CISSP Domain 4 · Practice Quiz

Domain 4 Quiz: Communication & Network Security

100 Câu hỏi  ·  OSI Layer Attacks  ·  VPN  ·  Wireless  ·  Email Security

100

Questions

6

Topic Areas

25+

TS Context Qs

Topic Distribution

Q1–Q15 — OSI Model & Layer Attacks
Q16–Q30 — Network Security Devices
Q31–Q50 — VPN & Encrypted Channels
Q51–Q65 — Wireless Security
Q66–Q80 — Email & DNS Security
Q81–Q100 — Network Attacks & Mitigations

Q1–Q15 OSI Model & Layer Attacks

1
OSI Layer Medium

A security engineer at FinTech Company X notices that an attacker is intercepting and modifying raw binary signals between a network cable and a switch port, causing intermittent connectivity issues. At which OSI layer is this attack occurring?

  • A. Layer 2 — Data Link
  • B. Layer 3 — Network
  • C. Layer 1 — Physical
  • D. Layer 4 — Transport
Correct Answer: C — Layer 1 (Physical)

Layer 1 (Physical) handles raw bit transmission — electrical signals, cables, hubs, and physical connectors. An attack manipulating electrical signals or physically tapping cables targets this layer. Layer 2 handles MAC addressing; Layer 3 handles IP routing; Layer 4 handles end-to-end transport segments.

CISSP Mindset: When the attack targets physical signals/hardware (jamming, tapping, cutting cables), it is Layer 1. When it targets MAC frames, it is Layer 2.

2
OSI Layer ARP Medium

During a penetration test of FinTech Company X's internal network, an ethical hacker broadcasts forged ARP replies to associate the gateway's IP address with their own MAC address. Which OSI layer does this attack primarily exploit?

  • A. Layer 1 — Physical
  • B. Layer 2 — Data Link
  • C. Layer 3 — Network
  • D. Layer 5 — Session
Correct Answer: B — Layer 2 (Data Link)

ARP (Address Resolution Protocol) maps IP addresses to MAC addresses and operates at Layer 2 (Data Link). ARP poisoning/spoofing forges Layer 2 MAC-to-IP mappings. The attack intercepts frames before they reach Layer 3 IP processing. Dynamic ARP Inspection (DAI) on managed switches is the primary mitigation.

CISSP Mindset: ARP lives at Layer 2. MAC addresses, switches, and frames are all Layer 2 concepts. IP addresses start at Layer 3.

3
OSI Layer IP Spoofing Medium

An attacker sends packets to FinTech Company X's Platform C platform with a forged source IP address, attempting to bypass IP-based access control lists. Which OSI layer is the primary target of this attack?

  • A. Layer 2 — Data Link
  • B. Layer 4 — Transport
  • C. Layer 3 — Network
  • D. Layer 7 — Application
Correct Answer: C — Layer 3 (Network)

IP addresses exist at Layer 3 (Network). IP spoofing forges the source IP field in the IP header — a Layer 3 construct. Access Control Lists (ACLs) on routers operate at Layer 3 to filter based on IP addresses. Ingress/egress filtering (BCP38) is the standard mitigation at the network perimeter.

CISSP Mindset: IP = Layer 3. TCP/UDP ports = Layer 4. If the attack manipulates IP addresses or routing, it is a Layer 3 attack.

4
OSI Layer SYN Flood Medium

FinTech Company X's SOC team detects a flood of TCP SYN packets targeting port 443 on the Partner C API gateway, exhausting server connection tables. At which OSI layer does this attack operate?

  • A. Layer 3 — Network
  • B. Layer 4 — Transport
  • C. Layer 6 — Presentation
  • D. Layer 7 — Application
Correct Answer: B — Layer 4 (Transport)

TCP (Transmission Control Protocol) operates at Layer 4 (Transport). A SYN flood exploits the TCP three-way handshake — specifically the half-open connection state — which is a Layer 4 mechanism. Ports (443) are Layer 4 identifiers. Mitigations include SYN cookies (Layer 4), rate limiting, and CloudFlare's DDoS protection which operates at multiple layers.

CISSP Mindset: TCP three-way handshake = Layer 4. SYN flood targets the connection table, not application logic. SYN cookies are the Layer 4 countermeasure.

5
OSI Layer SQL Injection Medium

An attacker submits a malicious payload — ' OR 1=1 -- — in the loan application form on FinTech Company X's Platform C portal, successfully bypassing authentication. Which OSI layer is this attack targeting?

  • A. Layer 4 — Transport
  • B. Layer 5 — Session
  • C. Layer 6 — Presentation
  • D. Layer 7 — Application
Correct Answer: D — Layer 7 (Application)

SQL injection targets application logic — the web application's processing of user input. Layer 7 (Application) encompasses HTTP, HTTPS, DNS, SMTP, and application-level protocols. A WAF (Web Application Firewall) like FinTech Company X's CloudFlare WAF operates at Layer 7 specifically to inspect and block malicious HTTP/HTTPS payloads such as SQLi and XSS.

CISSP Mindset: Any attack on application logic, HTTP parameters, or web content = Layer 7. The WAF is the Layer 7 control.

6
OSI Layer WAF vs Firewall Medium

FinTech Company X's security team is evaluating controls for its Platform C microservices platform. A stateful firewall can block port scans and connection floods, but it cannot detect malicious HTTP payloads in HTTPS traffic. Which control would BEST complement the stateful firewall to address this gap?

  • A. An intrusion detection system (IDS) configured in passive mode
  • B. A Layer 3 ACL on the perimeter router
  • C. A Web Application Firewall (WAF) operating at Layer 7
  • D. A network-based DLP sensor monitoring egress traffic
Correct Answer: C — Web Application Firewall (WAF) at Layer 7

Stateful firewalls operate at Layer 3–4 and track connection state but cannot inspect application-layer content. A WAF operates at Layer 7, inspecting HTTP/HTTPS request bodies, headers, and parameters to detect SQLi, XSS, and API abuse. FinTech Company X uses CloudFlare WAF precisely for this Layer 7 inspection of Platform C web traffic. An IDS in passive mode detects but does not block; a Layer 3 ACL cannot inspect payload content.

CISSP Mindset: Stateful firewall = Layers 3–4 (IP/TCP state). WAF = Layer 7 (HTTP content). For application-layer attacks, WAF is required.

7
OSI Layer SSL/TLS Medium

TLS encryption used by FinTech Company X's Platform C API operates primarily at which OSI layer to provide confidentiality and integrity for data in transit?

  • A. Layer 3 — Network
  • B. Layer 4 — Transport
  • C. Layer 6 — Presentation
  • D. Layer 7 — Application
Correct Answer: C — Layer 6 (Presentation)

TLS (Transport Layer Security) is typically mapped to Layer 6 (Presentation) in the OSI model because it handles encryption, decryption, and data format transformation. While TLS runs "on top of" TCP (Layer 4) and "below" HTTP (Layer 7), its encryption/compression function maps to Layer 6. Note: Some sources map TLS to Layer 5 (Session) — on the CISSP exam, Layer 6 (Presentation) is the most accepted answer for encryption protocols.

CISSP Mindset: Layer 6 = encryption, encoding, compression. TLS handles encryption, so it belongs at Layer 6 (Presentation). Remember: SSL/TLS = Presentation layer.

8
OSI Layer Session Hijacking Medium

An attacker successfully steals a session cookie from an Platform C platform user, injecting it into their own browser to impersonate the user without needing credentials. At which OSI layer does session hijacking primarily occur?

  • A. Layer 4 — Transport
  • B. Layer 5 — Session
  • C. Layer 7 — Application
  • D. Layer 6 — Presentation
Correct Answer: C — Layer 7 (Application)

Session cookie hijacking is an application-layer attack. HTTP cookies are an application-layer (Layer 7) construct defined in HTTP headers. The attacker exploits the application's session management, not the TCP session or OSI Layer 5 sessions. Mitigations include HttpOnly/Secure cookie flags, short session timeouts, and token binding — all application-layer controls. Layer 5 (Session) deals with NetBIOS sessions, not HTTP cookies.

CISSP Mindset: HTTP cookies, web sessions, and authentication tokens are Layer 7 concepts. Do not confuse "session" (Layer 5) with web application sessions (Layer 7).

9
OSI Layer VLAN Hopping Medium

A network security audit at FinTech Company X discovers that an attacker can send double-encapsulated 802.1Q frames to access traffic on a different VLAN segment. Which OSI layer does this VLAN hopping attack exploit?

  • A. Layer 1 — Physical
  • B. Layer 2 — Data Link
  • C. Layer 3 — Network
  • D. Layer 4 — Transport
Correct Answer: B — Layer 2 (Data Link)

VLANs (Virtual Local Area Networks) and 802.1Q tagging operate at Layer 2 (Data Link). VLAN hopping exploits the switch's handling of 802.1Q VLAN tags in Ethernet frames — Layer 2 constructs. The double-encapsulation attack adds an extra 802.1Q tag that causes the switch to forward the frame to the attacker's target VLAN. Mitigation: disable unused trunk ports, assign native VLAN to an unused VLAN ID, disable DTP.

CISSP Mindset: VLANs, 802.1Q tags, MAC addresses, and switch trunking are all Layer 2. VLAN hopping = Layer 2 attack requiring Layer 2 controls.

10
OSI Layer BGP Hijacking Medium

A threat actor announces a more specific BGP prefix for FinTech Company X's IP range to upstream ISPs, diverting internet traffic destined for FinTech Company X's services through the attacker's infrastructure. At which OSI layer does BGP hijacking primarily operate?

  • A. Layer 2 — Data Link
  • B. Layer 3 — Network
  • C. Layer 4 — Transport
  • D. Layer 7 — Application
Correct Answer: B — Layer 3 (Network)

BGP (Border Gateway Protocol) is a Layer 3 routing protocol that controls how IP traffic is routed between autonomous systems on the internet. BGP hijacking manipulates route advertisements to redirect IP traffic — a Layer 3 (Network) function. The mitigation is RPKI (Resource Public Key Infrastructure), which cryptographically validates BGP route origin announcements. This is a critical risk for any internet-facing service like FinTech Company X's products.

CISSP Mindset: Routing protocols (BGP, OSPF, RIP) = Layer 3. BGP hijacking redirects IP-layer routes, making it a Layer 3 attack. RPKI is the standard countermeasure.

11
OSI Layer DNS Medium

An attacker poisons the DNS resolver used by FinTech Company X employees, causing queries for internal services to resolve to malicious IP addresses. DNS cache poisoning operates at which OSI layer?

  • A. Layer 3 — Network
  • B. Layer 4 — Transport
  • C. Layer 6 — Presentation
  • D. Layer 7 — Application
Correct Answer: D — Layer 7 (Application)

DNS (Domain Name System) is an application-layer (Layer 7) protocol that runs over UDP/TCP port 53. DNS cache poisoning injects fraudulent resource records into the DNS application, exploiting the application protocol's lack of origin authentication. DNSSEC (DNS Security Extensions) provides cryptographic validation at the application layer. DNS over HTTPS (DoH) and DNS over TLS (DoT) add transport encryption but DNS itself remains Layer 7.

CISSP Mindset: DNS = Layer 7 (Application) despite using UDP/TCP transport. DNSSEC, DoH, and DoT are all Layer 7 controls for DNS security.

12
OSI Layer FinTech Company X Medium

FinTech Company X's security team wants to deploy a control that operates at Layer 7 to inspect and filter HTTPS traffic from the Partner C CloudFlare edge to the origin servers. Which control BEST meets this requirement while also providing DDoS mitigation?

  • A. A stateful packet inspection firewall at the network perimeter
  • B. CloudFlare WAF with HTTPS inspection and rate limiting rules
  • C. IPSec tunnel between CloudFlare and origin servers
  • D. A Layer 3 ACL blocking specific IP ranges
Correct Answer: B — CloudFlare WAF with HTTPS inspection and rate limiting

CloudFlare WAF operates at Layer 7 (Application), inspecting HTTP/HTTPS request content including headers, cookies, and request bodies. It can detect and block application-layer attacks (SQLi, XSS, API abuse) while also providing Layer 3–4 DDoS mitigation. FinTech Company X already uses CloudFlare for Partner C. A stateful firewall cannot inspect encrypted HTTPS payload; IPSec protects the channel but does not inspect Layer 7 content; Layer 3 ACLs cannot see HTTP application data.

CISSP Mindset: The "best" answer combines multiple security capabilities. CloudFlare WAF addresses the Layer 7 gap that stateful firewalls leave open.

13
OSI Layer Sniffing Medium

During a red team exercise, an analyst places a network tap between a switch and a server to capture all Ethernet frames in promiscuous mode. Which OSI layer does this passive sniffing attack primarily target?

  • A. Layer 1 — Physical
  • B. Layer 2 — Data Link
  • C. Layer 3 — Network
  • D. Layer 7 — Application
Correct Answer: B — Layer 2 (Data Link)

Promiscuous mode sniffing captures Ethernet frames — the Layer 2 data unit. While the physical tap touches Layer 1, the capture and analysis of MAC addresses and frame content is a Layer 2 activity. Encryption at higher layers (TLS) protects against sniffing exposing application data, but Layer 2 frames and headers remain visible. Switch port security and encryption are the primary mitigations.

CISSP Mindset: Frames = Layer 2. Packets = Layer 3. Segments = Layer 4. Sniffers capture Layer 2 frames; encryption protects Layer 3+ payloads.

14
OSI Layer Man-in-the-Middle Medium

Which OSI layer does HTTPS (TLS) certificate validation PRIMARILY protect against in a man-in-the-middle attack where the attacker intercepts communication between a user's browser and FinTech Company X's Platform C portal?

  • A. Layer 2 — Data Link (MAC spoofing)
  • B. Layer 3 — Network (IP spoofing)
  • C. Layer 6 — Presentation (encryption spoofing / fake certificate)
  • D. Layer 4 — Transport (TCP session hijacking)
Correct Answer: C — Layer 6 (Presentation)

TLS certificate validation prevents an attacker from presenting a fraudulent certificate to impersonate the server. Since TLS/encryption operates at Layer 6 (Presentation), MITM via fake certificates targets Layer 6. The browser validates the server certificate against trusted CAs, and HSTS prevents downgrade attacks. Certificate Transparency logs add further protection. This is the primary threat TLS addresses — not Layer 2/3/4 attacks.

CISSP Mindset: TLS protects identity (certificate = who you're talking to) and confidentiality (encryption). The MITM threat TLS solves is at the Presentation layer.

15
OSI Layer FinTech Company X Medium

FinTech Company X's security architect wants to deploy controls at EVERY OSI layer for defense in depth. Rank these controls from lowest to highest OSI layer: (1) DNSSEC validation, (2) SYN cookies, (3) 802.1Q VLAN segmentation, (4) Physical cable locks, (5) CloudFlare WAF rules.

  • A. 4, 3, 2, 1, 5
  • B. 4, 3, 2, 5, 1
  • C. 3, 4, 2, 1, 5
  • D. 4, 2, 3, 1, 5
Correct Answer: A — 4, 3, 2, 1, 5

Layer mapping: (4) Physical cable locks = Layer 1 (Physical); (3) 802.1Q VLAN segmentation = Layer 2 (Data Link); (2) SYN cookies = Layer 4 (Transport); (1) DNSSEC validation = Layer 7 (Application); (5) CloudFlare WAF rules = Layer 7 (Application). Note: DNSSEC and WAF both operate at Layer 7, but WAF inspects HTTP/HTTPS while DNSSEC secures DNS. Both are correct in the top tier. The correct ordering from L1→L7 is: Physical locks → VLAN → SYN cookies → DNSSEC/WAF.

CISSP Mindset: Defense in depth means controls at every layer. Physical (L1) → Data Link (L2) → Transport (L4) → Application (L7).

Q16–Q30 Network Security Devices

16
Firewall Types Medium

A stateless packet filter firewall differs from a stateful firewall in which MOST important way?

  • A. Stateless firewalls cannot filter by IP address
  • B. Stateless firewalls do not track the state of TCP connections, making them vulnerable to session spoofing attacks
  • C. Stateless firewalls operate at Layer 7, while stateful firewalls operate at Layer 3
  • D. Stateless firewalls are always faster and more secure than stateful firewalls
Correct Answer: B — Stateless firewalls do not track TCP connection state

Stateless packet filters evaluate each packet in isolation against ACL rules (IP, port, protocol) without tracking connection context. They cannot distinguish a legitimate reply packet from a forged unsolicited packet with the same characteristics, making them vulnerable to spoofed ACK floods and session injection. Stateful firewalls maintain a connection table tracking SYN/SYN-ACK/ACK handshakes and only allow reply packets that match established connections. Stateless firewalls operate at Layer 3–4, not Layer 7.

CISSP Mindset: Stateful = connection-aware. Stateless = packet-by-packet. The state table is what makes stateful firewalls resistant to session-based attacks.

17
NGFW FinTech Company X Medium

FinTech Company X is deploying a Next-Generation Firewall (NGFW) at its data center perimeter. Which capability DISTINGUISHES an NGFW from a traditional stateful firewall?

  • A. NGFW can only filter by IP address and port
  • B. NGFW provides application-layer visibility, user identity integration, and IPS capabilities within a single device
  • C. NGFW does not perform deep packet inspection
  • D. NGFW replaces the need for a WAF entirely
Correct Answer: B — Application-layer visibility, user identity, and IPS in one device

NGFW (Next-Generation Firewall) extends traditional stateful firewall with: (1) Deep Packet Inspection (DPI) for application-layer awareness — identify apps regardless of port; (2) User-identity integration via Active Directory; (3) Built-in IPS for threat detection and prevention; (4) SSL/TLS decryption for encrypted traffic inspection. An NGFW does NOT replace a WAF — WAF provides specialized web application protection that NGFW DPI may not cover at the same depth for HTTPS APIs.

CISSP Mindset: NGFW = stateful + DPI + app awareness + IPS + user identity. It does not fully replace a dedicated WAF for web application security.

18
IDS vs IPS Medium

FinTech Company X's CISO wants to deploy a solution that ACTIVELY blocks detected intrusion attempts on the network in real time, not just alert on them. Which technology meets this requirement?

  • A. Network-based IDS (NIDS) in passive/promiscuous mode
  • B. Host-based IDS (HIDS) on each server
  • C. Network-based IPS (NIPS) deployed inline
  • D. Security Information and Event Management (SIEM)
Correct Answer: C — Network-based IPS (NIPS) deployed inline

IDS (Intrusion Detection System) detects and alerts — it is passive/monitoring only. IPS (Intrusion Prevention System) is inline — it sits in the traffic path and can actively block, drop, or reset malicious connections in real time. A NIDS in promiscuous mode only monitors a copy of traffic and cannot block. SIEM collects and correlates logs but does not block traffic. The key differentiator: IPS = inline = can block; IDS = passive = detect-only.

CISSP Mindset: IDS detects (passive). IPS prevents (inline, active). When the requirement is "block in real time," the answer is IPS.

19
DMZ Traffic Rules Medium

FinTech Company X hosts its customer-facing Platform C web servers in a DMZ. Which traffic flow rule BEST represents the correct DMZ security policy?

  • A. Internet → DMZ: Allowed; DMZ → Internal: Allowed; Internal → DMZ: Allowed
  • B. Internet → DMZ: Allowed on specific ports; DMZ → Internal: Denied by default; Internal → DMZ: Allowed
  • C. Internet → DMZ: Denied; DMZ → Internal: Allowed; Internal → DMZ: Denied
  • D. Internet → DMZ: Allowed all; DMZ → Internal: Allowed all; Internal → Internet: Denied
Correct Answer: B — Internet→DMZ allowed (specific ports); DMZ→Internal denied by default; Internal→DMZ allowed

The DMZ is a semi-trusted zone. Correct DMZ traffic policy: (1) Internet → DMZ: Permitted on specific ports (80/443) so customers can reach web servers; (2) DMZ → Internal network: DENIED by default — if a DMZ server is compromised, it should not be able to reach internal databases or systems directly; (3) Internal → DMZ: Allowed so administrators can manage DMZ servers. The critical control is blocking unsolicited DMZ→Internal traffic to contain breaches.

CISSP Mindset: DMZ protects the internal network. If DMZ is compromised, the attacker still cannot reach internal systems. "DMZ → Internal = Deny" is the critical rule.

20
Honeypot Medium

FinTech Company X's threat intelligence team wants to deploy a deception technology to attract and study attacker techniques without exposing real production assets. Which technology is MOST appropriate?

  • A. A honeypot — a decoy system designed to attract attackers and log their techniques
  • B. A SIEM configured to trigger alerts on all failed logins
  • C. An IPS deployed inline on the production network
  • D. A jump server with strong MFA protecting access to production systems
Correct Answer: A — Honeypot (decoy system)

A honeypot is a deliberately vulnerable or attractive decoy system designed to lure attackers away from production assets while logging their techniques, tools, and procedures (TTPs) for threat intelligence. It provides early warning of attacks (any access to a honeypot is suspicious by definition) and helps understand attacker behavior. A honeynet is a network of honeypots. Key legal consideration: entrapment is not a concern if the honeypot is passive (logging only), but active engagement may raise legal issues.

CISSP Mindset: Honeypots = deception = threat intelligence. Any connection to a honeypot is suspicious. They do not protect production — they detect and study attackers.

21
NAC / 802.1X Medium

FinTech Company X wants to ensure that only company-owned, fully-patched laptops can connect to the corporate Wi-Fi SSID "TS-Corp". Unpatched or personal devices should be quarantined. Which technology BEST achieves this?

  • A. MAC address filtering on the wireless access points
  • B. Network Access Control (NAC) with 802.1X port authentication and posture assessment
  • C. WPA2-PSK with a complex shared password
  • D. A VLAN separating Wi-Fi traffic from wired traffic
Correct Answer: B — NAC with 802.1X and posture assessment

NAC (Network Access Control) with 802.1X provides: (1) Authentication — verifies device identity via certificates or credentials against a RADIUS server; (2) Posture assessment — checks that the device is domain-joined, has antivirus, is patched; (3) Dynamic VLAN assignment — quarantines non-compliant devices to a remediation VLAN. MAC filtering is trivially bypassed by MAC spoofing. WPA2-PSK shares one password — any device with the password connects. VLAN alone does not authenticate devices.

CISSP Mindset: NAC = authenticate + assess + enforce. 802.1X is the standard for port-based network access control. Posture assessment is what distinguishes NAC from simple authentication.

22
IDS False Positives Medium

FinTech Company X's SOC team is overwhelmed with thousands of IDS alerts per day, most of which turn out to be false positives. The CISO asks for the MOST operationally practical approach to reduce alert fatigue while maintaining detection effectiveness.

  • A. Disable the IDS since it is generating too many false positives
  • B. Tune the IDS signatures and thresholds, implement behavioral baselines, and integrate with SIEM for correlation
  • C. Replace the IDS with a WAF
  • D. Add more SOC analysts to handle the alert volume
Correct Answer: B — Tune signatures, establish baselines, integrate with SIEM

Alert fatigue from false positives is a major operational challenge. The correct approach: (1) Tune IDS signatures — customize rule thresholds to match the specific network environment; (2) Behavioral baselining — anomaly-based detection understands "normal" and reduces noise; (3) SIEM correlation — aggregate and correlate alerts, reducing individual alerts into meaningful incidents. Disabling the IDS eliminates detection. Adding more analysts without tuning doesn't scale. A WAF addresses only web application threats, not network threats.

CISSP Mindset: The managerial answer balances security effectiveness with operational practicality. Tuning + correlation is the sustainable answer to alert fatigue.

23
DMZ Traffic Rules FinTech Company X Medium

FinTech Company X's Platform C web servers in the DMZ need to query the internal Oracle database for loan data. Which is the MOST secure design for this communication?

  • A. Open a firewall rule permitting all traffic from the DMZ to the internal database subnet
  • B. Allow the DMZ web server to directly initiate connections to the database on a specific port
  • C. Deploy a database proxy in the DMZ; the internal database only accepts connections from the proxy on a specific application port; the proxy validates all queries
  • D. Move the database into the DMZ so the web servers can access it directly
Correct Answer: C — Database proxy in DMZ with validated queries

The principle of least privilege and defense in depth apply here. Direct DMZ → internal database connections violate the "DMZ cannot initiate connections to internal zone" rule. The most secure design: (1) Deploy an application-layer database proxy in the DMZ; (2) The proxy validates and sanitizes queries before forwarding; (3) The internal database only accepts connections from the specific proxy IP on a specific application port; (4) If the web server is compromised, the attacker faces an additional proxy barrier. Option B is better than A but still allows direct connections without proxy validation.

CISSP Mindset: Add a proxy layer between DMZ and internal systems. The proxy validates requests, enforces least privilege, and limits blast radius of a compromised web server.

24
Firewall Types Medium

A proxy firewall (application gateway) differs from a stateful packet inspection firewall in which CRITICAL way?

  • A. Proxy firewalls only inspect UDP traffic, not TCP
  • B. Proxy firewalls terminate and re-originate connections, preventing direct access between external and internal hosts
  • C. Proxy firewalls are always faster than stateful firewalls
  • D. Proxy firewalls cannot filter based on IP addresses
Correct Answer: B — Proxy terminates and re-originates connections

A proxy firewall (application gateway) acts as an intermediary: it terminates the external connection, inspects the application-layer content, then creates a NEW connection to the internal server. This means external hosts never have a direct network path to internal hosts — a fundamental security advantage. Stateful firewalls allow the connection to flow through (with state tracking) but do not break the network path. Proxy firewalls introduce latency and are slower, not faster. They operate at Layer 7, inspecting application content.

CISSP Mindset: Proxy = connection break = no direct path. Stateful = connection tracking = path exists but monitored. Proxy provides stronger isolation.

25
NAC / 802.1X FinTech Company X Medium

FinTech Company X deploys 802.1X on its wired network ports. An employee's laptop fails posture assessment because it is missing the latest OS patches. Which 802.1X behavior is MOST appropriate?

  • A. Deny all network access to the laptop immediately and permanently
  • B. Grant full network access since the employee has valid credentials
  • C. Place the laptop in a quarantine VLAN with access only to the patching server until compliant
  • D. Disable the switch port until an administrator manually re-enables it
Correct Answer: C — Quarantine VLAN with access to patching server

802.1X with NAC supports dynamic VLAN assignment based on posture. When a device fails posture assessment, placing it in a quarantine/remediation VLAN is the most operationally practical response: (1) The device has limited network access — only to the patching/update server; (2) Once patches are applied and posture is re-assessed, the device is automatically moved to the correct VLAN; (3) This balances security (non-compliant devices cannot reach production) with usability (employee can self-remediate). Permanent denial disrupts productivity unnecessarily.

CISSP Mindset: NAC should be remediation-focused, not punitive. Quarantine + self-remediation is the operationally practical answer. Credentials ≠ authorization if posture fails.

26
Firewall Placement Medium

Which firewall architecture provides the HIGHEST level of security for a three-zone network (Internet, DMZ, Internal) by using two separate physical firewall devices?

  • A. Single firewall with three interfaces (Internet, DMZ, Internal)
  • B. Dual-firewall architecture: Outer firewall separates Internet from DMZ; Inner firewall separates DMZ from Internal
  • C. Two stateless packet filter firewalls in series on the Internet-to-Internal path
  • D. A single NGFW with IPS enabled, replacing both firewalls
Correct Answer: B — Dual-firewall architecture with outer and inner firewall

The dual-firewall (screened subnet) architecture provides defense in depth: the outer firewall filters Internet traffic reaching the DMZ, while the inner firewall protects the internal network from DMZ compromise. If the outer firewall is compromised, the inner firewall still protects internal systems. Using two different vendor firewalls adds further resilience (different vulnerabilities). A single tri-homed firewall is simpler but a single point of failure. An NGFW single device improves on a single firewall but still represents a single point of failure.

CISSP Mindset: Dual-firewall = defense in depth = no single point of failure. The inner firewall protects internal systems even if the DMZ is compromised.

27
IDS Detection Types Medium

FinTech Company X's IDS detects a zero-day attack that has never been seen before. Which IDS detection methodology would MOST LIKELY identify this novel threat?

  • A. Signature-based detection — matches against a database of known attack signatures
  • B. Anomaly-based (behavioral) detection — identifies deviations from established baselines
  • C. Protocol analysis — validates packets against RFC specifications
  • D. Heuristic detection based only on file hash values
Correct Answer: B — Anomaly-based (behavioral) detection

Signature-based IDS cannot detect zero-days because there is no existing signature for the attack. Anomaly-based IDS establishes a baseline of "normal" network behavior and flags statistical deviations — it can detect zero-day attacks that behave differently from the baseline even without a known signature. The trade-off: anomaly-based systems have higher false positive rates because legitimate unusual activity may appear anomalous. Protocol analysis detects malformed packets but not novel application-layer attacks. Hash-based detection is file-level, not network-level.

CISSP Mindset: Signature-based = known threats, low FP. Anomaly-based = unknown threats, higher FP. Zero-day → anomaly-based is the answer.

28
DMZ Design FinTech Company X Medium

Which of the following assets should FinTech Company X place in the DMZ? (Select the MOST appropriate.)

  • A. The internal HR database containing employee records
  • B. The Platform C customer-facing web application server and the Bank A API gateway
  • C. The Active Directory domain controller
  • D. The SIEM server and log management system
Correct Answer: B — Customer-facing web server and API gateway

The DMZ hosts services that must be accessible from the internet while being isolated from internal systems. Appropriate DMZ assets: web servers, public-facing API gateways, mail relays, DNS resolvers (external-facing). Assets that must NOT be in the DMZ: HR databases (sensitive internal data), Active Directory (credential store for internal resources), SIEM (security monitoring must be internal and trusted). The Platform C web server and Bank A API gateway are correct DMZ candidates because they serve external users/partners.

CISSP Mindset: DMZ = internet-facing services only. Internal databases, authentication systems, and security monitoring tools belong on the internal network.

29
Firewall Rules Medium

FinTech Company X's firewall ruleset has grown to over 500 rules with many conflicts and redundancies over five years. Which is the BEST first step to remediate this situation?

  • A. Delete all rules and start from scratch with a whitelist approach
  • B. Conduct a firewall rule audit — identify redundant, shadowed, and overly permissive rules, then create a change management process for future rules
  • C. Add a new NGFW and migrate all 500 rules as-is
  • D. Block all traffic by default and restore only after testing each rule
Correct Answer: B — Firewall rule audit with change management process

Firewall rule bloat is a common operational security problem. The correct approach: (1) Audit — identify rules that are redundant (duplicated), shadowed (never reached due to earlier matching rules), overly permissive (any/any rules), or no longer needed; (2) Document the business justification for each rule; (3) Implement a formal change management process to prevent future bloat. Deleting all rules (A) would cause an outage. Migrating 500 bad rules to a new NGFW (C) brings the problem with you. Blocking all traffic (D) is disruptive and operationally impractical.

CISSP Mindset: Operational security requires ongoing maintenance. Rule audits + change management = sustainable firewall hygiene. The managerial answer maintains operations while improving security.

30
NAT / PAT Medium

FinTech Company X uses NAT (Network Address Translation) at its internet gateway. Which security benefit does NAT PRIMARILY provide?

  • A. NAT encrypts traffic between internal hosts and external servers
  • B. NAT hides internal IP addresses from external networks, providing a degree of obscurity and reducing the attack surface from internet-initiated scans
  • C. NAT prevents all denial-of-service attacks targeting internal servers
  • D. NAT provides authentication for all outbound connections
Correct Answer: B — NAT hides internal IP addresses (obscurity + reduced attack surface)

NAT translates private IP addresses (RFC 1918) to public IPs, hiding internal network topology from external observers. This provides security through obscurity — attackers cannot directly scan or initiate connections to internal hosts using their private IPs. However, NAT is NOT a security control by itself: it does not encrypt, authenticate, or prevent all attacks. Compromised web servers in the DMZ can still be exploited. NAT was designed for IPv4 address conservation, with security as a side benefit. IPv6 does not require NAT, which is why IPv6 deployments need explicit firewalls.

CISSP Mindset: NAT = address hiding = security through obscurity (not a strong control). NAT is NOT encryption, authentication, or a firewall. Do not over-rely on NAT for security.

Q31–Q50 VPN & Encrypted Channels

41
IKE / IPSec Hard

During IKE Phase 1 for the Bank A VPN, what is the PRIMARY purpose of this phase in establishing the IPSec tunnel?

  • A. To negotiate the encryption parameters for the actual data traffic
  • B. To establish a secure, authenticated channel (ISAKMP SA) over which IKE Phase 2 negotiations can safely occur
  • C. To exchange the actual data payload between the two VPN gateways
  • D. To assign IP addresses to remote VPN clients
Correct Answer: B — IKE Phase 1 establishes a secure channel for Phase 2

IKE (Internet Key Exchange) has two phases: Phase 1 — Establishes a secure, mutually authenticated channel (the ISAKMP Security Association or IKE SA). Both parties authenticate each other (via PSK, digital certificates, or public key encryption) and negotiate encryption/hash algorithms for the IKE channel itself. This is the "management channel." Phase 2 — Uses the protected Phase 1 channel to negotiate the IPSec SAs (Security Associations) that will actually encrypt the data traffic (the "data channel"). Phase 2 negotiates ESP/AH parameters, PFS settings, and traffic selectors. The Bank A VPN must complete both phases before data flows.

CISSP Mindset: IKE Phase 1 = authenticate + protect the control channel. IKE Phase 2 = negotiate the data encryption parameters. Two-phase design = secure negotiation before data flows.

42
Certificate Pinning FinTech Company X Hard

FinTech Company X's mobile app for Platform C implements certificate pinning. What does this protect against, and what is the PRIMARY operational risk?

  • A. Protects against: SQL injection; Risk: Performance overhead from certificate checking
  • B. Protects against: MITM attacks using fraudulent but CA-signed certificates; Risk: App breaks when the server certificate is legitimately renewed or rotated
  • C. Protects against: DDoS attacks; Risk: Increases battery consumption on mobile devices
  • D. Protects against: Session hijacking; Risk: Certificate pinning violates TLS 1.3 standards
Correct Answer: B — Protects against fraudulent CA-signed certificates; risk is certificate rotation breakage

Certificate pinning hardcodes a specific certificate (or public key hash) into the mobile app. Protection: Even if an attacker obtains a fraudulent but CA-signed certificate (e.g., through a compromised CA or MITM proxy), the pinned certificate won't match, and the connection fails. This defeats corporate SSL inspection proxies used in MITM scenarios. Operational risk: When FinTech Company X legitimately renews or rotates the server certificate (e.g., every 1-2 years), the old pinned certificate is invalid and the app refuses connections — requiring an emergency app update. Best practice: Pin the public key or CA rather than the leaf certificate; include backup pins.

CISSP Mindset: Pinning = strong MITM protection but high maintenance cost. Operational practicality: use backup pins and pin the intermediate CA, not the leaf certificate.

43
TLS Cipher Suite Hard

FinTech Company X's security team reviews the TLS cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384. What does the "ECDHE" component provide in this cipher suite?

  • A. ECDHE provides the symmetric encryption of data using AES
  • B. ECDHE performs the key exchange using elliptic curve Diffie-Hellman ephemeral, providing Perfect Forward Secrecy
  • C. ECDHE provides the server authentication and digital signature
  • D. ECDHE is the hash function used for message integrity
Correct Answer: B — ECDHE = key exchange with Perfect Forward Secrecy

TLS cipher suite breakdown — TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: (1) ECDHE — key exchange algorithm (Elliptic Curve Diffie-Hellman Ephemeral): generates a temporary (ephemeral) key pair for each session — provides PFS because session keys are not derived from the long-term RSA private key; (2) RSA — authentication/signature algorithm: the server's certificate is RSA, used to authenticate the server and sign the ECDHE key exchange parameters; (3) AES_256_GCM — symmetric encryption and authentication (AES in Galois/Counter Mode, 256-bit); (4) SHA384 — PRF/hash for key derivation. ECDHE is specifically the key exchange component providing PFS.

CISSP Mindset: In a cipher suite, each component has a role: Key Exchange (ECDHE/DHE/RSA) + Authentication (RSA/ECDSA) + Symmetric Cipher (AES) + MAC/PRF (SHA). ECDHE = key exchange = PFS.

44
Partner C CloudFlare OTP Rate Limiting FinTech Company X Medium

FinTech Company X's Partner C platform sends OTP (One-Time Passwords) via SMS for loan application authentication. An attacker attempts to brute-force OTPs by making thousands of requests per minute. Which combination of network-level controls BEST mitigates this threat?

  • A. Increase OTP length from 6 to 10 digits only
  • B. CloudFlare rate limiting rules (blocking IPs exceeding request thresholds) combined with OTP expiry after 5 minutes and account lockout after N failures
  • C. Migrate from OTP to password-only authentication
  • D. Deploy an IDS alert when OTP failure rates exceed 10 per minute
Correct Answer: B — CloudFlare rate limiting + OTP expiry + account lockout

Defense in depth for OTP brute-force: (1) CloudFlare rate limiting — blocks IPs or tokens exceeding a request rate threshold at the network edge before requests reach origin servers; (2) OTP expiry — 5-minute validity window drastically reduces brute-force window (attacker has limited time); (3) Account lockout after N failures — prevents sustained brute-force even if rate limiting is bypassed via distributed attacks. An IDS alert alone (option D) detects but does not block. Increasing OTP length helps but is not a network-level control. Removing OTP (option C) reduces security. This layered approach is FinTech Company X's Partner C production pattern.

CISSP Mindset: Defense in depth for authentication = rate limiting (network) + expiry (protocol) + lockout (application). Each layer catches what the previous misses.

45
TLS Downgrade Hard

An attacker intercepts the TLS ClientHello between a user's browser and FinTech Company X's Platform C server, modifying it to advertise only weak cipher suites (RC4, 3DES) to force a downgrade. What mechanism in TLS 1.3 prevents this attack?

  • A. TLS 1.3 uses a longer key exchange parameter, making downgrade too slow to be practical
  • B. TLS 1.3 removed all weak cipher suites entirely — if the server requires TLS 1.3, there are no weak suites to negotiate; additionally, TLS 1.3 includes a downgrade sentinel value in the server random to detect version rollback
  • C. TLS 1.3 encrypts the ClientHello, preventing the attacker from modifying it
  • D. TLS 1.3 requires the client to sign the ClientHello with its private key
Correct Answer: B — TLS 1.3 removed weak ciphers + downgrade sentinel in ServerRandom

TLS 1.3 downgrade protection: (1) Cipher elimination — RC4, 3DES, export ciphers, and all weak suites are removed from TLS 1.3. There is no weak cipher to downgrade to. (2) Version downgrade sentinel — TLS 1.3 embeds a specific sentinel value in the ServerRandom field. If a TLS 1.3-capable server is forced (by MITM) to respond with TLS 1.2, it includes this sentinel. The client detects the sentinel in a 1.2 ServerHello and aborts the connection, knowing a downgrade occurred. (3) Encrypted extensions — TLS 1.3 encrypts more handshake messages, reducing the attacker's ability to manipulate them. Note: TLS 1.3 does NOT encrypt the ClientHello in the standard version (though ESNI/ECH extends this).

CISSP Mindset: TLS 1.3 downgrade protection = no weak ciphers to downgrade to + server random sentinel to detect version rollback. Two complementary mechanisms.

46
IPSec Security Association Hard

The Bank A IPSec VPN has been running for 8 hours. The security team notes the VPN is using the same session key without rekeying. What security principle does extended key lifetime without rekeying violate?

  • A. Least privilege — the session should not have access beyond its minimum required time
  • B. Key freshness / PFS — extended key use increases the cryptographic data exposed to a single key; if compromised, all traffic in the SA lifetime is decryptable
  • C. Non-repudiation — without rekeying, the identity of the communicating parties cannot be confirmed
  • D. Availability — long-running SAs are more likely to be disrupted by network interruptions
Correct Answer: B — Key freshness / PFS: long-lived key = larger exposure window

IPSec Security Associations have configurable lifetimes (time-based and byte-count-based). Extended use of the same key violates: (1) Key freshness — cryptographic best practice limits key usage to minimize data encrypted under a single key (birthday attack risk with AES-CBC; GCM nonce exhaustion risk); (2) PFS concerns — if PFS is enabled, each SA rekey generates a new ephemeral DH key exchange, ensuring compromise of one session key does not expose other sessions; without regular rekeying, the PFS benefit is diminished; (3) Best practice: Configure short SA lifetimes (e.g., 1 hour or 10GB) to force periodic rekeying with fresh keys.

CISSP Mindset: Key lifetime management is a cryptographic operations concern. Short SA lifetimes + PFS = minimize key exposure. Long-lived keys = larger blast radius if compromised.

47
Platform C mTLS FinTech Company X Hard

FinTech Company X's Platform C microservices use mTLS for service-to-service communication. A new service is deployed without a valid client certificate. What happens from an mTLS perspective, and why is this the correct security behavior?

  • A. The new service is allowed access but with reduced privileges — mTLS is "optional" in most implementations
  • B. The mTLS handshake fails and the connection is rejected — the server cannot verify the client's identity, so access is denied consistent with zero-trust principles
  • C. The server issues a temporary certificate to the new service automatically
  • D. The connection falls back to standard TLS (one-way) for compatibility
Correct Answer: B — mTLS handshake fails; connection rejected (zero trust)

In a strict mTLS configuration, the server requests the client certificate during the TLS handshake (CertificateRequest message). If the client cannot present a valid certificate from a trusted CA, the handshake fails with a TLS alert (certificate_required or handshake_failure) and the connection is terminated. This is the correct zero-trust behavior: "never trust, always verify." A new service without a certificate represents an uncredentialed endpoint — it must obtain a valid certificate from the PKI (e.g., through a service mesh like Istio or manual provisioning) before accessing other services. Automatic issuance should go through an automated PKI workflow with proper validation, not an ad-hoc mechanism.

CISSP Mindset: mTLS = zero trust for services. No cert = no access. This enforces the principle that network location alone should not grant trust. Service mesh PKI automates certificate lifecycle.

48
HSTS Preloading Medium

FinTech Company X has deployed HSTS on its Platform C domain. However, a first-time visitor who has never been to the site before is still vulnerable to an SSL stripping attack. What additional mechanism resolves this "TOFU" (Trust On First Use) problem?

  • A. Deploy DNSSEC on the Platform C domain
  • B. Submit the domain to the HSTS preload list — browsers ship with a built-in list of HSTS domains, so even first-time visitors automatically use HTTPS
  • C. Issue a wildcard certificate for *.aula.company-x.com
  • D. Enable certificate transparency for the Platform C domain
Correct Answer: B — HSTS preload list eliminates TOFU vulnerability

Standard HSTS works after the FIRST successful HTTPS visit — the browser stores the HSTS policy. However, the very first visit (or after cache expiry) is still vulnerable to SSL stripping. HSTS Preloading solves this: Submitting to hstspreload.org adds the domain to Chrome/Firefox/Edge's built-in HSTS list. All visitors automatically use HTTPS from the first connection — there is no "first HTTP request" to strip. Requirements: must serve HSTS with max-age≥31536000, includeSubDomains, and preload directives. This is a browser-level protection, not a server configuration. DNSSEC (A) protects DNS integrity but does not prevent SSL stripping. Certificate transparency (D) detects unauthorized certificates.

CISSP Mindset: HSTS = effective after first visit. HSTS preload = effective from first visit ever. Preloading is the strongest defense against SSL stripping for internet-facing sites.

49
VPN Authentication FinTech Company X Medium

FinTech Company X wants to upgrade the Bank A site-to-site IPSec VPN authentication from pre-shared keys (PSK) to a more scalable and secure mechanism. Which is the BEST upgrade path and why?

  • A. Upgrade to a longer PSK (32 characters) — PSK length is the only factor
  • B. Use digital certificates (PKI/X.509) for IKE Phase 1 authentication — provides scalability, non-repudiation, and allows certificate revocation
  • C. Use RADIUS for site-to-site VPN authentication
  • D. Use WPA3 SAE protocol for the VPN authentication mechanism
Correct Answer: B — Digital certificates (PKI/X.509) for IKE authentication

PSK limitations for site-to-site VPN: (1) Shared secret — if Bank A's copy is compromised, the VPN is fully compromised; (2) No non-repudiation — both sides know the same secret; (3) Management overhead — changing PSK requires coordination; (4) Does not scale to many VPN tunnels. Digital certificates solve these: (1) Private key stays on the owner's device — even the CA doesn't have it; (2) Provides non-repudiation; (3) Certificate revocation (CRL/OCSP) allows rapid revocation if compromise is suspected; (4) Scales to hundreds of VPN peers. RADIUS is for user authentication, not site-to-site gateway auth. WPA3 SAE is a wireless protocol, not VPN.

CISSP Mindset: PKI/certificates > PSK for site-to-site VPN. Scalability + revocation + non-repudiation. For B2B VPNs with partners, certificates are the professional standard.

50
PFS in TLS FinTech Company X Hard

FinTech Company X's security team discovers that a TLS 1.2 server was using RSA key exchange (no PFS) for six months before being discovered. A threat actor was recording all encrypted traffic during this period. They then obtained the server's private RSA key via a breach. What can the attacker now do?

  • A. Nothing — TLS encryption is computationally infeasible to break even with the private key
  • B. Decrypt all six months of recorded encrypted traffic retroactively — because RSA key exchange derives session keys from the server's private key
  • C. Only decrypt future sessions, not past recordings
  • D. Only decrypt sessions where they were actively performing a MITM attack
Correct Answer: B — Decrypt all six months of recorded traffic retroactively

This is precisely why PFS matters. RSA key exchange (no PFS): The client encrypts a pre-master secret using the server's RSA public key. Only the server's RSA private key can decrypt it. The master secret (session key) is derived from the pre-master secret. If the attacker has: (1) A recording of all TLS traffic over six months AND (2) The server's RSA private key They can: decrypt the pre-master secret from each recorded ClientKeyExchange → derive each session's master secret → derive session keys → decrypt all recorded traffic. With PFS (ECDHE): Each session uses a fresh ephemeral key pair. Compromising the long-term RSA private key does NOT reveal past session keys — they were generated from ephemeral keys that were discarded after each session.

CISSP Mindset: No PFS = server private key compromise = ALL past sessions decryptable. PFS (ECDHE) = session keys are ephemeral = past sessions safe even if private key is compromised. This is the defining security benefit of PFS.

Q51–Q65 Wireless Security

Q66–Q80 Email & DNS Security

66
SPF Email Security Medium

FinTech Company X's IT team adds an SPF record to their DNS. What does SPF specifically protect against?

  • A. SPF encrypts email content between mail servers
  • B. SPF authorizes which mail servers are permitted to send email on behalf of the company-x.com domain, helping receiving servers reject mail from unauthorized senders
  • C. SPF verifies that the email content has not been tampered with in transit
  • D. SPF validates that the recipient's email address exists before sending
Correct Answer: B — SPF authorizes legitimate sending mail servers

SPF (Sender Policy Framework): A DNS TXT record that lists IP addresses/ranges/hostnames authorized to send email for a domain. When a receiving mail server receives email claiming to be from company-x.com, it checks the SPF record in DNS. If the sending server's IP is NOT in the SPF record, the email fails SPF and can be marked as spam or rejected. SPF limitations: (1) Only checks the envelope "From" address (MAIL FROM), not the header "From" visible to users; (2) Does not prevent forwarding issues; (3) Does not sign/encrypt content. SPF is one of three email authentication mechanisms — must be combined with DKIM and DMARC for complete protection.

CISSP Mindset: SPF = authorized IP list for sending mail = anti-spoofing at the IP level. SPF alone is insufficient — attackers can still spoof the header From. DKIM + DMARC are needed too.

67
DKIM Email Security Medium

After FinTech Company X implements DKIM, what specific protection does it add that SPF alone does NOT provide?

  • A. DKIM verifies the sender's IP address against an authorized list
  • B. DKIM adds a cryptographic digital signature to email headers and body, allowing the receiving server to verify the email content has not been modified and the signature was created by the domain's private key
  • C. DKIM encrypts the email body so only the intended recipient can read it
  • D. DKIM ensures the email was delivered within a certain time window
Correct Answer: B — DKIM adds cryptographic signature for content integrity

DKIM (DomainKeys Identified Mail): The sending mail server signs specific email headers and the body with the domain's private key. The public key is published in DNS (TXT record). The receiving server: (1) Retrieves the public key from DNS; (2) Verifies the DKIM-Signature header; (3) Confirms the email was signed by the domain's private key and has not been modified in transit. DKIM advantages over SPF: (1) Survives email forwarding — the signature travels with the email; (2) Provides content integrity — any modification breaks the signature; (3) Signs the header "From" address (what users see), not just the envelope. DKIM does NOT encrypt content — it only signs it. The email body remains readable by mail servers.

CISSP Mindset: SPF = authorized IP list. DKIM = cryptographic signature on content. DKIM survives forwarding; SPF does not. Both needed for DMARC alignment.

68
DMARC FinTech Company X Hard

FinTech Company X publishes a DMARC record with policy "p=reject". A phishing email is sent spoofing @company-x.com. The email passes SPF (sent from an allowed IP) but fails DKIM (content was modified). What does DMARC do in this case?

  • A. The email is delivered because SPF passed
  • B. The email is rejected by receiving servers with p=reject because DMARC requires alignment — BOTH SPF AND DKIM must pass; failing DKIM triggers the reject policy
  • C. DMARC only takes action if BOTH SPF and DKIM fail simultaneously
  • D. DMARC quarantines the email regardless of SPF/DKIM results
Correct Answer: B — Email rejected because DKIM fails; DMARC enforces both SPF AND DKIM alignment

DMARC (Domain-based Message Authentication, Reporting and Conformance): DMARC requires that at least one of SPF or DKIM passes AND "aligns" with the header From domain. In this case: SPF passes (sent from authorized IP) but fails alignment (SPF checks envelope From, not header From — these may differ in a spoofing scenario); DKIM fails (content modified = signature broken). DMARC evaluation: If both SPF and DKIM fail their alignment checks, DMARC applies the policy (p=reject = reject the email). Even if SPF technically "passes," if it doesn't align with the header From domain and DKIM also fails, DMARC triggers the policy. DMARC policies: p=none (report only); p=quarantine (spam folder); p=reject (reject at SMTP). DMARC also generates aggregate reports (rua) and forensic reports (ruf) sent to the domain owner.

CISSP Mindset: DMARC = policy enforcement based on SPF+DKIM alignment. DMARC requires at least ONE to pass AND align. p=reject = mail rejected at server. Start with p=none, move to p=quarantine, then p=reject after validating legitimate mail.

69
S/MIME Email Encryption Hard

FinTech Company X's legal team needs to exchange confidential loan agreements via email with encryption AND non-repudiation. Which technology provides both, and what key is used for encryption vs. signature?

  • A. PGP — uses the sender's private key for encryption and public key for signatures
  • B. S/MIME — encryption uses the RECIPIENT's public key (only recipient can decrypt); digital signature uses the SENDER's private key (proves sender identity and non-repudiation)
  • C. TLS — provides both encryption and digital signatures for email
  • D. S/MIME — encryption uses the sender's private key; signature uses the recipient's public key
Correct Answer: B — S/MIME: encryption = recipient's public key; signature = sender's private key

S/MIME (Secure/Multipurpose Internet Mail Extensions): (1) Encryption: The sender encrypts the message using the RECIPIENT's public key (from their X.509 certificate). Only the recipient's private key can decrypt it. This ensures confidentiality — only the intended recipient can read it; (2) Digital Signature: The sender signs the message using their own PRIVATE key. The recipient verifies using the sender's PUBLIC key. This provides: authentication (proves who sent it), integrity (message was not modified), and non-repudiation (sender cannot deny sending it). Both encryption and signing can be applied together. TLS encrypts the email channel (SMTP over TLS / STARTTLS) but not the email content at rest — once delivered, it is unencrypted unless S/MIME or PGP is used.

CISSP Mindset: Encrypt = recipient's public key (only they can decrypt). Sign = sender's private key (proves identity, non-repudiation). This applies to ALL asymmetric operations: email, code signing, certificates.

70
DNSSEC DNS Security Hard

FinTech Company X implements DNSSEC on its domain. What does DNSSEC specifically provide that standard DNS does NOT?

  • A. DNSSEC encrypts DNS queries and responses to prevent eavesdropping
  • B. DNSSEC adds cryptographic signatures to DNS records — allowing resolvers to verify that DNS responses are authentic and have not been tampered with (data integrity and origin authentication)
  • C. DNSSEC blocks DNS-based DDoS attacks (DNS amplification)
  • D. DNSSEC hides DNS records from unauthorized parties
Correct Answer: B — DNSSEC adds cryptographic signatures for integrity and origin authentication

DNSSEC (DNS Security Extensions): DNS has no built-in authentication — responses can be forged (DNS cache poisoning). DNSSEC adds: (1) Cryptographic signatures (RRSIG records) on DNS resource records; (2) The zone is signed with a private key (ZSK — Zone Signing Key); (3) Resolvers verify signatures using the public key (published as DNSKEY records); (4) Chain of trust from the root DNS zone down to the domain. DNSSEC does NOT encrypt DNS — queries and responses are still in plaintext. DNSSEC provides integrity and authenticity, not confidentiality. For privacy (encrypting DNS queries), DoH (DNS over HTTPS) or DoT (DNS over TLS) is required. These are complementary: DNSSEC = content integrity; DoH/DoT = transport encryption.

CISSP Mindset: DNSSEC = data integrity + origin authentication (not encryption). DoH/DoT = encryption (not integrity). Know the difference: DNSSEC validates content; DoH/DoT hides the query from observers.

71
DoH vs DoT DNS Privacy Hard

FinTech Company X is evaluating DNS over HTTPS (DoH) vs. DNS over TLS (DoT) for employee devices. What is the PRIMARY operational security difference between them?

  • A. DoH uses UDP; DoT uses TCP
  • B. DoH runs on port 443 (HTTPS), making it hard to detect and filter by corporate firewalls/proxies; DoT runs on dedicated port 853, allowing corporate controls to block or monitor it explicitly
  • C. DoT provides stronger encryption than DoH
  • D. DoH is only for external DNS; DoT is only for internal DNS
Correct Answer: B — DoH on port 443 (bypasses corporate filtering); DoT on port 853 (filterable)

Both DoH and DoT encrypt DNS queries: DoH: Encapsulates DNS in HTTPS (port 443). Corporate firewalls cannot distinguish DoH traffic from regular HTTPS without deep packet inspection. This means employees can bypass corporate DNS filtering (malware domain blocking, content filtering) if DoH resolvers are hardcoded in browsers (Chrome, Firefox implement DoH by default). Corporate impact: DNS-based security controls (Umbrella, NextDNS, BlueCoat) are bypassed. DoT: Uses dedicated port 853. Corporate firewalls can explicitly block or intercept port 853, redirecting to corporate DNS resolvers. This allows visibility. From a pure privacy perspective, both offer equivalent encryption strength. Operationally, DoT is more manageable for enterprise environments.

CISSP Mindset: DoH = bypasses corporate DNS controls (security risk for enterprise). DoT = filterable/controllable port. For enterprise environments, DoT is more manageable. For privacy (from ISP), both work equally.

72
Email Spoofing FinTech Company X Medium

FinTech Company X receives a phishing complaint: employees received emails appearing to be from ceo@company-x.com asking for urgent wire transfers. FinTech Company X has published SPF and DKIM but NOT DMARC. Why did the phishing email still get through?

  • A. SPF and DKIM alone are sufficient to block all spoofing — the email should have been blocked
  • B. Without DMARC, there is no policy enforcement: the receiving server may check SPF/DKIM but has no instruction on what to DO if they fail — by default, the email is delivered anyway
  • C. The phishing email passed both SPF and DKIM checks successfully
  • D. SPF and DKIM are only relevant for outbound email, not inbound filtering
Correct Answer: B — Without DMARC, no enforcement policy; SPF/DKIM failures result in delivery by default

SPF and DKIM are AUTHENTICATION mechanisms — they detect spoofing. DMARC is the ENFORCEMENT mechanism — it tells receiving servers what to DO when authentication fails. Without DMARC, a receiving server checks SPF/DKIM and may note the results in headers (Authentication-Results), but there is no published policy saying "reject" or "quarantine" failures. Most mail servers default to delivering suspicious email rather than dropping it (to avoid false positives). DMARC closes this gap: publish p=quarantine or p=reject to instruct receiving servers to take action on authentication failures. The correct remediation for FinTech Company X: add a DMARC record, start with p=none (monitoring only), then escalate to p=quarantine and p=reject after validating all legitimate mail passes.

CISSP Mindset: SPF+DKIM = detect. DMARC = enforce. Without DMARC, detection alone doesn't stop delivery. The three work as a trio — all three are required for complete email authentication.

73
DNS Cache Poisoning Kaminsky Attack Hard

The Kaminsky DNS cache poisoning attack (2008) was a significant DNS vulnerability. What made DNSSEC the definitive fix for this class of attack?

  • A. DNSSEC increased the DNS port from 53 to a randomized port, preventing spoofed responses
  • B. DNSSEC added source port randomization to DNS queries
  • C. DNSSEC cryptographically signs DNS responses — an attacker's forged response cannot include a valid signature without access to the zone's private key, making poisoning impossible for signed zones
  • D. DNSSEC encrypted DNS queries, preventing eavesdropping that enabled the attack
Correct Answer: C — DNSSEC signs responses; forged responses fail cryptographic verification

Kaminsky attack: exploited DNS transaction ID (only 16-bit) and predictable source ports to flood a resolver with forged responses, winning the race before the legitimate response arrived. Short-term fix: source port randomization (increases entropy from 16-bit to ~32-bit). Definitive fix (DNSSEC): Cryptographic signatures on DNS records. An attacker's forged response cannot include a valid signature because they don't have the zone's private key (ZSK/KSK). The resolver verifies the RRSIG record against the published public key — a forged record without a matching signature is rejected. This defeats cache poisoning regardless of timing. DNSSEC does not use port randomization (that was an interim workaround) and does not encrypt queries.

CISSP Mindset: DNS cache poisoning = race condition attack. DNSSEC = cryptographic authentication = race doesn't matter. A forged response without a valid signature is always rejected.

74
Email Security FinTech Company X Medium

FinTech Company X's CISO asks: "Which email security configuration gives us the STRONGEST protection against domain spoofing for our company-x.com domain?" Select the BEST answer.

  • A. SPF record with all = (all servers allowed to send)
  • B. SPF strict record (~all) + DKIM with 2048-bit key + DMARC p=none
  • C. SPF strict record (-all) + DKIM with 2048-bit RSA key + DMARC p=reject + reporting enabled
  • D. DKIM only — SPF and DMARC are redundant when DKIM is implemented
Correct Answer: C — SPF strict (-all) + DKIM 2048-bit + DMARC p=reject + reporting

Optimal email anti-spoofing configuration: (1) SPF with -all (hard fail) — explicitly rejects unauthorized senders; ~all (soft fail) only marks as suspicious; (2) DKIM with 2048-bit RSA (minimum; 1024-bit is deprecated) — provides cryptographic content integrity; (3) DMARC p=reject — receiving servers reject email failing authentication; reporting (rua/ruf) provides visibility into who is sending email using your domain (legitimate and malicious); (4) Together: SPF identifies authorized IPs, DKIM proves content integrity, DMARC enforces policy and reports. DMARC p=none (option B) provides no enforcement — it is only for monitoring. Note: Start with p=none to avoid blocking legitimate mail during initial deployment, then progress to p=quarantine then p=reject.

CISSP Mindset: Complete email anti-spoofing = SPF (-all) + DKIM (2048+) + DMARC (p=reject) + reporting. This is the industry standard triplet. DMARC alone without SPF/DKIM has nothing to enforce.

75
DNS Amplification DDoS Hard

An attacker spoofs FinTech Company X's IP address and sends small DNS queries to open resolvers worldwide, which respond with large DNS responses sent to FinTech Company X's IP. What attack is this, and what is the PRIMARY mitigation at the DNS infrastructure level?

  • A. DNS hijacking; mitigation is DNSSEC
  • B. DNS amplification DDoS; mitigation is disabling open recursive DNS resolvers and implementing Response Rate Limiting (RRL) on authoritative DNS servers
  • C. DNS cache poisoning; mitigation is source port randomization
  • D. DNS tunneling; mitigation is blocking IXFR zone transfer requests
Correct Answer: B — DNS amplification DDoS; mitigation is closing open resolvers + RRL

DNS amplification attack: (1) Attacker spoofs victim IP → queries open DNS resolver for a record with a large response (e.g., ANY, DNSKEY, or TXT records can be 40–70x larger than the query); (2) Open resolver sends large responses to the victim IP; (3) Amplification factor: 40–100x bandwidth amplification — small attacker bandwidth → large attack traffic at the victim. Mitigations: (1) Disable open recursive resolvers — DNS servers should only answer queries from authorized clients; (2) Response Rate Limiting (RRL) on authoritative servers — limits response rate per query source; (3) BCP38/ingress filtering — ISPs block spoofed source IPs (removes the ability to spoof the victim IP); (4) CloudFlare/Anycast DNS — absorbs DDoS traffic at the edge. FinTech Company X using CloudFlare for Partner C benefits from CloudFlare's DNS DDoS mitigation.

CISSP Mindset: DNS amplification = spoofed IP + open resolver = victim gets flooded. Close open resolvers + RRL at DNS level. BCP38 at ISP level. Anycast/CDN at enterprise level.

76
DNS Tunneling Hard

FinTech Company X's SOC analyst detects unusually high volumes of DNS queries from one workstation, with very long subdomains containing seemingly random characters (e.g., a1b2c3d4e5f6.exfil.attacker.com). What is likely occurring, and what is the best detection/prevention approach?

  • A. Normal DNS TTL refresh behavior; no action needed
  • B. DNS tunneling — data is being exfiltrated by encoding it in DNS query hostnames; detection via DNS monitoring for high query rate, unusual subdomain entropy, and large DNS payloads; prevention via DNS firewall blocking suspicious domains
  • C. A misconfigured DHCP server causing excessive DNS resolution
  • D. DNSSEC validation failures causing repeated query retries
Correct Answer: B — DNS tunneling (data exfiltration); detect via query analysis; block via DNS firewall

DNS tunneling encodes data (C2 commands, exfiltrated files) in DNS query hostnames. DNS is typically allowed through firewalls, making it an attractive covert channel. Indicators: (1) High DNS query volume from a single host; (2) Long subdomain strings with high entropy (random-looking characters); (3) Queries to unusual or newly registered domains; (4) Large DNS response sizes. Detection: DNS traffic analysis (frequency, entropy, query length analysis); SIEM rules for DNS anomalies; threat intelligence feeds for known DNS tunnel C2 domains. Prevention: (1) Restrict DNS queries to internal resolvers only (block direct DNS to internet); (2) DNS firewall (RPZ) blocking known malicious domains; (3) DLP monitoring for encoded data patterns in DNS. This is a real APT technique used to bypass egress filtering.

CISSP Mindset: DNS tunneling = data exfiltration/C2 over DNS (permitted protocol). Detection = entropy analysis + query volume. Prevention = DNS firewall + restrict direct DNS access. Always suspect DNS as a covert channel.

77
Email Security SMTP Medium

Which SMTP security control ensures that mail transferred between FinTech Company X's mail server and external mail servers is encrypted in transit (opportunistic encryption)?

  • A. S/MIME — signs and encrypts individual messages
  • B. STARTTLS — upgrades an existing SMTP connection to TLS, encrypting the SMTP session between mail servers
  • C. SPF — prevents unauthorized mail senders
  • D. DMARC p=reject — rejects unauthenticated mail
Correct Answer: B — STARTTLS encrypts SMTP sessions between mail servers

STARTTLS: An SMTP command that upgrades a plaintext SMTP connection (port 25) to an encrypted TLS connection. It provides transport-level encryption for email in transit between mail servers (MTA-to-MTA). Limitation: STARTTLS is opportunistic — if the receiving server does not support TLS, the connection falls back to plaintext (potential downgrade attack). MTA-STS (Mail Transfer Agent Strict Transport Security) mandates TLS and prevents downgrade. SMTP over TLS (port 465 - SMTPS) uses TLS from the start. STARTTLS vs. S/MIME: STARTTLS encrypts the transport channel (like TLS for web); S/MIME encrypts the email content itself (end-to-end). Both are needed for comprehensive email security.

CISSP Mindset: STARTTLS = channel encryption (transport-level). S/MIME = content encryption (end-to-end). STARTTLS protects in transit; S/MIME protects even after delivery to mail servers.

78
DNS Security FinTech Company X Medium

FinTech Company X's DNS for aula.company-x.com is managed by an external provider. An attacker compromises the DNS registrar account and changes the A record for aula.company-x.com to an attacker-controlled IP. Which control would MOST effectively detect or prevent this attack?

  • A. Enable DNSSEC on the aula.company-x.com zone
  • B. Monitor DNS records for unauthorized changes using DNS monitoring tools; enable MFA on the DNS registrar account; use registrar lock to prevent unauthorized zone changes
  • C. Use a CAA (Certification Authority Authorization) DNS record
  • D. Deploy DoH to encrypt DNS queries to the registrar
Correct Answer: B — DNS monitoring + MFA on registrar + registrar lock

This is a registrar account compromise attack, not a DNS cache poisoning attack. DNSSEC (option A) is excellent for cache poisoning but does not prevent an attacker with legitimate access to the registrar portal from changing authoritative records — DNSSEC keys can be updated too. The correct controls target the registrar account: (1) MFA on the registrar account — prevents credential theft from granting access; (2) Registrar lock — a "domain transfer lock" or "registrar lock" prevents DNS zone changes without an additional out-of-band verification step; (3) DNS monitoring — alerts when A records, NS records, or DNSSEC configuration changes unexpectedly. CAA records (C) limit which CAs can issue certificates for the domain — useful but doesn't prevent DNS hijacking. DoH (D) encrypts queries but doesn't protect authoritative records.

CISSP Mindset: Registrar compromise = access control problem (not cryptography). MFA + registrar lock + monitoring = the right controls for the right threat. Match the control to the specific threat vector.

79
Phishing Email Gateway Medium

FinTech Company X's CISO wants to implement the MOST comprehensive technical defense against phishing emails targeting employees. Which layered approach is BEST?

  • A. Employee phishing awareness training only — technology cannot reliably detect phishing
  • B. Secure email gateway with anti-phishing, URL rewriting, and sandboxing; SPF+DKIM+DMARC; browser isolation for clicked links; MFA on all accounts; phishing-resistant authenticators (FIDO2)
  • C. Block all external email; only allow internal email
  • D. DMARC p=reject alone prevents all phishing
Correct Answer: B — Layered approach: gateway + DMARC + browser isolation + MFA + FIDO2

No single control stops phishing. Defense in depth: (1) Secure Email Gateway (SEG) — filters inbound email, detects phishing patterns, rewrites URLs (checks at click-time), sandboxes attachments; (2) SPF+DKIM+DMARC — blocks spoofed domain emails; (3) Browser isolation / URL sandboxing — even if an employee clicks a phishing link, the malicious page runs in an isolated environment; (4) MFA — even if credentials are stolen via phishing, MFA prevents login; (5) Phishing-resistant MFA (FIDO2/passkeys) — eliminates credential phishing entirely because FIDO2 tokens are bound to the origin URL; (6) Awareness training — last line of defense. DMARC alone (D) only blocks emails spoofing FinTech Company X's own domain — not phishing using look-alike domains (trustingsocial-secure.com).

CISSP Mindset: Phishing defense = multiple independent layers. No single technical control is sufficient. The strongest technical control is phishing-resistant MFA (FIDO2) — credential theft becomes irrelevant.

80
Email Retention S/MIME Key Management Hard

FinTech Company X implements S/MIME encryption for all internal email. An employee departs and their private key is deleted. Years later, a legal discovery request requires access to encrypted email from that employee's tenure. What is the BEST key management practice that would have prevented this problem?

  • A. Use symmetric encryption instead of asymmetric for email
  • B. Implement key escrow or key recovery — the organization retains a copy of employee email encryption private keys in a secure key escrow system, accessible only under authorized legal processes
  • C. Disable S/MIME encryption for all email to ensure legal discovery access
  • D. Require employees to archive their private keys in their email client before departure
Correct Answer: B — Key escrow for organizational access to encrypted email

S/MIME email encryption creates a business problem: if the private key is lost/deleted, encrypted email becomes permanently unrecoverable. Key escrow (key recovery): The organization maintains a copy of each user's private key in a secure, access-controlled key escrow system. Access to escrowed keys requires formal authorization (legal counsel, court order, HR approval). This allows: (1) Legal discovery of encrypted email; (2) Recovery after employee departure; (3) Recovery after device loss. Operational considerations: The escrow system must be highly secured (HSM-backed, MFA, audit logging) — it is a high-value target. Dual-key pairs are sometimes used: a personal signing key (not escrowed, ensures non-repudiation) and an organizational encryption key (escrowed, ensures recovery). Disabling encryption (C) defeats the security purpose.

CISSP Mindset: Key escrow = balancing individual privacy with organizational access requirements. Legal discovery is a legitimate business need. Key escrow must be secured as carefully as the keys themselves.

51
WEP Medium

Why is WEP (Wired Equivalent Privacy) considered completely broken and unsuitable for any production wireless network?

  • A. WEP uses AES encryption, which has known mathematical weaknesses
  • B. WEP uses RC4 with a static key and a short, reused 24-bit IV (Initialization Vector), allowing passive analysis of captured packets to reconstruct the key within minutes
  • C. WEP does not encrypt wireless traffic at all; it only provides authentication
  • D. WEP requires physical cable connections and cannot work wirelessly
Correct Answer: B — RC4 with short/reused 24-bit IV allows rapid key recovery

WEP's critical flaws: (1) RC4 stream cipher with a weak key scheduling algorithm (KSA); (2) 24-bit IV (Initialization Vector) — too short, IVs are reused within hours on busy networks; (3) IV is sent in cleartext in the packet header; (4) The key = IV + static password — same static key forever; (5) Tools like aircrack-ng can recover the WEP key from approximately 40,000–85,000 captured IVs (passive capture only — no active attack needed); (6) This can take under 10 minutes on a moderately busy network. IEEE 802.11i (WPA2) with AES-CCMP replaced WEP entirely. No security exception exists for WEP — it must never be used.

CISSP Mindset: WEP = broken by design. RC4 + short IV + static key = passive recovery. There is no "secure WEP configuration." Any network using WEP must upgrade immediately.

52
WPA2-PSK Offline Attack Medium

An attacker captures the WPA2-PSK 4-way handshake from FinTech Company X's guest Wi-Fi network. Without knowing the password, what attack can the attacker now perform offline?

  • A. Nothing — the 4-way handshake is unbreakable without the original password
  • B. Offline dictionary/brute-force attack — the attacker tests candidate passwords against the captured handshake without any further contact with the network
  • C. The attacker can only perform a replay attack, not a password recovery
  • D. Online brute-force against the Wi-Fi access point
Correct Answer: B — Offline dictionary/brute-force attack against captured handshake

WPA2-PSK weakness: The 4-way handshake contains enough information (ANonce, SNonce, AP MAC, Client MAC, and the MIC/hash) for an attacker to verify candidate passwords offline. Tools like hashcat and aircrack-ng perform this attack at GPU-accelerated speeds (billions of candidates per second with modern GPUs). The attacker requires no further interaction with the network. Mitigations: (1) Use WPA3-SAE which prevents offline attacks (SAE doesn't expose enough information to enable offline cracking); (2) Use a long, random PSK (20+ characters) to make brute-force impractical; (3) Use WPA2-Enterprise (802.1X) which eliminates the shared password entirely.

CISSP Mindset: WPA2-PSK 4-way handshake = offline dictionary attack possible. WPA3-SAE = offline attack prevented. Weak passwords + WPA2-PSK = high risk. Strong random PSK or WPA3 required.

53
WPA3-SAE vs PSK Hard

FinTech Company X upgrades its corporate Wi-Fi from WPA2-PSK to WPA3-SAE. What is the SPECIFIC cryptographic advantage that makes WPA3-SAE resistant to offline dictionary attacks that WPA2-PSK is vulnerable to?

  • A. WPA3-SAE uses AES-256 instead of AES-128, making brute-force computationally harder
  • B. WPA3-SAE uses the Simultaneous Authentication of Equals (SAE) handshake — a Dragonfly key exchange based on ECDH; the handshake does not reveal enough information to verify a password guess offline, requiring an online interaction per guess
  • C. WPA3-SAE eliminates the need for any password — it uses certificates only
  • D. WPA3-SAE encrypts the SSID, preventing attackers from discovering the network
Correct Answer: B — SAE Dragonfly handshake requires online interaction per guess

WPA3-SAE (Dragonfly Key Exchange / IEEE 802.11s): Unlike WPA2-PSK's 4-way handshake, the SAE handshake is designed so that: (1) The password is used to derive a point on an elliptic curve (via the "hunting and pecking" or hash-to-curve method); (2) The resulting key exchange does not expose enough data to verify a password guess without completing the full protocol with the AP; (3) An attacker must interact with the AP for EACH password guess — the AP can rate-limit these; (4) Even if a session is captured, the session key cannot be retroactively derived from a guessed password (provides forward secrecy). This defeats offline dictionary attacks completely. WPA3-SAE still uses a password — it changes HOW the password is used in the key exchange.

CISSP Mindset: WPA3-SAE = password stays offline (never transmitted); SAE handshake = cannot verify guesses without AP interaction. This is the fundamental difference from WPA2-PSK.

54
802.1X RADIUS Wireless Medium

FinTech Company X deploys WPA2-Enterprise (802.1X) on its corporate SSID "TS-Corp". A new employee tries to connect. Which component verifies the employee's credentials and grants access?

  • A. The wireless access point (AP) checks credentials against a local database
  • B. The RADIUS server (Authentication Server) validates credentials; the AP acts as an authenticator that forwards credentials to the RADIUS server
  • C. The employee's device validates the AP's identity and grants itself access
  • D. The DHCP server assigns an IP only to authenticated users, acting as the authorization mechanism
Correct Answer: B — RADIUS server validates; AP is authenticator (forwarder)

802.1X has three roles: (1) Supplicant — the client device (employee laptop) requesting access; (2) Authenticator — the wireless AP (or switch in wired 802.1X): receives credentials and forwards them via RADIUS to the authentication server; (3) Authentication Server — the RADIUS server (typically integrated with Active Directory via LDAP/Kerberos): validates credentials, returns Accept/Reject, and may assign VLAN. The AP does NOT verify credentials itself — it is a controlled conduit. This architecture centralizes authentication, enables per-user policies, and avoids sharing credentials with each AP. No single password = no single point of credential compromise.

CISSP Mindset: 802.1X roles: Supplicant (client) → Authenticator (AP/switch) → Authentication Server (RADIUS). The AP is a gatekeeper, not the credential checker.

55
EAP-TLS vs PEAP Hard

FinTech Company X is choosing between EAP-TLS and PEAP for its WPA2-Enterprise wireless implementation. Which statement BEST describes the security difference?

  • A. EAP-TLS and PEAP provide identical security — the choice is purely cosmetic
  • B. EAP-TLS requires BOTH client and server certificates (strongest — true mutual certificate authentication); PEAP only requires a server certificate and tunnels inner authentication (username/password) inside a TLS tunnel
  • C. PEAP provides stronger security because it uses two layers of encryption
  • D. EAP-TLS only works on iOS devices; PEAP works on all platforms
Correct Answer: B — EAP-TLS = mutual cert auth (strongest); PEAP = server cert + inner auth

EAP-TLS: (1) Requires a client certificate on every device (provisioned via MDM/PKI); (2) Mutual certificate authentication — both client and RADIUS server present certificates; (3) Strongest EAP method — eliminates password-based attacks entirely; (4) Higher operational overhead — managing client certificates for all devices. PEAP (Protected EAP): (1) Only the RADIUS server presents a certificate; (2) Creates a TLS tunnel, then tunnels inner authentication (usually MSCHAPv2 with username/password) through it; (3) Easier to deploy — no client certificates needed; (4) Weaker — inner MSCHAPv2 credentials can be attacked if the TLS tunnel is improperly validated (RADIUS server certificate not validated by client). Operational recommendation: EAP-TLS for security-critical corporate access; PEAP for simpler deployments with proper server certificate validation.

CISSP Mindset: EAP-TLS = strongest (mutual certs). PEAP = simpler (server cert + password inside tunnel). The managerial choice depends on security requirements vs. operational complexity.

56
Evil Twin Medium

An attacker sets up a rogue access point with the same SSID as FinTech Company X's "TS-Corp" Wi-Fi with a stronger signal, luring employees to connect. What is this attack called and what is the BEST technical mitigation?

  • A. Deauthentication attack; mitigation is PMF (Protected Management Frames)
  • B. Evil twin attack; mitigation is 802.1X/EAP with server certificate validation — employees' devices reject connections to APs that cannot present the trusted RADIUS server certificate
  • C. ARP poisoning attack; mitigation is Dynamic ARP Inspection
  • D. SSID spoofing; mitigation is hiding the SSID (disabling SSID broadcast)
Correct Answer: B — Evil twin; mitigation is 802.1X with server certificate validation

Evil twin attack: Attacker creates a rogue AP with the same SSID ("TS-Corp") and higher signal strength, causing devices to associate with the rogue AP instead of the legitimate one. The attacker performs a MITM attack on all associated traffic. Mitigation: 802.1X/EAP with strict server certificate validation: (1) The legitimate RADIUS server has a specific TLS certificate; (2) The rogue AP cannot obtain this certificate; (3) Client devices are configured to validate the RADIUS server certificate and reject connections from APs that cannot authenticate with the correct RADIUS certificate; (4) This makes evil twin attacks against 802.1X networks ineffective. WPA2-PSK is vulnerable to evil twins because anyone can create an AP with the correct password. SSID hiding (option D) provides no real security — SSID is transmitted in probe responses.

CISSP Mindset: Evil twin defeats WPA2-PSK. 802.1X defeats evil twin because the attacker cannot forge the RADIUS server certificate. Server cert validation must be enforced on client devices.

57
Deauth Attack PMF Hard

An attacker sends forged 802.11 deauthentication frames to continuously disconnect employees from FinTech Company X's corporate Wi-Fi. Which technology directly prevents this attack?

  • A. WPA3-SAE — the SAE handshake prevents deauthentication flooding
  • B. PMF (Protected Management Frames / IEEE 802.11w) — cryptographically authenticates management frames including deauthentication, preventing forgery
  • C. IDS/IPS — detects and blocks deauthentication floods at the network layer
  • D. MAC address filtering — prevents the attacker's device from sending management frames
Correct Answer: B — PMF (Protected Management Frames / 802.11w)

Deauthentication attacks exploit the fact that 802.11 management frames (deauth, disassociation) are sent in cleartext without authentication — any device can forge them. This is a DoS attack that disrupts Wi-Fi service or forces clients to reconnect (enabling handshake capture). PMF (Protected Management Frames): (1) IEEE 802.11w standard; (2) Cryptographically protects unicast management frames using keys derived from the association process; (3) Forged deauth frames from an attacker are rejected because they cannot pass the integrity check; (4) PMF is MANDATORY in WPA3; it is optional but recommended in WPA2. WPA3-SAE alone protects the authentication handshake but does not address management frame forgery unless PMF is also enabled. MAC filtering (D) is trivially bypassed and does not protect management frames.

CISSP Mindset: Deauth attack = management frame forgery. PMF = cryptographic protection of management frames. WPA3 mandates PMF; WPA2 should enable it. Know: PMF = 802.11w = management frame protection.

58
Wireless Site Survey Medium

Before deploying wireless APs in FinTech Company X's new office floor, the network team performs a site survey. What is the PRIMARY security-relevant purpose of a wireless site survey?

  • A. To identify the cheapest access points for purchase
  • B. To identify RF interference sources, coverage dead zones, existing rogue APs, and optimal AP placement to minimize signal bleed outside the office perimeter
  • C. To test the speed of the internet connection at each desk location
  • D. To configure VLANs for the wireless network
Correct Answer: B — Identify RF interference, rogue APs, coverage gaps, and signal bleed

A wireless site survey has multiple security purposes: (1) Rogue AP detection — identify unauthorized APs already operating in the space before deployment; (2) Signal bleed mapping — ensure the corporate Wi-Fi signal does not extend into public areas (parking lots, adjacent offices) where attackers can connect; (3) Coverage optimization — identify dead zones that could force devices to connect to rogue APs or external networks; (4) Channel interference — identify competing signals that may affect security (deauth attacks easier in congested spectrum); (5) Establish a baseline for future comparison to detect unauthorized new APs. Site surveys are both an operational and security activity.

CISSP Mindset: Site survey = pre-deployment security baseline. Key outputs: rogue AP map, signal bleed boundaries, channel plan. Signal bleed beyond the physical perimeter = unauthorized access risk.

59
WPA3 Enterprise Medium

FinTech Company X's CISO asks: "Should we deploy WPA3-Personal (SAE) or WPA3-Enterprise (802.1X) for the corporate wireless network?" What is the MOST operationally and security-appropriate recommendation?

  • A. WPA3-Personal is sufficient for corporate networks — SAE is strong enough
  • B. WPA3-Enterprise with 802.1X — provides per-user/device authentication, no shared password, centralized policy enforcement, certificate-based auth, and integrates with corporate IAM; WPA3-Personal still uses a shared password
  • C. WPA3 is not yet mature — stay on WPA2-PSK for stability
  • D. Implement both simultaneously — devices choose the stronger protocol automatically
Correct Answer: B — WPA3-Enterprise (802.1X) for corporate networks

WPA3-Personal (SAE): Still uses a shared password — all corporate employees share one password. Better than WPA2-PSK but a compromised employee device exposes the password. No per-user accountability. WPA3-Enterprise (802.1X + RADIUS): (1) Per-user/device credentials — each person has unique credentials (or certificate); (2) When an employee leaves, their access is revoked individually — no password change needed; (3) Integrates with Active Directory/LDAP for centralized IAM; (4) Audit trail — per-user authentication logs; (5) With EAP-TLS: eliminates passwords entirely. For a fintech like FinTech Company X with regulatory requirements, WPA3-Enterprise is the correct answer. WPA3-Personal is appropriate for home networks, guest networks, or small businesses without AD.

CISSP Mindset: Corporate Wi-Fi = Enterprise (802.1X). Shared password = shared risk. Per-user credentials = granular access control, revocation, and accountability.

60
Rogue AP FinTech Company X Medium

An employee at FinTech Company X's HCMC office connects a personal Wi-Fi hotspot device to a wired Ethernet port in a conference room, creating an unauthorized wireless network. What is this called and what is the BEST technical control to prevent it?

  • A. Evil twin attack; prevented by Wi-Fi passwords
  • B. Rogue access point; prevented by 802.1X port authentication on wired switch ports — unauthorized devices cannot obtain an IP and create a bridge to the corporate network
  • C. War driving; prevented by reducing Wi-Fi transmit power
  • D. Wireless jamming; prevented by using 5GHz instead of 2.4GHz
Correct Answer: B — Rogue AP; prevented by 802.1X on wired switch ports

A rogue access point is any unauthorized AP connected to the corporate network — whether malicious or well-intentioned (employee wanting better coverage). Risks: bypasses security controls, creates unmonitored wireless access, enables external attackers to reach the internal network via Wi-Fi. Prevention: 802.1X on wired switch ports — the hotspot device must authenticate before the switch port activates. Without 802.1X, the device gets blocked at the port level. Additional controls: (1) Wireless IDS scanning for unauthorized SSIDs; (2) DHCP fingerprinting to detect unexpected device types; (3) Physical port security policies; (4) Network monitoring for new MAC addresses. Employee education addresses the accidental aspect, but technical controls are required.

CISSP Mindset: Rogue APs = unauthorized network extension. 802.1X on wired ports = technical control. Wi-Fi scanning for unknown SSIDs = detection. Both prevention and detection are needed.

61
Bluetooth Security Medium

Which Bluetooth attack involves an attacker sending unsolicited data (files or messages) to a Bluetooth-enabled device without the owner's knowledge, potentially introducing malware?

  • A. Bluesnarfing — unauthorized access to device data via Bluetooth
  • B. Bluejacking — sending unsolicited messages/data to Bluetooth devices
  • C. Bluebugging — taking full control of a Bluetooth device remotely
  • D. Bluejumping — redirecting Bluetooth connections to a malicious device
Correct Answer: B — Bluejacking

Bluetooth attack taxonomy: (1) Bluejacking — sending unsolicited data (contacts, messages, files) to a discoverable Bluetooth device. The recipient may be tricked into accepting the data. Primarily annoying but can introduce malware if malicious files are accepted; (2) Bluesnarfing — unauthorized access to data ON the victim's device (contacts, calendar, emails) exploiting Bluetooth vulnerabilities without authentication; (3) Bluebugging — full remote control of the victim's device (calls, SMS, microphone) through Bluetooth vulnerabilities. Mitigations: Set Bluetooth to "non-discoverable" when not pairing; disable Bluetooth when not in use; never accept pairing or file transfer requests from unknown devices.

CISSP Mindset: Bluejacking = send to victim (annoyance/malware). Bluesnarfing = steal from victim (data theft). Bluebugging = control victim (full compromise). Know the distinction for the exam.

62
Wireless Protocols Medium

FinTech Company X's security policy ranks Wi-Fi security protocols. Rank these from MOST to LEAST secure for enterprise corporate use: WEP, WPA2-PSK, WPA2-Enterprise, WPA3-Enterprise, WPA3-Personal.

  • A. WPA3-Enterprise > WPA3-Personal > WPA2-Enterprise > WPA2-PSK > WEP
  • B. WPA2-Enterprise > WPA3-Enterprise > WPA3-Personal > WPA2-PSK > WEP
  • C. WPA3-Personal > WPA3-Enterprise > WPA2-Enterprise > WPA2-PSK > WEP
  • D. WPA3-Enterprise = WPA3-Personal > WPA2-Enterprise > WPA2-PSK > WEP
Correct Answer: A — WPA3-Enterprise > WPA3-Personal > WPA2-Enterprise > WPA2-PSK > WEP

Security ranking rationale: (1) WPA3-Enterprise — 802.1X + RADIUS + 192-bit security mode (in WPA3-Enterprise 192-bit standard) + PMF mandatory + SAE or TLS-based auth = strongest; (2) WPA3-Personal — SAE handshake resists offline attacks + PMF mandatory, but still shared password = not suitable for corporate; (3) WPA2-Enterprise — 802.1X + RADIUS + per-user auth + PMF optional = strong for corporate but older protocol with more known vulnerabilities; (4) WPA2-PSK — shared password, offline dictionary attack vulnerability, no per-user accountability; (5) WEP — completely broken, attackable in minutes. WPA3-Personal ranks above WPA2-Enterprise because SAE prevents offline attacks that can threaten WPA2-Enterprise (credential stuffing on RADIUS), despite WPA2-Enterprise's per-user advantage.

CISSP Mindset: Protocol strength: WPA3 > WPA2 (same category); Enterprise > Personal (for corporate use). Combine the best of both: WPA3-Enterprise is the gold standard.

63
KRACK Attack WPA2 Hard

The KRACK (Key Reinstallation Attack) vulnerability in WPA2 allowed attackers to force nonce reuse in the 4-way handshake. What is the PRIMARY mitigation for KRACK, and why doesn't the risk fully justify replacing WPA2 immediately in all organizations?

  • A. Replace all WPA2 infrastructure with WEP; KRACK only affects WPA2
  • B. Apply vendor patches to clients and APs; KRACK enables decryption but HTTPS/TLS protects application-layer data; risk is reduced when end-to-end encryption is used at higher layers
  • C. Disable all wireless networks permanently until WPA3 is fully deployed
  • D. KRACK only affects WPA2-PSK, not WPA2-Enterprise, so enterprise networks require no action
Correct Answer: B — Patch clients/APs; HTTPS at higher layers reduces real-world impact

KRACK (2017): Exploits the WPA2 4-way handshake to reinstall a previously used key, enabling nonce reuse that can break AES-CCMP encryption and allow decryption/injection. Mitigations: (1) Vendor patches — client-side patch prevents nonce reuse (KRACK requires the client side to be unpatched; the AP alone doesn't need to be vulnerable); (2) Why not full replacement: Even if WPA2 encryption is broken by KRACK, HTTPS/TLS protects application data at a higher layer. Attackers decrypting WPA2 traffic only see encrypted HTTPS, not plaintext loan application data. Defense in depth means higher-layer encryption limits KRACK's real impact. Full migration to WPA3 is the long-term goal but is not always immediately operationally feasible.

CISSP Mindset: KRACK = patch + higher-layer encryption as defense in depth. Perfect defense-in-depth means Wi-Fi encryption is just one layer — HTTPS protects even if Wi-Fi is broken.

64
Wireless Guest Network FinTech Company X Medium

FinTech Company X provides a guest Wi-Fi network "TS-Guest" in its lobby for visitors. What security controls MUST be implemented to protect the corporate network while providing guest access?

  • A. Use the same SSID and password as the corporate network for simplicity
  • B. VLAN isolation separating guest traffic from corporate traffic; internet-only access from the guest VLAN; captive portal for acceptable use acknowledgment; bandwidth throttling
  • C. Require guest users to use FinTech Company X's VPN before accessing the internet
  • D. Guest Wi-Fi needs no security controls since guests are not accessing corporate data
Correct Answer: B — VLAN isolation + internet-only + captive portal + bandwidth throttling

Guest Wi-Fi security requirements: (1) VLAN isolation — guest VLAN must be completely isolated from corporate VLANs; firewall rules prevent guest→corporate traffic; (2) Internet-only access — guests can reach the internet but not internal servers, databases, or printers; (3) Captive portal — collects acceptable use agreement, may require email/phone verification for basic identity; (4) Bandwidth throttling — prevents guests from consuming all available bandwidth; (5) Client isolation — prevents guests from attacking other guest devices; (6) DNS filtering — block malicious sites. Using the same network (A) completely negates VLAN security. Guest VPN (C) is unreasonable for visitors. No controls (D) ignores the risk of guest devices being used for attacks through the corporate internet connection.

CISSP Mindset: Guest Wi-Fi = separate VLAN + internet-only + client isolation. The guest network must be treated as untrusted — equivalent to internet exposure to the corporate network.

65
WPA3 Transition Mode Hard

FinTech Company X is migrating from WPA2 to WPA3 but has legacy devices that only support WPA2. What is the security risk of using "WPA2/WPA3 Transition Mode" during migration?

  • A. Transition mode disables all encryption temporarily during the migration period
  • B. Transition mode allows both WPA2 and WPA3 clients on the same SSID; an attacker can force WPA3 clients to downgrade to WPA2 using a rogue AP, reducing security to WPA2 levels
  • C. WPA3 transition mode requires replacing all network hardware immediately
  • D. Transition mode provides stronger security than pure WPA3 by supporting more protocols
Correct Answer: B — Transition mode enables WPA2 downgrade attack by rogue AP

WPA3 Transition Mode (also called Mixed Mode): Allows WPA2 and WPA3 clients on the same SSID. The AP advertises support for both. Security risk: An attacker can set up a rogue AP supporting only WPA2 with the same SSID. WPA3 clients that are in transition mode may associate with the rogue WPA2 AP, reducing their security to WPA2 levels — vulnerable to offline dictionary attacks (WPA2-PSK) or RADIUS credential attacks (WPA2-Enterprise). Mitigation: (1) Use separate SSIDs for WPA2 legacy and WPA3 clients during transition; (2) Accelerate legacy device replacement to shorten the transition window; (3) Enable PMF mandatory on the WPA3 SSID; (4) Monitor for rogue APs. Pure WPA3-only mode eliminates this risk but breaks legacy device connectivity.

CISSP Mindset: Transition modes always introduce downgrade risk. Separate SSIDs during migration > mixed mode. The migration period is a security-sensitive window requiring close monitoring.

31
IPSec AH vs ESP Medium

FinTech Company X's network team is configuring IPSec for the site-to-site VPN connecting to Bank A. A key requirement is that the traffic MUST be both encrypted (confidential) AND authenticated (integrity). Which IPSec protocol satisfies BOTH requirements?

  • A. AH (Authentication Header) — provides both encryption and authentication
  • B. ESP (Encapsulating Security Payload) — provides both encryption and authentication
  • C. AH alone — provides encryption; ESP alone — provides authentication
  • D. IKE (Internet Key Exchange) — provides encryption and authentication directly
Correct Answer: B — ESP provides both encryption and authentication

IPSec has two security protocols: (1) AH (Authentication Header) — provides integrity and authentication ONLY, NO encryption. It authenticates the entire packet including the IP header. AH is incompatible with NAT because NAT changes the IP header which breaks AH integrity checks; (2) ESP (Encapsulating Security Payload) — provides confidentiality (encryption), integrity, and authentication. ESP does NOT authenticate the outer IP header in tunnel mode. For the Bank A VPN requiring both encryption AND authentication, ESP is the correct choice. AH alone provides NO confidentiality.

CISSP Mindset: AH = Authentication only (no encryption). ESP = Encryption + Authentication. When you need both confidentiality and integrity, use ESP. AH + NAT = incompatible.

32
IPSec Tunnel vs Transport Medium

FinTech Company X uses IPSec to encrypt traffic between its headquarters and Bank A's data center (site-to-site VPN). Which IPSec mode is MOST appropriate for this use case and why?

  • A. Transport mode — encrypts only the payload; best for host-to-host encryption between two specific servers
  • B. Tunnel mode — encrypts the entire original IP packet including the header; best for gateway-to-gateway (site-to-site) VPNs
  • C. Transport mode — encrypts the entire packet including headers; best for site-to-site VPNs
  • D. Tunnel mode — encrypts only the payload; appropriate when the original IP header does not need protection
Correct Answer: B — Tunnel mode for site-to-site (gateway-to-gateway) VPN

IPSec modes: (1) Tunnel mode — the entire original IP packet (header + payload) is encrypted and encapsulated in a NEW IP packet with new gateway IP headers. This hides internal network addressing. Used for: site-to-site VPNs, remote access VPNs where VPN gateway proxies for internal hosts. (2) Transport mode — only the payload is encrypted; the original IP headers are preserved. Used for: direct host-to-host communication (e.g., between two specific servers that both run IPSec). For FinTech Company X↔Bank A site-to-site VPN, tunnel mode is correct because traffic from many internal hosts traverses the gateway.

CISSP Mindset: Tunnel mode = gateway-to-gateway = encrypts everything including original IP header. Transport mode = host-to-host = encrypts payload only. Site-to-site = tunnel mode always.

33
IPSec AH vs ESP NAT Hard

The Bank A VPN gateway must traverse a NAT device between FinTech Company X and Bank A. The security team initially configured AH for packet integrity. After deployment, the VPN fails to establish. What is the MOST LIKELY cause?

  • A. AH is not supported on the VPN gateway hardware
  • B. AH authenticates the entire IP packet including the source IP header; NAT changes the source IP, invalidating the AH integrity check
  • C. AH requires a digital certificate; a pre-shared key was used instead
  • D. AH only works in transport mode, not tunnel mode
Correct Answer: B — NAT changes source IP, breaking AH integrity

AH (Authentication Header) protects the integrity of the ENTIRE IP packet, including the IP header fields like source and destination IP. When a NAT device translates the source IP address, the IP header changes — this invalidates the AH integrity check because the receiving end computes the hash over the packet and finds it does not match the AH value. Solution: Use ESP instead of AH (ESP does not protect the outer IP header in tunnel mode), or use NAT-Traversal (NAT-T) which encapsulates IPSec packets in UDP port 4500 to traverse NAT. This is a classic IPSec/NAT incompatibility issue.

CISSP Mindset: AH + NAT = broken. AH signs the IP header; NAT modifies it. Use ESP or NAT-T when NAT is in the path. This is a common exam trap.

34
TLS 1.3 PFS Hard

FinTech Company X's security policy mandates that ALL TLS connections between Platform C microservices must provide Perfect Forward Secrecy (PFS). Which TLS version and key exchange combination GUARANTEES PFS?

  • A. TLS 1.2 with RSA key exchange
  • B. TLS 1.2 with DHE or ECDHE cipher suites (optional PFS)
  • C. TLS 1.3 — PFS is mandatory because only ECDHE key exchange is supported
  • D. TLS 1.0 with any cipher suite
Correct Answer: C — TLS 1.3 mandates PFS via ECDHE only

PFS (Perfect Forward Secrecy) ensures that compromise of the long-term private key does not compromise past session keys. TLS version differences: (1) TLS 1.0/1.1: Deprecated; vulnerable to BEAST, POODLE; RSA key exchange (no PFS) is common; (2) TLS 1.2: PFS is OPTIONAL — cipher suites with RSA key exchange (no PFS) are still supported alongside DHE/ECDHE (PFS); (3) TLS 1.3: PFS is MANDATORY — RSA key exchange is completely removed; only ECDHE (and DHE) are supported. For FinTech Company X's Platform C microservices, TLS 1.3 guarantees PFS without configuration risk.

CISSP Mindset: TLS 1.3 = PFS mandatory (RSA key exchange removed). TLS 1.2 = PFS optional (depends on cipher suite). If policy requires PFS, TLS 1.3 is the only guaranteed answer.

35
mTLS FinTech Company X Hard

FinTech Company X's Platform C platform uses mTLS (mutual TLS) between its microservices. How does mTLS differ from standard TLS, and why is it important for microservice security?

  • A. mTLS uses a different encryption algorithm than TLS; it is stronger
  • B. In standard TLS, only the server presents a certificate; in mTLS, BOTH client and server present certificates, enabling mutual authentication
  • C. mTLS is only available in TLS 1.3; standard TLS works with TLS 1.2
  • D. mTLS encrypts data twice for additional security compared to single TLS
Correct Answer: B — mTLS requires BOTH parties to present certificates

Standard TLS: Server presents a certificate to prove its identity to the client. The client is not authenticated by certificate (may use username/password instead). mTLS (mutual TLS): BOTH parties present X.509 certificates. The server verifies the client certificate, and the client verifies the server certificate. For FinTech Company X's Platform C microservices, mTLS ensures that only authorized microservices with valid certificates can communicate — preventing rogue services or lateral movement by attackers who have compromised network access. This is the zero-trust network principle: "never trust, always verify" regardless of network location.

CISSP Mindset: mTLS = zero-trust for services. Both sides prove identity. Standard TLS = server-only authentication. mTLS prevents unauthorized service-to-service calls.

36
HSTS SSL Stripping Medium

An attacker intercepts HTTP traffic from a user before it reaches FinTech Company X's Platform C portal and prevents the HTTPS redirect, keeping the session unencrypted. What is this attack called and what is the PRIMARY technical control that defeats it?

  • A. SSL stripping; defeated by HSTS (HTTP Strict Transport Security)
  • B. TLS downgrade; defeated by disabling TLS 1.0 on the server
  • C. Certificate pinning bypass; defeated by CAA DNS records
  • D. Session fixation; defeated by regenerating session IDs after login
Correct Answer: A — SSL stripping; defeated by HSTS

SSL stripping (invented by Moxie Marlinspike): The attacker positions themselves between the user and the server. When the user requests http://, the attacker maintains an HTTPS connection to the server but downgrades the user's connection to HTTP. The user sees no lock icon but may not notice. HSTS (HTTP Strict Transport Security): The server sends the header "Strict-Transport-Security: max-age=31536000; includeSubDomains" telling browsers to ALWAYS use HTTPS for this domain for the specified period — stored in the browser. The browser will refuse HTTP connections to HSTS-enabled sites, defeating SSL stripping. HSTS preloading adds the domain to browser-built-in lists.

CISSP Mindset: SSL stripping = MITM downgrade to HTTP. HSTS = browser policy preventing HTTP. HSTS must be delivered over HTTPS first — the first visit is still vulnerable (TOFU problem), solved by HSTS preloading.

37
Split Tunneling VPN Medium

FinTech Company X allows employees to use VPN for remote access. The security team is debating whether to enable or disable split tunneling. What is the PRIMARY security risk of enabling split tunneling?

  • A. Split tunneling increases VPN server load unnecessarily
  • B. With split tunneling, non-corporate traffic does not go through the VPN; a compromised employee device can be used as a bridge from the internet to the corporate network
  • C. Split tunneling prevents employees from accessing the internet while on VPN
  • D. Split tunneling violates IPSEC tunnel mode requirements
Correct Answer: B — Compromised device bridges internet to corporate network

Split tunneling sends only corporate-bound traffic through the VPN; internet traffic (YouTube, banking, etc.) goes directly to the internet without VPN. Security risk: If the employee's device is compromised by malware, the attacker has a foothold on a device with simultaneous access to both the internet (for C2 communication) and the corporate network (through the active VPN tunnel). This creates a bridge. Without split tunneling (full tunnel), all traffic goes through the corporate VPN where security controls (proxy, NGFW, DLP) can inspect it. Trade-off: Full tunnel increases corporate bandwidth usage and latency.

CISSP Mindset: Split tunneling = operational convenience vs. security risk. A compromised endpoint with split tunneling = attacker has a pivot point into the corporate network. Disable split tunneling when security is paramount.

38
TLS 1.2 vs 1.3 Hard

FinTech Company X's compliance team asks: "Why does TLS 1.3 provide better security than TLS 1.2 for Platform C's external API?" Which answer BEST explains the key improvements?

  • A. TLS 1.3 uses a longer key length (4096-bit) by default compared to TLS 1.2's 2048-bit
  • B. TLS 1.3 removes weak cipher suites (RC4, 3DES, export ciphers), mandates PFS via ECDHE, reduces handshake latency to 1-RTT, and supports 0-RTT resumption
  • C. TLS 1.3 is faster but provides weaker encryption than TLS 1.2
  • D. TLS 1.3 replaces certificates with pre-shared tokens for authentication
Correct Answer: B — TLS 1.3 removes weak ciphers, mandates PFS, reduces latency

TLS 1.3 key improvements over TLS 1.2: (1) Removes weak/broken cipher suites: RC4, 3DES, MD5, SHA-1, export-grade ciphers, RSA key exchange all removed; (2) Mandates PFS: Only ECDHE (and DHE) key exchange — static RSA removed; (3) Improved handshake: 1-RTT (vs. 2-RTT in TLS 1.2) reduces connection latency; (4) 0-RTT session resumption for returning clients (with replay attack risk if not handled carefully); (5) Encrypted handshake: More of the handshake is encrypted vs. TLS 1.2. Key length (e.g., 2048 vs 4096) is a separate configuration from TLS version and not the defining difference.

CISSP Mindset: TLS 1.3 = cleaner, faster, more secure. The key exam points: removed RSA key exchange (PFS mandatory), removed weak ciphers, 1-RTT handshake. Know these for the exam.

39
Partner D HMAC FinTech Company X Hard

FinTech Company X's Partner D (Platform C for Business) platform uses HMAC-based API authentication for B2B partners. A partner claims their request was rejected due to authentication failure despite having the correct API key. Which scenario would MOST LIKELY cause this?

  • A. The partner's API key has expired and was automatically rotated
  • B. The HMAC signature is computed using a timestamp; the partner's server clock is skewed more than the allowed tolerance window (e.g., 5 minutes), causing the signature to be rejected as a replay protection measure
  • C. The partner used HTTPS instead of HTTP, causing header corruption
  • D. HMAC only supports GET requests, not POST requests
Correct Answer: B — Clock skew exceeding the tolerance window

HMAC-based API authentication typically includes a timestamp in the signed message to prevent replay attacks (an attacker capturing a valid request cannot replay it after the time window expires). If the partner server's clock is skewed beyond the tolerance window (commonly 5 minutes), the signature will be rejected even if the HMAC key is correct — because the timestamp makes the signature appear too old or from the future. Solution: Ensure NTP synchronization on both client and server. This is a common operational issue for HMAC-based B2B APIs like FinTech Company X's Partner D integrations.

CISSP Mindset: HMAC with timestamp = replay protection. Clock skew = HMAC failure. NTP synchronization is a security dependency for timestamp-based authentication. Know the operational implications.

40
VPN Types IPSec vs SSL Medium

FinTech Company X must choose between an IPSec VPN and an SSL/TLS VPN for remote employee access. Which statement BEST represents the operational security trade-off?

  • A. IPSec VPN works at Layer 3 and requires a client application; SSL VPN works at Layer 7 and can use a browser, making it more accessible through firewalls and NAT
  • B. SSL VPN provides stronger encryption than IPSec VPN
  • C. IPSec VPN is always preferred because SSL has known vulnerabilities
  • D. SSL VPN does not require authentication; IPSec VPN requires certificates
Correct Answer: A — IPSec = Layer 3 client required; SSL VPN = Layer 7 browser-accessible

Trade-offs: IPSec VPN: (1) Layer 3 — encrypts all IP traffic (not just web); (2) Requires a VPN client installed on the device; (3) Full network access (all protocols); (4) Compatible with NAT-Traversal (NAT-T); (5) Better for site-to-site or full corporate access. SSL/TLS VPN (clientless): (1) Layer 7 — can run in a browser; (2) Works easily through firewalls (port 443 is usually open); (3) Often provides application-specific access (not full network); (4) Better for remote/BYOD access when installing clients is impractical. Both can be equally secure when properly configured.

CISSP Mindset: IPSec = full network Layer 3 tunnel. SSL VPN = Layer 7 browser-accessible. The "best" choice depends on the use case: IPSec for site-to-site; SSL VPN for flexible remote access.

Q81–Q100 Network Attacks & Mitigations

81
SYN Flood SYN Cookies Medium

FinTech Company X's Partner C API server is experiencing a SYN flood attack. How do SYN cookies mitigate this attack without storing half-open connections?

  • A. SYN cookies block all SYN packets from untrusted IP addresses using a blocklist
  • B. SYN cookies encode connection state cryptographically into the server's SYN-ACK sequence number — the server does not allocate memory for the connection until a valid ACK is received, eliminating half-open connection table exhaustion
  • C. SYN cookies require the client to solve a CAPTCHA before completing the handshake
  • D. SYN cookies encrypt SYN packets to prevent IP spoofing
Correct Answer: B — SYN cookies encode state in sequence number; allocate resources only after valid ACK

SYN flood exploits TCP's half-open connection state: the server allocates memory for each SYN but spoofed SYNs never complete — exhausting the connection table. SYN cookies: (1) When SYN is received, the server encodes a cryptographic hash of (client IP, client port, server IP, server port, timestamp, secret) into the ISN of the SYN-ACK — no memory allocated yet; (2) If the client is legitimate, it returns a valid ACK; (3) Server verifies the ACK by recomputing the hash — if valid, THEN allocates a connection entry; (4) Spoofed SYNs never generate valid ACKs — no memory consumed. CloudFlare uses SYN cookies for Partner C traffic protection at the edge.

CISSP Mindset: SYN cookies = stateless SYN-ACK. Memory allocated ONLY after valid ACK. The connection table cannot be exhausted by spoofed SYNs.

82
ARP Poisoning DAI Medium

An attacker inside FinTech Company X's office network sends gratuitous ARP replies to associate the default gateway's IP with their own MAC address. What switch-level control DIRECTLY prevents this?

  • A. Enable port security limiting one MAC per port
  • B. Dynamic ARP Inspection (DAI) — validates ARP packets against the DHCP snooping binding table; drops unauthorized ARP replies that claim incorrect IP-to-MAC mappings
  • C. Enable DNSSEC on internal DNS
  • D. Use static ARP entries on all end hosts
Correct Answer: B — Dynamic ARP Inspection (DAI)

ARP has no authentication — any device can claim any IP-to-MAC mapping. DAI: (1) Works with DHCP snooping — maintains a binding table {IP, MAC, VLAN, switch port}; (2) Intercepts all ARP packets on untrusted switch ports; (3) Validates: does the ARP sender IP+MAC match the binding table? (4) Invalid ARP replies are dropped at the switch. Port security (A) limits MAC count per port but does not validate IP-to-MAC bindings. Static ARP (D) is operationally impractical at scale. DAI + DHCP snooping + IP Source Guard provides defense in depth against Layer 2 attacks. Enable DAI on all untrusted ports; trunk/uplink ports are trusted.

CISSP Mindset: ARP poisoning = Layer 2 MITM. DAI = Layer 2 control. Must be paired with DHCP snooping (provides the binding table). Enable on all access ports.

83
VLAN Hopping DTP Medium

An attacker exploits 802.1Q double-encapsulation to send frames into a restricted VLAN at FinTech Company X. Which switch hardening steps BEST prevent VLAN hopping?

  • A. Use VLAN 1 as the native VLAN on all trunk ports (simplifies management)
  • B. Disable DTP on all access ports; assign the native VLAN to an unused VLAN ID (not VLAN 1); explicitly configure trunk/access mode rather than allowing auto-negotiation
  • C. Enable DHCP snooping on all VLANs
  • D. Use MAC address filtering to restrict which devices can send 802.1Q frames
Correct Answer: B — Disable DTP; change native VLAN; explicit trunk/access mode

VLAN hopping via double-encapsulation: An attacker tags a frame with two 802.1Q headers. The switch strips the outer tag (native VLAN) and forwards the inner-tagged frame to the target VLAN. This only works when the attacker is on a port in the native VLAN. Mitigations: (1) Change native VLAN to an unused VLAN ID (not VLAN 1, not any user VLAN) — double-tagged frames for VLAN X only work from the native VLAN; (2) Disable DTP (Dynamic Trunking Protocol) on access ports — prevents negotiated trunk links from attacker ports; (3) Explicitly set all ports to access or trunk mode — never "auto" or "desirable"; (4) Prune allowed VLANs on trunk ports to only necessary VLANs. VLAN hopping via switch spoofing (DTP) is a separate sub-technique requiring DTP disablement.

CISSP Mindset: VLAN hopping = two sub-techniques: double-tagging (fix: change native VLAN) + switch spoofing via DTP (fix: disable DTP). Both require Layer 2 switch hardening.

84
DDoS Mitigation FinTech Company X Medium

FinTech Company X's Platform C platform experiences a volumetric DDoS attack generating 500 Gbps of traffic targeting its internet uplink. The origin server's 10 Gbps link is overwhelmed. Which mitigation strategy is MOST effective for volumetric attacks at this scale?

  • A. Deploy an IPS appliance in front of the Platform C servers
  • B. Use a cloud-based DDoS scrubbing service (e.g., CloudFlare) with anycast network absorption — attack traffic is distributed and mitigated at the edge before reaching origin servers
  • C. Increase the Platform C server's internet link to 100 Gbps to absorb the traffic
  • D. Block all traffic from specific countries using geofencing
Correct Answer: B — Cloud DDoS scrubbing with anycast network absorption

Volumetric DDoS at 500 Gbps overwhelms any on-premises hardware. The only effective mitigation is upstream absorption: (1) Cloud DDoS scrubbing (CloudFlare, Akamai, AWS Shield Advanced): Traffic is routed through the CDN's anycast network; the CDN's aggregate capacity (100+ Tbps in CloudFlare's case) absorbs the attack; scrubbing removes attack traffic and forwards only clean traffic to origin; (2) Anycast routing: The DDoS traffic is distributed across hundreds of PoPs globally — no single PoP is overwhelmed. FinTech Company X uses CloudFlare for Partner C, providing this protection. An IPS (A) cannot handle volumetric traffic overwhelming the uplink — it's inline and would be overwhelmed too. Upgrading the link (C) is never fast enough for DDoS. Geofencing (D) does not stop DDoS from within unblocked geographies.

CISSP Mindset: Volumetric DDoS = upstream absorption. On-premises controls fail when the uplink is saturated. Cloud scrubbing + anycast is the only viable defense at scale.

85
BGP Hijacking RPKI Hard

FinTech Company X learns that a BGP hijacking incident diverted traffic destined for its API endpoints through a foreign AS. Which long-term control BEST prevents BGP origin hijacking?

  • A. Use IPSec to encrypt all BGP sessions between FinTech Company X and its ISP
  • B. Implement RPKI (Resource Public Key Infrastructure) — cryptographically binds IP prefixes to their authorized ASNs using Route Origin Authorizations (ROAs); routers reject BGP announcements from unauthorized ASNs
  • C. Deploy DNSSEC to prevent DNS-based traffic redirection
  • D. Use private AS numbers to prevent BGP advertisements from being visible
Correct Answer: B — RPKI with Route Origin Authorizations (ROAs)

BGP hijacking: A rogue AS announces a more specific or equal-length prefix for FinTech Company X's IP space — BGP's best-path selection diverts traffic to the rogue AS. RPKI (Resource Public Key Infrastructure): (1) The IP prefix owner creates a ROA (Route Origin Authorization) — a signed certificate stating "AS XXXXX is authorized to originate prefix a.b.c.d/24"; (2) Routers with RPKI validation reject BGP announcements from ASNs not listed in the ROA; (3) ROAs are published in a globally distributed RPKI repository; (4) This provides cryptographic proof of prefix ownership. BGP-SEC (path validation) extends RPKI to validate the full AS path. IPSec on BGP sessions (A) prevents BGP session tampering but not prefix hijacking from rogue ASes. DNSSEC (C) protects DNS records, not BGP routing.

CISSP Mindset: BGP hijacking = routing layer threat. RPKI = cryptographic solution for BGP route origin validation. RPKI ROAs bind prefixes to ASNs. Without RPKI, any AS can announce any prefix.

86
SSL Stripping HSTS FinTech Company X Medium

A FinTech Company X employee uses a coffee shop Wi-Fi to access the Platform C portal. An attacker performs SSL stripping, maintaining HTTPS with Platform C's servers but serving HTTP to the employee. The employee's browser shows no padlock. What would have PREVENTED the employee's connection from being stripped to HTTP?

  • A. Platform C server's TLS certificate being signed by a trusted CA
  • B. HSTS (HTTP Strict Transport Security) with preloading — the browser refuses to connect to the Platform C domain via HTTP regardless of what an intermediary attempts
  • C. Using TLS 1.3 instead of TLS 1.2 on the server
  • D. The employee using a corporate laptop instead of a personal device
Correct Answer: B — HSTS with preloading prevents HTTP connections

SSL stripping: The attacker is a MITM at the network layer (coffee shop Wi-Fi). The attacker communicates with Platform C via HTTPS but serves HTTP to the employee — the employee never receives an HTTPS redirect. Certificate trust (A) is irrelevant because the attacker never presents a certificate to the employee — the employee never triggers a TLS handshake. TLS 1.3 (C) doesn't help if the connection is downgraded to HTTP before TLS starts. HSTS solution: The browser has stored (from a previous HTTPS visit) or preloaded the HSTS policy for aula.company-x.com. When the attacker serves HTTP, the browser checks its HSTS store — finding the policy, it REFUSES to proceed over HTTP and generates an error. The employee cannot be tricked into accepting the HTTP connection.

CISSP Mindset: SSL stripping defeats HTTPS redirects. HSTS defeats SSL stripping. HSTS preloading defeats it for first-time visitors too. This is the definitive MITM prevention for web protocols.

87
Man-in-the-Middle mTLS FinTech Company X Hard

An attacker on FinTech Company X's internal network attempts a MITM attack between the Platform C loan scoring service and the credit bureau service. Both services use mTLS. Why does mTLS SPECIFICALLY defeat this MITM attempt?

  • A. mTLS uses a longer encryption key than standard TLS, making MITM computationally infeasible
  • B. The attacker cannot forge a valid client certificate — the credit bureau service rejects any connection whose client certificate is not signed by the trusted internal CA; the attacker has no access to the Platform C service's private key
  • C. mTLS encrypts traffic with a different algorithm that MITM tools cannot decrypt
  • D. mTLS uses UDP instead of TCP, which prevents session interception
Correct Answer: B — Attacker cannot forge valid client certificate without the private key

Standard TLS MITM: An attacker with a fraudulent (but CA-signed) certificate can impersonate the server. mTLS MITM: The attacker must also impersonate the CLIENT to the server. To do so, they need the Platform C service's client certificate AND private key. The private key never leaves the Platform C service's secure key store. Without the private key, the attacker cannot complete the mTLS handshake with the credit bureau service. The attack fails because: (1) Platform C → Attacker: Attacker cannot present Platform C's client certificate (no private key); (2) Even if the attacker positions themselves in the middle, they cannot authenticate as Platform C to the credit bureau. mTLS zero-trust principle: both sides must authenticate — compromising network position alone is insufficient.

CISSP Mindset: mTLS defeats MITM because the attacker cannot forge the client identity. The private key never leaves the service. This is the zero-trust architecture principle in action.

88
Smurf Attack ICMP Medium

A Smurf attack sends ICMP echo requests with a spoofed source IP (FinTech Company X's IP) to a broadcast address. All hosts on the amplifier network reply to FinTech Company X, flooding it. Which mitigation at the amplifier network level prevents Smurf amplification?

  • A. Enable SYN cookies on FinTech Company X's servers
  • B. Disable directed broadcast on routers — prevents ICMP broadcast requests from being forwarded as a broadcast to all hosts on a subnet
  • C. Deploy IPS at FinTech Company X's border to block ICMP
  • D. Enable DNSSEC to prevent IP spoofing
Correct Answer: B — Disable directed broadcast on routers

Smurf attack mechanism: Attacker sends ICMP echo-request to a subnet's directed broadcast address (e.g., 192.168.1.255) with spoofed source IP = victim IP. Every host on that subnet sends an ICMP echo-reply to the victim. Amplification factor = number of hosts on the subnet. Mitigation at amplifier networks: Disable IP directed broadcast on all router interfaces (Cisco: "no ip directed-broadcast"). This is now the default on modern routers (RFC 2644) but older routers may still have it enabled. Additional mitigation: BCP38 ingress filtering at ISPs prevents IP spoofing from originating. Smurf is largely a historical threat due to RFC 2644 adoption, but relevant for legacy network assessments.

CISSP Mindset: Smurf = ICMP amplification via directed broadcast. Fix at amplifier: disable directed broadcast. Fix at origin: BCP38 ingress filtering. Fix at victim: CloudFlare/scrubbing.

89
Network Reconnaissance Port Scanning Medium

During a penetration test of FinTech Company X, the assessor performs a SYN scan (half-open scan) against the Platform C server. Why is a SYN scan more stealthy than a full TCP connect scan?

  • A. SYN scans are encrypted and cannot be detected by IDS
  • B. A SYN scan sends only the initial SYN; if the port is open, the server responds with SYN-ACK; the scanner sends RST instead of ACK, never completing the three-way handshake — no full connection is logged by many application servers
  • C. SYN scans operate at Layer 2 and bypass IP-based firewall rules
  • D. SYN scans are identical to connect scans; there is no stealth difference
Correct Answer: B — SYN scan doesn't complete handshake; RST after SYN-ACK = no connection logged

TCP connect scan: Completes the full three-way handshake (SYN → SYN-ACK → ACK → data → FIN). The connection appears in application logs as a completed connection. Requires no special privileges. SYN scan (half-open): Sends SYN. If SYN-ACK received (port open): sends RST immediately — never completes the handshake. The application server typically only logs fully established connections — the RST prevents the connection from being recorded in many application logs (though IDS and firewall logs will still capture SYN packets). Requires raw socket privileges (root/admin). Stealth benefit: reduced connection log artifacts. Modern IDS systems (Snort, Suricata) detect SYN scans via rate analysis, so "stealthy" is relative. FinTech Company X's NGFW and IPS should detect SYN scan patterns.

CISSP Mindset: SYN scan = half-open = stealthier than full connect but still detectable by network IDS. Rate-based detection catches SYN scans. Application-layer stealth ≠ network-layer stealth.

90
Fragmentation Attack Hard

An attacker sends fragmented IP packets to FinTech Company X's Platform C server such that the fragments reassemble into a malicious payload that bypasses stateless packet filtering rules. What type of attack is this and what control defeats it?

  • A. IP fragmentation attack; defeated by a stateful firewall or NGFW that reassembles fragments before applying security rules
  • B. ARP poisoning; defeated by Dynamic ARP Inspection
  • C. TCP session hijacking; defeated by sequence number randomization
  • D. DNS amplification; defeated by disabling open resolvers
Correct Answer: A — IP fragmentation attack; defeated by stateful firewall reassembling fragments

IP fragmentation attacks: Large IP packets can be split into fragments (each fragment is a separate IP packet with an offset). Stateless firewalls inspect each fragment independently — a firewall rule blocking port 80 may pass a payload split across fragments that reassemble to port 80 content. Teardrop attack: Overlapping fragments with incorrect offsets crash fragmentation reassembly. Stateful firewalls and NGFW: Reassemble all fragments before applying security rules — the complete, reassembled packet is inspected. This defeats fragmentation-based evasion. Additional controls: rate-limit or block IP fragments on internet-facing interfaces (most legitimate traffic should not be fragmented with proper MTU settings). MTU Path Discovery should be enabled to prevent fragmentation at the network layer.

CISSP Mindset: Fragmentation attacks exploit stateless inspection. Stateful firewall reassembles before inspecting = defeats fragmentation evasion. This is a key difference between stateless and stateful firewalls.

91
CloudFlare WAF FinTech Company X Medium

FinTech Company X's CloudFlare WAF is blocking a legitimate partner API request from Bank A, generating a false positive. What is the BEST operational approach to resolve this while maintaining security?

  • A. Disable the WAF rule that caused the false positive globally for all traffic
  • B. Create a WAF exception scoped to Bank A's specific source IPs and the specific API endpoint, while keeping the rule active for all other traffic; document and review the exception periodically
  • C. Move Bank A's API integration to HTTP (unencrypted) to avoid WAF inspection
  • D. Whitelist all traffic — false positives indicate the WAF rules are too strict
Correct Answer: B — Scoped WAF exception for Bank A IPs + endpoint; keep rule active elsewhere

WAF false positive management — operational security balance: (1) Disabling the rule globally (A) removes protection for all traffic — fixes one false positive but creates a vulnerability for all other requests; (2) Scoped exception (B): Whitelist only Bank A's known source IP ranges for the specific API path — the rule remains active for all other sources and paths. Review the exception periodically to ensure Bank A's IPs haven't changed; (3) Moving to HTTP (C) is unacceptable — removes all encryption and WAF inspection; (4) Global whitelist (D) defeats the purpose of having a WAF. Exception management best practice: document the business justification, scope minimally (specific IPs + specific paths), set expiry or review dates, alert if the excepted IP range changes.

CISSP Mindset: WAF false positives = tune exceptions with minimum scope, not disable rules globally. Security vs. availability requires surgical precision, not blunt workarounds.

92
Session Fixation Web Security Hard

An attacker sends a FinTech Company X employee a link to the Platform C portal that pre-sets a known session ID. If the employee logs in using that link, what attack has succeeded and what is the mitigation?

  • A. Cross-site scripting (XSS); mitigation is output encoding
  • B. Session fixation; mitigation is regenerating a new, random session ID immediately upon successful authentication — invalidating any pre-authentication session
  • C. Cross-site request forgery (CSRF); mitigation is CSRF tokens
  • D. SQL injection; mitigation is parameterized queries
Correct Answer: B — Session fixation; mitigation is session ID regeneration after login

Session fixation: The attacker establishes a session with the target site (e.g., gets a session ID: ABC123), then tricks the victim into authenticating using that pre-set session ID (via a crafted URL or cookie). After authentication, the session ABC123 is now an authenticated session — the attacker, who already knows ABC123, has a valid authenticated session without knowing credentials. Mitigation: After successful authentication, the server MUST generate a NEW session ID and invalidate the old one. The attacker's known ABC123 is discarded; the new session ID (unknown to the attacker) is assigned. This is required in OWASP Top 10 session management guidelines and relevant to FinTech Company X's Platform C loan application portal security.

CISSP Mindset: Session fixation = attacker controls pre-auth session ID. Mitigation = regenerate session ID at authentication. Non-regeneration = fixation vulnerability. This is an Platform C webapp security requirement.

93
Replay Attack Partner D API FinTech Company X Hard

A threat actor captures a valid API request from a Bank A partner to FinTech Company X's Partner D platform and replays it 100 times, each time submitting the same loan data. What mechanisms BEST prevent replay attacks on the Partner D HMAC API?

  • A. Encrypt the API requests with TLS — replay attacks are prevented by TLS
  • B. Include a timestamp and a unique nonce in the HMAC signature; the server rejects requests with timestamps outside a 5-minute window or with nonces already seen in its nonce cache
  • C. Require the client to refresh their API key before each request
  • D. Use HTTP instead of HTTPS to avoid HMAC overhead
Correct Answer: B — Timestamp + nonce in HMAC; server rejects expired or reused nonces

TLS (A) protects requests in transit but does not prevent replay of a captured legitimate request that was valid over TLS. Replay attacks occur when a legitimate request is captured and retransmitted. Defense: (1) Timestamp: Include the current timestamp in the HMAC message. The server rejects requests with timestamps older than N minutes (e.g., 5 minutes) — limits replay window; (2) Nonce: A unique random value included in each request and signed in the HMAC. The server stores received nonces in a cache for the time window. If the same nonce appears twice within the window, the second is rejected as a replay. Together: timestamp limits the window; nonce prevents ANY replay within that window. This is FinTech Company X Partner D's B2B API security pattern. The nonce cache must be distributed/shared if Partner D runs multiple instances.

CISSP Mindset: Replay prevention = timestamp (limits window) + nonce (prevents any replay within window). TLS alone does not prevent replays of captured legitimate requests. Both mechanisms are needed.

94
IP Spoofing BCP38 Hard

FinTech Company X's internet traffic shows a high volume of packets with source IPs from RFC 1918 private address space (10.x.x.x, 192.168.x.x) arriving from the internet. What does this indicate and what is the correct mitigation?

  • A. Normal routing — private IPs can traverse the internet
  • B. IP spoofing — packets with private source IPs should never arrive from the internet; ingress filtering (BCP38) at FinTech Company X's perimeter should drop all inbound packets with source IPs that should not come from the internet (RFC 1918, loopback, multicast)
  • C. IPv6 transition traffic — IPv6 tunnels carry private IPv4 addresses
  • D. NAT misconfiguration — FinTech Company X's NAT is leaking internal addresses
Correct Answer: B — IP spoofing; ingress filtering drops bogon/private addresses from internet

RFC 1918 private addresses (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) are not routed on the public internet. Receiving packets from the internet with private source IPs indicates IP spoofing — someone is forging source addresses. These are typically part of DDoS attacks, reconnaissance, or amplification attacks. Ingress filtering (BCP38 / RFC 2827): Block inbound packets at the internet perimeter with source IPs that are: RFC 1918 private ranges; loopback (127.0.0.0/8); link-local (169.254.0.0/16); TEST-NET; multicast (224.0.0.0/4). Also implement egress filtering: block outbound packets with source IPs NOT belonging to FinTech Company X's allocated ranges — prevents FinTech Company X from being an unwitting spoofing source for attacks on others.

CISSP Mindset: Private IPs from internet = spoofed. BCP38 ingress filtering = drop impossible source IPs. Both ingress AND egress filtering are best practice. This is an ISP-level and enterprise-level responsibility.

95
Slowloris Application Layer DoS Hard

FinTech Company X's Platform C web server is being hit by a Slowloris attack — the attacker holds HTTP connections open by sending partial request headers slowly, exhausting the server's connection limit. What is the MOST effective mitigation?

  • A. Increase the server's maximum connection limit indefinitely
  • B. Configure the web server with connection timeout limits and minimum data-rate thresholds; use a reverse proxy or CDN (CloudFlare) that handles slow clients and maintains pooled connections to the origin
  • C. Deploy SYN cookies to handle slow HTTP connections
  • D. Enable DNSSEC to prevent attacker connections
Correct Answer: B — Timeout limits + minimum data rate + reverse proxy/CDN

Slowloris: Layer 7 DoS — attacker opens many HTTP connections and sends headers very slowly (a few bytes every ~15 seconds), preventing the server from completing the HTTP request and timing out the connection. The server holds thousands of sockets open waiting for the complete request, eventually exhausting its connection limit. Mitigations: (1) Web server timeouts: Set short timeouts for incomplete HTTP headers (Apache: RequestReadTimeout; Nginx handles this by default); (2) Minimum data rate: close connections below a minimum bytes/second threshold; (3) Reverse proxy/CDN (CloudFlare): The CDN handles slow client connections and only forwards complete requests to the origin — the origin never sees slow clients; (4) Connection limiting per IP. SYN cookies (C) protect Layer 4 — Slowloris is a Layer 7 attack where the TCP connection is fully established.

CISSP Mindset: Slowloris = Layer 7 resource exhaustion. Timeouts + rate limits at the web server level. CDN/reverse proxy offloads slow clients from the origin. SYN cookies protect Layer 4, not Layer 7.

96
Network Segmentation FinTech Company X Medium

FinTech Company X's security architect proposes micro-segmentation for the Platform C microservices network. What is the PRIMARY security benefit of micro-segmentation over traditional perimeter-only security?

  • A. Micro-segmentation eliminates the need for firewalls at the perimeter
  • B. Micro-segmentation restricts lateral movement — if one microservice is compromised, an attacker cannot freely access other microservices; each service-to-service communication is explicitly authorized, minimizing blast radius
  • C. Micro-segmentation improves network performance by reducing broadcast domains
  • D. Micro-segmentation provides full encryption for all internal communications automatically
Correct Answer: B — Micro-segmentation restricts lateral movement and minimizes blast radius

Traditional perimeter security: "Hard outside, soft inside" — once an attacker breaches the perimeter, they can often move freely between internal systems. Micro-segmentation: (1) Applies zero-trust principles inside the network — "never trust, always verify" even for east-west internal traffic; (2) Granular firewall policies between individual workloads/microservices; (3) Limits lateral movement — a compromised Platform C loan scoring service cannot communicate with the payment service unless explicitly permitted; (4) Implemented via software-defined networking (SDN), service mesh (Istio), or host-based firewalls. Combining mTLS (for authentication) with micro-segmentation (for network access control) creates a layered defense that FinTech Company X's Platform C microservices benefit from. This is the foundation of zero-trust network architecture (ZTNA).

CISSP Mindset: Micro-segmentation = zero-trust internal networking. Perimeter is just the first line; micro-segmentation limits damage when the perimeter is breached. Lateral movement containment = resilience.

97
Ping of Death Teardrop Medium

Which of the following BEST describes the difference between a Ping of Death attack and a Teardrop attack, and are modern systems still vulnerable to them?

  • A. Ping of Death: oversize ICMP packet causes buffer overflow on reassembly; Teardrop: overlapping/malformed fragment offsets crash reassembly logic; modern OS patches fix both — largely historical attacks
  • B. Ping of Death and Teardrop are identical attacks with different names
  • C. Ping of Death targets TCP; Teardrop targets UDP
  • D. Both attacks are still highly effective against all modern operating systems
Correct Answer: A — Different fragmentation attacks; modern OS patches have fixed both

Ping of Death: Sends ICMP echo-request packets exceeding the 65,535-byte maximum IP packet size. When fragments are reassembled, the oversized packet causes a buffer overflow, crashing or freezing the target. Teardrop: Sends IP fragments with overlapping fragment offsets (e.g., fragment 2 starts at byte 0 instead of byte 1481). When the OS tries to reassemble overlapping fragments, the reassembly logic crashes. Both attacks target IP fragmentation reassembly vulnerabilities in the OS kernel. Modern status: Both have been patched in modern operating systems since the late 1990s/early 2000s. They are largely historical but may still affect: (1) Unpatched legacy embedded systems; (2) IoT devices with minimal OS stacks; (3) Some network appliances with older firmware. Relevant for legacy environment assessments.

CISSP Mindset: Historical attacks (Ping of Death, Teardrop) test IP fragmentation reassembly. Patched in modern OS. Still relevant for legacy/embedded systems and IoT. Know they are "largely historical."

98
Zero Trust FinTech Company X Hard

FinTech Company X's CISO proposes moving to a Zero Trust Network Architecture (ZTNA) for Platform C microservices. Which combination of controls BEST embodies the core "never trust, always verify" principle for east-west (internal) microservice traffic?

  • A. Strong perimeter firewall + VPN for all internal access
  • B. mTLS for service-to-service authentication + micro-segmentation network policies + service mesh (e.g., Istio) with per-request authorization + continuous logging and anomaly detection
  • C. VLAN segmentation + static ACLs between VLANs
  • D. IPSec tunnel mode between all internal servers
Correct Answer: B — mTLS + micro-segmentation + service mesh authorization + continuous monitoring

Zero Trust for microservices requires multiple complementary controls: (1) mTLS — every service authenticates its peer; no service trusts another based on network location alone; (2) Micro-segmentation — network policy explicitly permits only necessary service-to-service communication paths; deny-all default with explicit allow rules; (3) Service mesh (Istio/Linkerd) — provides mTLS certificate lifecycle management, per-request authorization policies (RBAC based on service identity), observability (metrics, traces, logs); (4) Continuous monitoring — anomaly detection to catch unexpected communication patterns even within permitted paths. The traditional VPN + perimeter model (A) assumes internal network is trusted — ZTNA explicitly rejects this assumption. VLAN + ACLs (C) is coarse-grained and static; cannot verify identity. IPSec (D) provides encryption but not per-service identity verification.

CISSP Mindset: ZTNA = identity-based access regardless of network location. For microservices: mTLS (who are you?) + micro-segmentation (what can you access?) + service mesh (enforce + observe) = complete ZTNA.

99
War Driving Wireless Attacks Medium

A threat actor drives around FinTech Company X's office district collecting Wi-Fi SSID information, signal strengths, security protocols (WPA2/WPA3), and GPS coordinates. What is this activity called, and what information does it NOT reveal?

  • A. War driving; it reveals employee names and email addresses from Wi-Fi beacons
  • B. War driving; it reveals SSID, BSSID (AP MAC), security protocol, signal strength, and GPS — but it does NOT reveal network traffic content, passwords, or internal IP addressing
  • C. War chalking; it reveals the full WPA2 encryption key
  • D. Evil twin; it reveals credentials from connected employees
Correct Answer: B — War driving reveals metadata (SSID/BSSID/protocol/location) but NOT content or passwords

War driving: Driving while using a wireless adapter in monitor mode to passively collect 802.11 beacon frames. Tools: Kismet, airodump-ng. Information collected: (1) SSID (network name); (2) BSSID (AP MAC address — manufacturer identifiable); (3) Security protocol (Open, WEP, WPA2-PSK, WPA3); (4) Signal strength (RSSI); (5) GPS coordinates (mapping databases like WiGLE.net); (6) Channel. Information NOT revealed: Network traffic content, passwords, internal IP addressing, or user data (all encrypted if WPA2/WPA3 is used). Relevance: War driving reveals attack surface — Open networks are immediate targets; WEP networks are trivially attacked; WPA2-PSK networks can be attacked if handshakes are captured. FinTech Company X's war driving defense: WPA3-Enterprise + non-revealing SSID naming (not "TS-Corporate-Confidential").

CISSP Mindset: War driving = passive reconnaissance (metadata only). Strong wireless security (WPA3-Enterprise) means war driving reveals only protocol info, not content. Reduce information exposure by not revealing network purpose in SSID names.

100
Domain 4 Integration FinTech Company X Hard

FinTech Company X's CISO is presenting a holistic network security strategy to the board. Which single statement BEST captures the CISSP managerial mindset for network security at a fintech like FinTech Company X?

  • A. Deploy the most expensive security hardware available — cost is a reliable proxy for security effectiveness
  • B. Accept that 100% security is unachievable; implement layered controls (defense in depth) across all OSI layers, continuously monitor for anomalies, maintain an incident response capability, and align security investments with business risk — balancing confidentiality, integrity, availability, and operational practicality
  • C. Focus exclusively on perimeter controls — internal traffic can be trusted once the attacker is outside
  • D. Prioritize compliance checkboxes over actual security effectiveness — passing audits is the primary goal
Correct Answer: B — Defense in depth + risk-aligned investment + CIA triad balance + operational practicality

The CISSP managerial mindset synthesizes all Domain 4 concepts: (1) No single control is sufficient — defense in depth across all OSI layers (Layer 1 physical security → Layer 7 WAF/application controls); (2) Risk management: controls must be proportionate to business risk — FinTech Company X's financial data warrants strong controls; (3) CIA Triad balance: security cannot compromise availability (fintech loans need 24/7 uptime); (4) Operational practicality: mTLS + WPA3-Enterprise + CloudFlare WAF + DMARC p=reject + IPSec VPN is the operationally viable combination FinTech Company X uses; (5) Assume breach: even with all controls, have monitoring (SIEM), detection (IDS/IPS), and response (IR playbooks); (6) Compliance as a floor, not a ceiling: PCI-DSS, MAS TRM, and PDPA are minimum requirements — FinTech Company X should exceed them. This integrates all topics: OSI layers, firewalls, VPN, wireless, email security, and attack mitigations.

CISSP Mindset: The ISC2 exam always favors the managerial, risk-based, defense-in-depth answer. Security is never absolute — it is always a risk trade-off. Balance CIA with operational reality. This is the overarching principle of all 100 questions.

Quiz Complete!

You have completed all 100 Domain 4 practice questions covering OSI Model, Network Devices, VPN & TLS, Wireless Security, Email & DNS Security, and Network Attacks.