference room and immediately gains access to the internal network. Which control would have prevented this unauthorized access?
Question 4: A nuclear power plant's industrial control system network has no physical connection to the Internet or corporate network, requiring technicians to manually transfer patches via USB drives. What security architecture is this?
Question 5: Which security appliance combines firewall, VPN, IDS/IPS, antivirus, and content filtering into a single device, offering convenience for small businesses but potentially creating a performance bottleneck and single point of failure?
Question 6: Which device is specifically designed to inspect traffic for indicators of common web application attacks like SQLi and XSS?
Question 7: Which load balancing algorithm distributes incoming requests sequentially to each server in the pool in turn, regardless of current load or response time?
Question 8: A company needs to encrypt traffic between their headquarters and a branch office over the public Internet, using a protocol suite that includes Authentication Header (AH) for integrity and Encapsulating Security Payload (ESP) for confidentiality, with IKE handling key negotiation. What would be the best technology for them to use?
Question 9: An organization wants to deploy a server that acts as an intermediary for outbound web traffic from its internal network. The server will hide the origin IP addresses of internal clients, cache frequently accessed web content to improve performance, and enforce web filtering policies to restrict access to specific URLs and categories. Which type of device best meets these needs?
Question 10: A ransomware attack encrypts critical servers in a data center after compromising a single compromised employee workstation. The attack spread rapidly across a flat network, allowing the ransomware to propagate through SMB shares and unpatched vulnerabilities. Which network design principle could have limited the scope of the ransomware outbreak?
Question 11: A network administrator configures centralized authentication for wireless access points and VPN concentrators, using a protocol that operates over UDP ports 1812/1813 and supports Extensible Authentication Protocol (EAP) for 802.1X deployments. Which protocol is being used?
Question 12: A firewall examines only the source and destination IP addresses, port numbers, and protocols in packet headers. What type of firewall is this?
Question 13: A device is placed inline with network traffic to automatically block, drop, or modify malicious packets in real-time before they reach their destination. What is the best description of this device?
Question 14: An organization's flat network segment currently hosts a mailbox server, a client network, and a mail transfer server, all of which need enhanced security. Which redesign option BEST segregates the network according to the OSI model and secure architecture principles to mitigate vulnerabilities?
Question 15: A security administrator is configuring a new network that requires a device to bridge traffic between wireless clients and wired network resources. The device must handle encryption for wireless communications, authenticate users via 802.1X, and provide access control to internal VLANs. What type of device is being described?
Question 16: A company wants to deploy a firewall that can inspect and control traffic based on application type (e.g., blocking social media or video streaming) and protect against advanced threats by integrating intrusion prevention and threat intelligence feeds. Which type of firewall best meets these requirements?
Question 17: A network architect needs to select a firewall solution that combines firewall capabilities with integrated intrusion prevention, application control, and threat intelligence feeds. They want a single device that can inspect traffic at both the network layer and application layer for granular control. Which appliance fits this description?
Question 18: An organization is establishing remote access for its employees and contractors. The IT department wants to ensure that only authorized users can connect to the internal network, that all traffic is encrypted, and that session activities are logged for audit purposes. Which remote access method BEST fits the organization's needs?
Question 19: A security team is deploying intrusion prevention systems (IPS) to protect critical servers and detect and block malicious traffic in real-time. Where should the IPS be placed to effectively monitor and control traffic to these servers without introducing significant latency?
Question 20: A multinational corporation is reviewing its long-term cybersecurity infrastructure strategy. The security team has raised concerns about ensuring the ongoing availability of security patches, spare hardware components, and maintenance contracts for their critical network devices, including firewalls, intrusion prevention systems, and VPN gateways. They are seeking a strategy to mitigate risks related to supply chain continuity. Which approach best addresses these concerns?