Domain 4 Quiz: Communication & Network Security
100 Câu hỏi · OSI Layer Attacks · VPN · Wireless · Email Security
100
Questions
6
Topic Areas
25+
TS Context Qs
Topic Distribution
Q1–Q15 OSI Model & Layer Attacks
A security engineer at FinTech Company X notices that an attacker is intercepting and modifying raw binary signals between a network cable and a switch port, causing intermittent connectivity issues. At which OSI layer is this attack occurring?
Layer 1 (Physical) handles raw bit transmission — electrical signals, cables, hubs, and physical connectors. An attack manipulating electrical signals or physically tapping cables targets this layer. Layer 2 handles MAC addressing; Layer 3 handles IP routing; Layer 4 handles end-to-end transport segments.
CISSP Mindset: When the attack targets physical signals/hardware (jamming, tapping, cutting cables), it is Layer 1. When it targets MAC frames, it is Layer 2.
During a penetration test of FinTech Company X's internal network, an ethical hacker broadcasts forged ARP replies to associate the gateway's IP address with their own MAC address. Which OSI layer does this attack primarily exploit?
ARP (Address Resolution Protocol) maps IP addresses to MAC addresses and operates at Layer 2 (Data Link). ARP poisoning/spoofing forges Layer 2 MAC-to-IP mappings. The attack intercepts frames before they reach Layer 3 IP processing. Dynamic ARP Inspection (DAI) on managed switches is the primary mitigation.
CISSP Mindset: ARP lives at Layer 2. MAC addresses, switches, and frames are all Layer 2 concepts. IP addresses start at Layer 3.
An attacker sends packets to FinTech Company X's Platform C platform with a forged source IP address, attempting to bypass IP-based access control lists. Which OSI layer is the primary target of this attack?
IP addresses exist at Layer 3 (Network). IP spoofing forges the source IP field in the IP header — a Layer 3 construct. Access Control Lists (ACLs) on routers operate at Layer 3 to filter based on IP addresses. Ingress/egress filtering (BCP38) is the standard mitigation at the network perimeter.
CISSP Mindset: IP = Layer 3. TCP/UDP ports = Layer 4. If the attack manipulates IP addresses or routing, it is a Layer 3 attack.
FinTech Company X's SOC team detects a flood of TCP SYN packets targeting port 443 on the Partner C API gateway, exhausting server connection tables. At which OSI layer does this attack operate?
TCP (Transmission Control Protocol) operates at Layer 4 (Transport). A SYN flood exploits the TCP three-way handshake — specifically the half-open connection state — which is a Layer 4 mechanism. Ports (443) are Layer 4 identifiers. Mitigations include SYN cookies (Layer 4), rate limiting, and CloudFlare's DDoS protection which operates at multiple layers.
CISSP Mindset: TCP three-way handshake = Layer 4. SYN flood targets the connection table, not application logic. SYN cookies are the Layer 4 countermeasure.
An attacker submits a malicious payload — ' OR 1=1 -- — in the loan application form on FinTech Company X's Platform C portal, successfully bypassing authentication. Which OSI layer is this attack targeting?
SQL injection targets application logic — the web application's processing of user input. Layer 7 (Application) encompasses HTTP, HTTPS, DNS, SMTP, and application-level protocols. A WAF (Web Application Firewall) like FinTech Company X's CloudFlare WAF operates at Layer 7 specifically to inspect and block malicious HTTP/HTTPS payloads such as SQLi and XSS.
CISSP Mindset: Any attack on application logic, HTTP parameters, or web content = Layer 7. The WAF is the Layer 7 control.
FinTech Company X's security team is evaluating controls for its Platform C microservices platform. A stateful firewall can block port scans and connection floods, but it cannot detect malicious HTTP payloads in HTTPS traffic. Which control would BEST complement the stateful firewall to address this gap?
Stateful firewalls operate at Layer 3–4 and track connection state but cannot inspect application-layer content. A WAF operates at Layer 7, inspecting HTTP/HTTPS request bodies, headers, and parameters to detect SQLi, XSS, and API abuse. FinTech Company X uses CloudFlare WAF precisely for this Layer 7 inspection of Platform C web traffic. An IDS in passive mode detects but does not block; a Layer 3 ACL cannot inspect payload content.
CISSP Mindset: Stateful firewall = Layers 3–4 (IP/TCP state). WAF = Layer 7 (HTTP content). For application-layer attacks, WAF is required.
TLS encryption used by FinTech Company X's Platform C API operates primarily at which OSI layer to provide confidentiality and integrity for data in transit?
TLS (Transport Layer Security) is typically mapped to Layer 6 (Presentation) in the OSI model because it handles encryption, decryption, and data format transformation. While TLS runs "on top of" TCP (Layer 4) and "below" HTTP (Layer 7), its encryption/compression function maps to Layer 6. Note: Some sources map TLS to Layer 5 (Session) — on the CISSP exam, Layer 6 (Presentation) is the most accepted answer for encryption protocols.
CISSP Mindset: Layer 6 = encryption, encoding, compression. TLS handles encryption, so it belongs at Layer 6 (Presentation). Remember: SSL/TLS = Presentation layer.
An attacker successfully steals a session cookie from an Platform C platform user, injecting it into their own browser to impersonate the user without needing credentials. At which OSI layer does session hijacking primarily occur?
Session cookie hijacking is an application-layer attack. HTTP cookies are an application-layer (Layer 7) construct defined in HTTP headers. The attacker exploits the application's session management, not the TCP session or OSI Layer 5 sessions. Mitigations include HttpOnly/Secure cookie flags, short session timeouts, and token binding — all application-layer controls. Layer 5 (Session) deals with NetBIOS sessions, not HTTP cookies.
CISSP Mindset: HTTP cookies, web sessions, and authentication tokens are Layer 7 concepts. Do not confuse "session" (Layer 5) with web application sessions (Layer 7).
A network security audit at FinTech Company X discovers that an attacker can send double-encapsulated 802.1Q frames to access traffic on a different VLAN segment. Which OSI layer does this VLAN hopping attack exploit?
VLANs (Virtual Local Area Networks) and 802.1Q tagging operate at Layer 2 (Data Link). VLAN hopping exploits the switch's handling of 802.1Q VLAN tags in Ethernet frames — Layer 2 constructs. The double-encapsulation attack adds an extra 802.1Q tag that causes the switch to forward the frame to the attacker's target VLAN. Mitigation: disable unused trunk ports, assign native VLAN to an unused VLAN ID, disable DTP.
CISSP Mindset: VLANs, 802.1Q tags, MAC addresses, and switch trunking are all Layer 2. VLAN hopping = Layer 2 attack requiring Layer 2 controls.
A threat actor announces a more specific BGP prefix for FinTech Company X's IP range to upstream ISPs, diverting internet traffic destined for FinTech Company X's services through the attacker's infrastructure. At which OSI layer does BGP hijacking primarily operate?
BGP (Border Gateway Protocol) is a Layer 3 routing protocol that controls how IP traffic is routed between autonomous systems on the internet. BGP hijacking manipulates route advertisements to redirect IP traffic — a Layer 3 (Network) function. The mitigation is RPKI (Resource Public Key Infrastructure), which cryptographically validates BGP route origin announcements. This is a critical risk for any internet-facing service like FinTech Company X's products.
CISSP Mindset: Routing protocols (BGP, OSPF, RIP) = Layer 3. BGP hijacking redirects IP-layer routes, making it a Layer 3 attack. RPKI is the standard countermeasure.
An attacker poisons the DNS resolver used by FinTech Company X employees, causing queries for internal services to resolve to malicious IP addresses. DNS cache poisoning operates at which OSI layer?
DNS (Domain Name System) is an application-layer (Layer 7) protocol that runs over UDP/TCP port 53. DNS cache poisoning injects fraudulent resource records into the DNS application, exploiting the application protocol's lack of origin authentication. DNSSEC (DNS Security Extensions) provides cryptographic validation at the application layer. DNS over HTTPS (DoH) and DNS over TLS (DoT) add transport encryption but DNS itself remains Layer 7.
CISSP Mindset: DNS = Layer 7 (Application) despite using UDP/TCP transport. DNSSEC, DoH, and DoT are all Layer 7 controls for DNS security.
FinTech Company X's security team wants to deploy a control that operates at Layer 7 to inspect and filter HTTPS traffic from the Partner C CloudFlare edge to the origin servers. Which control BEST meets this requirement while also providing DDoS mitigation?
CloudFlare WAF operates at Layer 7 (Application), inspecting HTTP/HTTPS request content including headers, cookies, and request bodies. It can detect and block application-layer attacks (SQLi, XSS, API abuse) while also providing Layer 3–4 DDoS mitigation. FinTech Company X already uses CloudFlare for Partner C. A stateful firewall cannot inspect encrypted HTTPS payload; IPSec protects the channel but does not inspect Layer 7 content; Layer 3 ACLs cannot see HTTP application data.
CISSP Mindset: The "best" answer combines multiple security capabilities. CloudFlare WAF addresses the Layer 7 gap that stateful firewalls leave open.
During a red team exercise, an analyst places a network tap between a switch and a server to capture all Ethernet frames in promiscuous mode. Which OSI layer does this passive sniffing attack primarily target?
Promiscuous mode sniffing captures Ethernet frames — the Layer 2 data unit. While the physical tap touches Layer 1, the capture and analysis of MAC addresses and frame content is a Layer 2 activity. Encryption at higher layers (TLS) protects against sniffing exposing application data, but Layer 2 frames and headers remain visible. Switch port security and encryption are the primary mitigations.
CISSP Mindset: Frames = Layer 2. Packets = Layer 3. Segments = Layer 4. Sniffers capture Layer 2 frames; encryption protects Layer 3+ payloads.
Which OSI layer does HTTPS (TLS) certificate validation PRIMARILY protect against in a man-in-the-middle attack where the attacker intercepts communication between a user's browser and FinTech Company X's Platform C portal?
TLS certificate validation prevents an attacker from presenting a fraudulent certificate to impersonate the server. Since TLS/encryption operates at Layer 6 (Presentation), MITM via fake certificates targets Layer 6. The browser validates the server certificate against trusted CAs, and HSTS prevents downgrade attacks. Certificate Transparency logs add further protection. This is the primary threat TLS addresses — not Layer 2/3/4 attacks.
CISSP Mindset: TLS protects identity (certificate = who you're talking to) and confidentiality (encryption). The MITM threat TLS solves is at the Presentation layer.
FinTech Company X's security architect wants to deploy controls at EVERY OSI layer for defense in depth. Rank these controls from lowest to highest OSI layer: (1) DNSSEC validation, (2) SYN cookies, (3) 802.1Q VLAN segmentation, (4) Physical cable locks, (5) CloudFlare WAF rules.
Layer mapping: (4) Physical cable locks = Layer 1 (Physical); (3) 802.1Q VLAN segmentation = Layer 2 (Data Link); (2) SYN cookies = Layer 4 (Transport); (1) DNSSEC validation = Layer 7 (Application); (5) CloudFlare WAF rules = Layer 7 (Application). Note: DNSSEC and WAF both operate at Layer 7, but WAF inspects HTTP/HTTPS while DNSSEC secures DNS. Both are correct in the top tier. The correct ordering from L1→L7 is: Physical locks → VLAN → SYN cookies → DNSSEC/WAF.
CISSP Mindset: Defense in depth means controls at every layer. Physical (L1) → Data Link (L2) → Transport (L4) → Application (L7).
Q16–Q30 Network Security Devices
A stateless packet filter firewall differs from a stateful firewall in which MOST important way?
Stateless packet filters evaluate each packet in isolation against ACL rules (IP, port, protocol) without tracking connection context. They cannot distinguish a legitimate reply packet from a forged unsolicited packet with the same characteristics, making them vulnerable to spoofed ACK floods and session injection. Stateful firewalls maintain a connection table tracking SYN/SYN-ACK/ACK handshakes and only allow reply packets that match established connections. Stateless firewalls operate at Layer 3–4, not Layer 7.
CISSP Mindset: Stateful = connection-aware. Stateless = packet-by-packet. The state table is what makes stateful firewalls resistant to session-based attacks.
FinTech Company X is deploying a Next-Generation Firewall (NGFW) at its data center perimeter. Which capability DISTINGUISHES an NGFW from a traditional stateful firewall?
NGFW (Next-Generation Firewall) extends traditional stateful firewall with: (1) Deep Packet Inspection (DPI) for application-layer awareness — identify apps regardless of port; (2) User-identity integration via Active Directory; (3) Built-in IPS for threat detection and prevention; (4) SSL/TLS decryption for encrypted traffic inspection. An NGFW does NOT replace a WAF — WAF provides specialized web application protection that NGFW DPI may not cover at the same depth for HTTPS APIs.
CISSP Mindset: NGFW = stateful + DPI + app awareness + IPS + user identity. It does not fully replace a dedicated WAF for web application security.
FinTech Company X's CISO wants to deploy a solution that ACTIVELY blocks detected intrusion attempts on the network in real time, not just alert on them. Which technology meets this requirement?
IDS (Intrusion Detection System) detects and alerts — it is passive/monitoring only. IPS (Intrusion Prevention System) is inline — it sits in the traffic path and can actively block, drop, or reset malicious connections in real time. A NIDS in promiscuous mode only monitors a copy of traffic and cannot block. SIEM collects and correlates logs but does not block traffic. The key differentiator: IPS = inline = can block; IDS = passive = detect-only.
CISSP Mindset: IDS detects (passive). IPS prevents (inline, active). When the requirement is "block in real time," the answer is IPS.
FinTech Company X hosts its customer-facing Platform C web servers in a DMZ. Which traffic flow rule BEST represents the correct DMZ security policy?
The DMZ is a semi-trusted zone. Correct DMZ traffic policy: (1) Internet → DMZ: Permitted on specific ports (80/443) so customers can reach web servers; (2) DMZ → Internal network: DENIED by default — if a DMZ server is compromised, it should not be able to reach internal databases or systems directly; (3) Internal → DMZ: Allowed so administrators can manage DMZ servers. The critical control is blocking unsolicited DMZ→Internal traffic to contain breaches.
CISSP Mindset: DMZ protects the internal network. If DMZ is compromised, the attacker still cannot reach internal systems. "DMZ → Internal = Deny" is the critical rule.
FinTech Company X's threat intelligence team wants to deploy a deception technology to attract and study attacker techniques without exposing real production assets. Which technology is MOST appropriate?
A honeypot is a deliberately vulnerable or attractive decoy system designed to lure attackers away from production assets while logging their techniques, tools, and procedures (TTPs) for threat intelligence. It provides early warning of attacks (any access to a honeypot is suspicious by definition) and helps understand attacker behavior. A honeynet is a network of honeypots. Key legal consideration: entrapment is not a concern if the honeypot is passive (logging only), but active engagement may raise legal issues.
CISSP Mindset: Honeypots = deception = threat intelligence. Any connection to a honeypot is suspicious. They do not protect production — they detect and study attackers.
FinTech Company X wants to ensure that only company-owned, fully-patched laptops can connect to the corporate Wi-Fi SSID "TS-Corp". Unpatched or personal devices should be quarantined. Which technology BEST achieves this?
NAC (Network Access Control) with 802.1X provides: (1) Authentication — verifies device identity via certificates or credentials against a RADIUS server; (2) Posture assessment — checks that the device is domain-joined, has antivirus, is patched; (3) Dynamic VLAN assignment — quarantines non-compliant devices to a remediation VLAN. MAC filtering is trivially bypassed by MAC spoofing. WPA2-PSK shares one password — any device with the password connects. VLAN alone does not authenticate devices.
CISSP Mindset: NAC = authenticate + assess + enforce. 802.1X is the standard for port-based network access control. Posture assessment is what distinguishes NAC from simple authentication.
FinTech Company X's SOC team is overwhelmed with thousands of IDS alerts per day, most of which turn out to be false positives. The CISO asks for the MOST operationally practical approach to reduce alert fatigue while maintaining detection effectiveness.
Alert fatigue from false positives is a major operational challenge. The correct approach: (1) Tune IDS signatures — customize rule thresholds to match the specific network environment; (2) Behavioral baselining — anomaly-based detection understands "normal" and reduces noise; (3) SIEM correlation — aggregate and correlate alerts, reducing individual alerts into meaningful incidents. Disabling the IDS eliminates detection. Adding more analysts without tuning doesn't scale. A WAF addresses only web application threats, not network threats.
CISSP Mindset: The managerial answer balances security effectiveness with operational practicality. Tuning + correlation is the sustainable answer to alert fatigue.
FinTech Company X's Platform C web servers in the DMZ need to query the internal Oracle database for loan data. Which is the MOST secure design for this communication?
The principle of least privilege and defense in depth apply here. Direct DMZ → internal database connections violate the "DMZ cannot initiate connections to internal zone" rule. The most secure design: (1) Deploy an application-layer database proxy in the DMZ; (2) The proxy validates and sanitizes queries before forwarding; (3) The internal database only accepts connections from the specific proxy IP on a specific application port; (4) If the web server is compromised, the attacker faces an additional proxy barrier. Option B is better than A but still allows direct connections without proxy validation.
CISSP Mindset: Add a proxy layer between DMZ and internal systems. The proxy validates requests, enforces least privilege, and limits blast radius of a compromised web server.
A proxy firewall (application gateway) differs from a stateful packet inspection firewall in which CRITICAL way?
A proxy firewall (application gateway) acts as an intermediary: it terminates the external connection, inspects the application-layer content, then creates a NEW connection to the internal server. This means external hosts never have a direct network path to internal hosts — a fundamental security advantage. Stateful firewalls allow the connection to flow through (with state tracking) but do not break the network path. Proxy firewalls introduce latency and are slower, not faster. They operate at Layer 7, inspecting application content.
CISSP Mindset: Proxy = connection break = no direct path. Stateful = connection tracking = path exists but monitored. Proxy provides stronger isolation.
FinTech Company X deploys 802.1X on its wired network ports. An employee's laptop fails posture assessment because it is missing the latest OS patches. Which 802.1X behavior is MOST appropriate?
802.1X with NAC supports dynamic VLAN assignment based on posture. When a device fails posture assessment, placing it in a quarantine/remediation VLAN is the most operationally practical response: (1) The device has limited network access — only to the patching/update server; (2) Once patches are applied and posture is re-assessed, the device is automatically moved to the correct VLAN; (3) This balances security (non-compliant devices cannot reach production) with usability (employee can self-remediate). Permanent denial disrupts productivity unnecessarily.
CISSP Mindset: NAC should be remediation-focused, not punitive. Quarantine + self-remediation is the operationally practical answer. Credentials ≠ authorization if posture fails.
Which firewall architecture provides the HIGHEST level of security for a three-zone network (Internet, DMZ, Internal) by using two separate physical firewall devices?
The dual-firewall (screened subnet) architecture provides defense in depth: the outer firewall filters Internet traffic reaching the DMZ, while the inner firewall protects the internal network from DMZ compromise. If the outer firewall is compromised, the inner firewall still protects internal systems. Using two different vendor firewalls adds further resilience (different vulnerabilities). A single tri-homed firewall is simpler but a single point of failure. An NGFW single device improves on a single firewall but still represents a single point of failure.
CISSP Mindset: Dual-firewall = defense in depth = no single point of failure. The inner firewall protects internal systems even if the DMZ is compromised.
FinTech Company X's IDS detects a zero-day attack that has never been seen before. Which IDS detection methodology would MOST LIKELY identify this novel threat?
Signature-based IDS cannot detect zero-days because there is no existing signature for the attack. Anomaly-based IDS establishes a baseline of "normal" network behavior and flags statistical deviations — it can detect zero-day attacks that behave differently from the baseline even without a known signature. The trade-off: anomaly-based systems have higher false positive rates because legitimate unusual activity may appear anomalous. Protocol analysis detects malformed packets but not novel application-layer attacks. Hash-based detection is file-level, not network-level.
CISSP Mindset: Signature-based = known threats, low FP. Anomaly-based = unknown threats, higher FP. Zero-day → anomaly-based is the answer.
Which of the following assets should FinTech Company X place in the DMZ? (Select the MOST appropriate.)
The DMZ hosts services that must be accessible from the internet while being isolated from internal systems. Appropriate DMZ assets: web servers, public-facing API gateways, mail relays, DNS resolvers (external-facing). Assets that must NOT be in the DMZ: HR databases (sensitive internal data), Active Directory (credential store for internal resources), SIEM (security monitoring must be internal and trusted). The Platform C web server and Bank A API gateway are correct DMZ candidates because they serve external users/partners.
CISSP Mindset: DMZ = internet-facing services only. Internal databases, authentication systems, and security monitoring tools belong on the internal network.
FinTech Company X's firewall ruleset has grown to over 500 rules with many conflicts and redundancies over five years. Which is the BEST first step to remediate this situation?
Firewall rule bloat is a common operational security problem. The correct approach: (1) Audit — identify rules that are redundant (duplicated), shadowed (never reached due to earlier matching rules), overly permissive (any/any rules), or no longer needed; (2) Document the business justification for each rule; (3) Implement a formal change management process to prevent future bloat. Deleting all rules (A) would cause an outage. Migrating 500 bad rules to a new NGFW (C) brings the problem with you. Blocking all traffic (D) is disruptive and operationally impractical.
CISSP Mindset: Operational security requires ongoing maintenance. Rule audits + change management = sustainable firewall hygiene. The managerial answer maintains operations while improving security.
FinTech Company X uses NAT (Network Address Translation) at its internet gateway. Which security benefit does NAT PRIMARILY provide?
NAT translates private IP addresses (RFC 1918) to public IPs, hiding internal network topology from external observers. This provides security through obscurity — attackers cannot directly scan or initiate connections to internal hosts using their private IPs. However, NAT is NOT a security control by itself: it does not encrypt, authenticate, or prevent all attacks. Compromised web servers in the DMZ can still be exploited. NAT was designed for IPv4 address conservation, with security as a side benefit. IPv6 does not require NAT, which is why IPv6 deployments need explicit firewalls.
CISSP Mindset: NAT = address hiding = security through obscurity (not a strong control). NAT is NOT encryption, authentication, or a firewall. Do not over-rely on NAT for security.
Q31–Q50 VPN & Encrypted Channels
During IKE Phase 1 for the Bank A VPN, what is the PRIMARY purpose of this phase in establishing the IPSec tunnel?
IKE (Internet Key Exchange) has two phases: Phase 1 — Establishes a secure, mutually authenticated channel (the ISAKMP Security Association or IKE SA). Both parties authenticate each other (via PSK, digital certificates, or public key encryption) and negotiate encryption/hash algorithms for the IKE channel itself. This is the "management channel." Phase 2 — Uses the protected Phase 1 channel to negotiate the IPSec SAs (Security Associations) that will actually encrypt the data traffic (the "data channel"). Phase 2 negotiates ESP/AH parameters, PFS settings, and traffic selectors. The Bank A VPN must complete both phases before data flows.
CISSP Mindset: IKE Phase 1 = authenticate + protect the control channel. IKE Phase 2 = negotiate the data encryption parameters. Two-phase design = secure negotiation before data flows.
FinTech Company X's mobile app for Platform C implements certificate pinning. What does this protect against, and what is the PRIMARY operational risk?
Certificate pinning hardcodes a specific certificate (or public key hash) into the mobile app. Protection: Even if an attacker obtains a fraudulent but CA-signed certificate (e.g., through a compromised CA or MITM proxy), the pinned certificate won't match, and the connection fails. This defeats corporate SSL inspection proxies used in MITM scenarios. Operational risk: When FinTech Company X legitimately renews or rotates the server certificate (e.g., every 1-2 years), the old pinned certificate is invalid and the app refuses connections — requiring an emergency app update. Best practice: Pin the public key or CA rather than the leaf certificate; include backup pins.
CISSP Mindset: Pinning = strong MITM protection but high maintenance cost. Operational practicality: use backup pins and pin the intermediate CA, not the leaf certificate.
FinTech Company X's security team reviews the TLS cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384. What does the "ECDHE" component provide in this cipher suite?
TLS cipher suite breakdown — TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: (1) ECDHE — key exchange algorithm (Elliptic Curve Diffie-Hellman Ephemeral): generates a temporary (ephemeral) key pair for each session — provides PFS because session keys are not derived from the long-term RSA private key; (2) RSA — authentication/signature algorithm: the server's certificate is RSA, used to authenticate the server and sign the ECDHE key exchange parameters; (3) AES_256_GCM — symmetric encryption and authentication (AES in Galois/Counter Mode, 256-bit); (4) SHA384 — PRF/hash for key derivation. ECDHE is specifically the key exchange component providing PFS.
CISSP Mindset: In a cipher suite, each component has a role: Key Exchange (ECDHE/DHE/RSA) + Authentication (RSA/ECDSA) + Symmetric Cipher (AES) + MAC/PRF (SHA). ECDHE = key exchange = PFS.
FinTech Company X's Partner C platform sends OTP (One-Time Passwords) via SMS for loan application authentication. An attacker attempts to brute-force OTPs by making thousands of requests per minute. Which combination of network-level controls BEST mitigates this threat?
Defense in depth for OTP brute-force: (1) CloudFlare rate limiting — blocks IPs or tokens exceeding a request rate threshold at the network edge before requests reach origin servers; (2) OTP expiry — 5-minute validity window drastically reduces brute-force window (attacker has limited time); (3) Account lockout after N failures — prevents sustained brute-force even if rate limiting is bypassed via distributed attacks. An IDS alert alone (option D) detects but does not block. Increasing OTP length helps but is not a network-level control. Removing OTP (option C) reduces security. This layered approach is FinTech Company X's Partner C production pattern.
CISSP Mindset: Defense in depth for authentication = rate limiting (network) + expiry (protocol) + lockout (application). Each layer catches what the previous misses.
An attacker intercepts the TLS ClientHello between a user's browser and FinTech Company X's Platform C server, modifying it to advertise only weak cipher suites (RC4, 3DES) to force a downgrade. What mechanism in TLS 1.3 prevents this attack?
TLS 1.3 downgrade protection: (1) Cipher elimination — RC4, 3DES, export ciphers, and all weak suites are removed from TLS 1.3. There is no weak cipher to downgrade to. (2) Version downgrade sentinel — TLS 1.3 embeds a specific sentinel value in the ServerRandom field. If a TLS 1.3-capable server is forced (by MITM) to respond with TLS 1.2, it includes this sentinel. The client detects the sentinel in a 1.2 ServerHello and aborts the connection, knowing a downgrade occurred. (3) Encrypted extensions — TLS 1.3 encrypts more handshake messages, reducing the attacker's ability to manipulate them. Note: TLS 1.3 does NOT encrypt the ClientHello in the standard version (though ESNI/ECH extends this).
CISSP Mindset: TLS 1.3 downgrade protection = no weak ciphers to downgrade to + server random sentinel to detect version rollback. Two complementary mechanisms.
The Bank A IPSec VPN has been running for 8 hours. The security team notes the VPN is using the same session key without rekeying. What security principle does extended key lifetime without rekeying violate?
IPSec Security Associations have configurable lifetimes (time-based and byte-count-based). Extended use of the same key violates: (1) Key freshness — cryptographic best practice limits key usage to minimize data encrypted under a single key (birthday attack risk with AES-CBC; GCM nonce exhaustion risk); (2) PFS concerns — if PFS is enabled, each SA rekey generates a new ephemeral DH key exchange, ensuring compromise of one session key does not expose other sessions; without regular rekeying, the PFS benefit is diminished; (3) Best practice: Configure short SA lifetimes (e.g., 1 hour or 10GB) to force periodic rekeying with fresh keys.
CISSP Mindset: Key lifetime management is a cryptographic operations concern. Short SA lifetimes + PFS = minimize key exposure. Long-lived keys = larger blast radius if compromised.
FinTech Company X's Platform C microservices use mTLS for service-to-service communication. A new service is deployed without a valid client certificate. What happens from an mTLS perspective, and why is this the correct security behavior?
In a strict mTLS configuration, the server requests the client certificate during the TLS handshake (CertificateRequest message). If the client cannot present a valid certificate from a trusted CA, the handshake fails with a TLS alert (certificate_required or handshake_failure) and the connection is terminated. This is the correct zero-trust behavior: "never trust, always verify." A new service without a certificate represents an uncredentialed endpoint — it must obtain a valid certificate from the PKI (e.g., through a service mesh like Istio or manual provisioning) before accessing other services. Automatic issuance should go through an automated PKI workflow with proper validation, not an ad-hoc mechanism.
CISSP Mindset: mTLS = zero trust for services. No cert = no access. This enforces the principle that network location alone should not grant trust. Service mesh PKI automates certificate lifecycle.
FinTech Company X has deployed HSTS on its Platform C domain. However, a first-time visitor who has never been to the site before is still vulnerable to an SSL stripping attack. What additional mechanism resolves this "TOFU" (Trust On First Use) problem?
Standard HSTS works after the FIRST successful HTTPS visit — the browser stores the HSTS policy. However, the very first visit (or after cache expiry) is still vulnerable to SSL stripping. HSTS Preloading solves this: Submitting to hstspreload.org adds the domain to Chrome/Firefox/Edge's built-in HSTS list. All visitors automatically use HTTPS from the first connection — there is no "first HTTP request" to strip. Requirements: must serve HSTS with max-age≥31536000, includeSubDomains, and preload directives. This is a browser-level protection, not a server configuration. DNSSEC (A) protects DNS integrity but does not prevent SSL stripping. Certificate transparency (D) detects unauthorized certificates.
CISSP Mindset: HSTS = effective after first visit. HSTS preload = effective from first visit ever. Preloading is the strongest defense against SSL stripping for internet-facing sites.
FinTech Company X wants to upgrade the Bank A site-to-site IPSec VPN authentication from pre-shared keys (PSK) to a more scalable and secure mechanism. Which is the BEST upgrade path and why?
PSK limitations for site-to-site VPN: (1) Shared secret — if Bank A's copy is compromised, the VPN is fully compromised; (2) No non-repudiation — both sides know the same secret; (3) Management overhead — changing PSK requires coordination; (4) Does not scale to many VPN tunnels. Digital certificates solve these: (1) Private key stays on the owner's device — even the CA doesn't have it; (2) Provides non-repudiation; (3) Certificate revocation (CRL/OCSP) allows rapid revocation if compromise is suspected; (4) Scales to hundreds of VPN peers. RADIUS is for user authentication, not site-to-site gateway auth. WPA3 SAE is a wireless protocol, not VPN.
CISSP Mindset: PKI/certificates > PSK for site-to-site VPN. Scalability + revocation + non-repudiation. For B2B VPNs with partners, certificates are the professional standard.
FinTech Company X's security team discovers that a TLS 1.2 server was using RSA key exchange (no PFS) for six months before being discovered. A threat actor was recording all encrypted traffic during this period. They then obtained the server's private RSA key via a breach. What can the attacker now do?
This is precisely why PFS matters. RSA key exchange (no PFS): The client encrypts a pre-master secret using the server's RSA public key. Only the server's RSA private key can decrypt it. The master secret (session key) is derived from the pre-master secret. If the attacker has: (1) A recording of all TLS traffic over six months AND (2) The server's RSA private key They can: decrypt the pre-master secret from each recorded ClientKeyExchange → derive each session's master secret → derive session keys → decrypt all recorded traffic. With PFS (ECDHE): Each session uses a fresh ephemeral key pair. Compromising the long-term RSA private key does NOT reveal past session keys — they were generated from ephemeral keys that were discarded after each session.
CISSP Mindset: No PFS = server private key compromise = ALL past sessions decryptable. PFS (ECDHE) = session keys are ephemeral = past sessions safe even if private key is compromised. This is the defining security benefit of PFS.
Q51–Q65 Wireless Security
Q66–Q80 Email & DNS Security
FinTech Company X's IT team adds an SPF record to their DNS. What does SPF specifically protect against?
SPF (Sender Policy Framework): A DNS TXT record that lists IP addresses/ranges/hostnames authorized to send email for a domain. When a receiving mail server receives email claiming to be from company-x.com, it checks the SPF record in DNS. If the sending server's IP is NOT in the SPF record, the email fails SPF and can be marked as spam or rejected. SPF limitations: (1) Only checks the envelope "From" address (MAIL FROM), not the header "From" visible to users; (2) Does not prevent forwarding issues; (3) Does not sign/encrypt content. SPF is one of three email authentication mechanisms — must be combined with DKIM and DMARC for complete protection.
CISSP Mindset: SPF = authorized IP list for sending mail = anti-spoofing at the IP level. SPF alone is insufficient — attackers can still spoof the header From. DKIM + DMARC are needed too.
After FinTech Company X implements DKIM, what specific protection does it add that SPF alone does NOT provide?
DKIM (DomainKeys Identified Mail): The sending mail server signs specific email headers and the body with the domain's private key. The public key is published in DNS (TXT record). The receiving server: (1) Retrieves the public key from DNS; (2) Verifies the DKIM-Signature header; (3) Confirms the email was signed by the domain's private key and has not been modified in transit. DKIM advantages over SPF: (1) Survives email forwarding — the signature travels with the email; (2) Provides content integrity — any modification breaks the signature; (3) Signs the header "From" address (what users see), not just the envelope. DKIM does NOT encrypt content — it only signs it. The email body remains readable by mail servers.
CISSP Mindset: SPF = authorized IP list. DKIM = cryptographic signature on content. DKIM survives forwarding; SPF does not. Both needed for DMARC alignment.
FinTech Company X publishes a DMARC record with policy "p=reject". A phishing email is sent spoofing @company-x.com. The email passes SPF (sent from an allowed IP) but fails DKIM (content was modified). What does DMARC do in this case?
DMARC (Domain-based Message Authentication, Reporting and Conformance): DMARC requires that at least one of SPF or DKIM passes AND "aligns" with the header From domain. In this case: SPF passes (sent from authorized IP) but fails alignment (SPF checks envelope From, not header From — these may differ in a spoofing scenario); DKIM fails (content modified = signature broken). DMARC evaluation: If both SPF and DKIM fail their alignment checks, DMARC applies the policy (p=reject = reject the email). Even if SPF technically "passes," if it doesn't align with the header From domain and DKIM also fails, DMARC triggers the policy. DMARC policies: p=none (report only); p=quarantine (spam folder); p=reject (reject at SMTP). DMARC also generates aggregate reports (rua) and forensic reports (ruf) sent to the domain owner.
CISSP Mindset: DMARC = policy enforcement based on SPF+DKIM alignment. DMARC requires at least ONE to pass AND align. p=reject = mail rejected at server. Start with p=none, move to p=quarantine, then p=reject after validating legitimate mail.
FinTech Company X's legal team needs to exchange confidential loan agreements via email with encryption AND non-repudiation. Which technology provides both, and what key is used for encryption vs. signature?
S/MIME (Secure/Multipurpose Internet Mail Extensions): (1) Encryption: The sender encrypts the message using the RECIPIENT's public key (from their X.509 certificate). Only the recipient's private key can decrypt it. This ensures confidentiality — only the intended recipient can read it; (2) Digital Signature: The sender signs the message using their own PRIVATE key. The recipient verifies using the sender's PUBLIC key. This provides: authentication (proves who sent it), integrity (message was not modified), and non-repudiation (sender cannot deny sending it). Both encryption and signing can be applied together. TLS encrypts the email channel (SMTP over TLS / STARTTLS) but not the email content at rest — once delivered, it is unencrypted unless S/MIME or PGP is used.
CISSP Mindset: Encrypt = recipient's public key (only they can decrypt). Sign = sender's private key (proves identity, non-repudiation). This applies to ALL asymmetric operations: email, code signing, certificates.
FinTech Company X implements DNSSEC on its domain. What does DNSSEC specifically provide that standard DNS does NOT?
DNSSEC (DNS Security Extensions): DNS has no built-in authentication — responses can be forged (DNS cache poisoning). DNSSEC adds: (1) Cryptographic signatures (RRSIG records) on DNS resource records; (2) The zone is signed with a private key (ZSK — Zone Signing Key); (3) Resolvers verify signatures using the public key (published as DNSKEY records); (4) Chain of trust from the root DNS zone down to the domain. DNSSEC does NOT encrypt DNS — queries and responses are still in plaintext. DNSSEC provides integrity and authenticity, not confidentiality. For privacy (encrypting DNS queries), DoH (DNS over HTTPS) or DoT (DNS over TLS) is required. These are complementary: DNSSEC = content integrity; DoH/DoT = transport encryption.
CISSP Mindset: DNSSEC = data integrity + origin authentication (not encryption). DoH/DoT = encryption (not integrity). Know the difference: DNSSEC validates content; DoH/DoT hides the query from observers.
FinTech Company X is evaluating DNS over HTTPS (DoH) vs. DNS over TLS (DoT) for employee devices. What is the PRIMARY operational security difference between them?
Both DoH and DoT encrypt DNS queries: DoH: Encapsulates DNS in HTTPS (port 443). Corporate firewalls cannot distinguish DoH traffic from regular HTTPS without deep packet inspection. This means employees can bypass corporate DNS filtering (malware domain blocking, content filtering) if DoH resolvers are hardcoded in browsers (Chrome, Firefox implement DoH by default). Corporate impact: DNS-based security controls (Umbrella, NextDNS, BlueCoat) are bypassed. DoT: Uses dedicated port 853. Corporate firewalls can explicitly block or intercept port 853, redirecting to corporate DNS resolvers. This allows visibility. From a pure privacy perspective, both offer equivalent encryption strength. Operationally, DoT is more manageable for enterprise environments.
CISSP Mindset: DoH = bypasses corporate DNS controls (security risk for enterprise). DoT = filterable/controllable port. For enterprise environments, DoT is more manageable. For privacy (from ISP), both work equally.
FinTech Company X receives a phishing complaint: employees received emails appearing to be from ceo@company-x.com asking for urgent wire transfers. FinTech Company X has published SPF and DKIM but NOT DMARC. Why did the phishing email still get through?
SPF and DKIM are AUTHENTICATION mechanisms — they detect spoofing. DMARC is the ENFORCEMENT mechanism — it tells receiving servers what to DO when authentication fails. Without DMARC, a receiving server checks SPF/DKIM and may note the results in headers (Authentication-Results), but there is no published policy saying "reject" or "quarantine" failures. Most mail servers default to delivering suspicious email rather than dropping it (to avoid false positives). DMARC closes this gap: publish p=quarantine or p=reject to instruct receiving servers to take action on authentication failures. The correct remediation for FinTech Company X: add a DMARC record, start with p=none (monitoring only), then escalate to p=quarantine and p=reject after validating all legitimate mail passes.
CISSP Mindset: SPF+DKIM = detect. DMARC = enforce. Without DMARC, detection alone doesn't stop delivery. The three work as a trio — all three are required for complete email authentication.
The Kaminsky DNS cache poisoning attack (2008) was a significant DNS vulnerability. What made DNSSEC the definitive fix for this class of attack?
Kaminsky attack: exploited DNS transaction ID (only 16-bit) and predictable source ports to flood a resolver with forged responses, winning the race before the legitimate response arrived. Short-term fix: source port randomization (increases entropy from 16-bit to ~32-bit). Definitive fix (DNSSEC): Cryptographic signatures on DNS records. An attacker's forged response cannot include a valid signature because they don't have the zone's private key (ZSK/KSK). The resolver verifies the RRSIG record against the published public key — a forged record without a matching signature is rejected. This defeats cache poisoning regardless of timing. DNSSEC does not use port randomization (that was an interim workaround) and does not encrypt queries.
CISSP Mindset: DNS cache poisoning = race condition attack. DNSSEC = cryptographic authentication = race doesn't matter. A forged response without a valid signature is always rejected.
FinTech Company X's CISO asks: "Which email security configuration gives us the STRONGEST protection against domain spoofing for our company-x.com domain?" Select the BEST answer.
Optimal email anti-spoofing configuration: (1) SPF with -all (hard fail) — explicitly rejects unauthorized senders; ~all (soft fail) only marks as suspicious; (2) DKIM with 2048-bit RSA (minimum; 1024-bit is deprecated) — provides cryptographic content integrity; (3) DMARC p=reject — receiving servers reject email failing authentication; reporting (rua/ruf) provides visibility into who is sending email using your domain (legitimate and malicious); (4) Together: SPF identifies authorized IPs, DKIM proves content integrity, DMARC enforces policy and reports. DMARC p=none (option B) provides no enforcement — it is only for monitoring. Note: Start with p=none to avoid blocking legitimate mail during initial deployment, then progress to p=quarantine then p=reject.
CISSP Mindset: Complete email anti-spoofing = SPF (-all) + DKIM (2048+) + DMARC (p=reject) + reporting. This is the industry standard triplet. DMARC alone without SPF/DKIM has nothing to enforce.
An attacker spoofs FinTech Company X's IP address and sends small DNS queries to open resolvers worldwide, which respond with large DNS responses sent to FinTech Company X's IP. What attack is this, and what is the PRIMARY mitigation at the DNS infrastructure level?
DNS amplification attack: (1) Attacker spoofs victim IP → queries open DNS resolver for a record with a large response (e.g., ANY, DNSKEY, or TXT records can be 40–70x larger than the query); (2) Open resolver sends large responses to the victim IP; (3) Amplification factor: 40–100x bandwidth amplification — small attacker bandwidth → large attack traffic at the victim. Mitigations: (1) Disable open recursive resolvers — DNS servers should only answer queries from authorized clients; (2) Response Rate Limiting (RRL) on authoritative servers — limits response rate per query source; (3) BCP38/ingress filtering — ISPs block spoofed source IPs (removes the ability to spoof the victim IP); (4) CloudFlare/Anycast DNS — absorbs DDoS traffic at the edge. FinTech Company X using CloudFlare for Partner C benefits from CloudFlare's DNS DDoS mitigation.
CISSP Mindset: DNS amplification = spoofed IP + open resolver = victim gets flooded. Close open resolvers + RRL at DNS level. BCP38 at ISP level. Anycast/CDN at enterprise level.
FinTech Company X's SOC analyst detects unusually high volumes of DNS queries from one workstation, with very long subdomains containing seemingly random characters (e.g., a1b2c3d4e5f6.exfil.attacker.com). What is likely occurring, and what is the best detection/prevention approach?
DNS tunneling encodes data (C2 commands, exfiltrated files) in DNS query hostnames. DNS is typically allowed through firewalls, making it an attractive covert channel. Indicators: (1) High DNS query volume from a single host; (2) Long subdomain strings with high entropy (random-looking characters); (3) Queries to unusual or newly registered domains; (4) Large DNS response sizes. Detection: DNS traffic analysis (frequency, entropy, query length analysis); SIEM rules for DNS anomalies; threat intelligence feeds for known DNS tunnel C2 domains. Prevention: (1) Restrict DNS queries to internal resolvers only (block direct DNS to internet); (2) DNS firewall (RPZ) blocking known malicious domains; (3) DLP monitoring for encoded data patterns in DNS. This is a real APT technique used to bypass egress filtering.
CISSP Mindset: DNS tunneling = data exfiltration/C2 over DNS (permitted protocol). Detection = entropy analysis + query volume. Prevention = DNS firewall + restrict direct DNS access. Always suspect DNS as a covert channel.
Which SMTP security control ensures that mail transferred between FinTech Company X's mail server and external mail servers is encrypted in transit (opportunistic encryption)?
STARTTLS: An SMTP command that upgrades a plaintext SMTP connection (port 25) to an encrypted TLS connection. It provides transport-level encryption for email in transit between mail servers (MTA-to-MTA). Limitation: STARTTLS is opportunistic — if the receiving server does not support TLS, the connection falls back to plaintext (potential downgrade attack). MTA-STS (Mail Transfer Agent Strict Transport Security) mandates TLS and prevents downgrade. SMTP over TLS (port 465 - SMTPS) uses TLS from the start. STARTTLS vs. S/MIME: STARTTLS encrypts the transport channel (like TLS for web); S/MIME encrypts the email content itself (end-to-end). Both are needed for comprehensive email security.
CISSP Mindset: STARTTLS = channel encryption (transport-level). S/MIME = content encryption (end-to-end). STARTTLS protects in transit; S/MIME protects even after delivery to mail servers.
FinTech Company X's DNS for aula.company-x.com is managed by an external provider. An attacker compromises the DNS registrar account and changes the A record for aula.company-x.com to an attacker-controlled IP. Which control would MOST effectively detect or prevent this attack?
This is a registrar account compromise attack, not a DNS cache poisoning attack. DNSSEC (option A) is excellent for cache poisoning but does not prevent an attacker with legitimate access to the registrar portal from changing authoritative records — DNSSEC keys can be updated too. The correct controls target the registrar account: (1) MFA on the registrar account — prevents credential theft from granting access; (2) Registrar lock — a "domain transfer lock" or "registrar lock" prevents DNS zone changes without an additional out-of-band verification step; (3) DNS monitoring — alerts when A records, NS records, or DNSSEC configuration changes unexpectedly. CAA records (C) limit which CAs can issue certificates for the domain — useful but doesn't prevent DNS hijacking. DoH (D) encrypts queries but doesn't protect authoritative records.
CISSP Mindset: Registrar compromise = access control problem (not cryptography). MFA + registrar lock + monitoring = the right controls for the right threat. Match the control to the specific threat vector.
FinTech Company X's CISO wants to implement the MOST comprehensive technical defense against phishing emails targeting employees. Which layered approach is BEST?
No single control stops phishing. Defense in depth: (1) Secure Email Gateway (SEG) — filters inbound email, detects phishing patterns, rewrites URLs (checks at click-time), sandboxes attachments; (2) SPF+DKIM+DMARC — blocks spoofed domain emails; (3) Browser isolation / URL sandboxing — even if an employee clicks a phishing link, the malicious page runs in an isolated environment; (4) MFA — even if credentials are stolen via phishing, MFA prevents login; (5) Phishing-resistant MFA (FIDO2/passkeys) — eliminates credential phishing entirely because FIDO2 tokens are bound to the origin URL; (6) Awareness training — last line of defense. DMARC alone (D) only blocks emails spoofing FinTech Company X's own domain — not phishing using look-alike domains (trustingsocial-secure.com).
CISSP Mindset: Phishing defense = multiple independent layers. No single technical control is sufficient. The strongest technical control is phishing-resistant MFA (FIDO2) — credential theft becomes irrelevant.
FinTech Company X implements S/MIME encryption for all internal email. An employee departs and their private key is deleted. Years later, a legal discovery request requires access to encrypted email from that employee's tenure. What is the BEST key management practice that would have prevented this problem?
S/MIME email encryption creates a business problem: if the private key is lost/deleted, encrypted email becomes permanently unrecoverable. Key escrow (key recovery): The organization maintains a copy of each user's private key in a secure, access-controlled key escrow system. Access to escrowed keys requires formal authorization (legal counsel, court order, HR approval). This allows: (1) Legal discovery of encrypted email; (2) Recovery after employee departure; (3) Recovery after device loss. Operational considerations: The escrow system must be highly secured (HSM-backed, MFA, audit logging) — it is a high-value target. Dual-key pairs are sometimes used: a personal signing key (not escrowed, ensures non-repudiation) and an organizational encryption key (escrowed, ensures recovery). Disabling encryption (C) defeats the security purpose.
CISSP Mindset: Key escrow = balancing individual privacy with organizational access requirements. Legal discovery is a legitimate business need. Key escrow must be secured as carefully as the keys themselves.
Why is WEP (Wired Equivalent Privacy) considered completely broken and unsuitable for any production wireless network?
WEP's critical flaws: (1) RC4 stream cipher with a weak key scheduling algorithm (KSA); (2) 24-bit IV (Initialization Vector) — too short, IVs are reused within hours on busy networks; (3) IV is sent in cleartext in the packet header; (4) The key = IV + static password — same static key forever; (5) Tools like aircrack-ng can recover the WEP key from approximately 40,000–85,000 captured IVs (passive capture only — no active attack needed); (6) This can take under 10 minutes on a moderately busy network. IEEE 802.11i (WPA2) with AES-CCMP replaced WEP entirely. No security exception exists for WEP — it must never be used.
CISSP Mindset: WEP = broken by design. RC4 + short IV + static key = passive recovery. There is no "secure WEP configuration." Any network using WEP must upgrade immediately.
An attacker captures the WPA2-PSK 4-way handshake from FinTech Company X's guest Wi-Fi network. Without knowing the password, what attack can the attacker now perform offline?
WPA2-PSK weakness: The 4-way handshake contains enough information (ANonce, SNonce, AP MAC, Client MAC, and the MIC/hash) for an attacker to verify candidate passwords offline. Tools like hashcat and aircrack-ng perform this attack at GPU-accelerated speeds (billions of candidates per second with modern GPUs). The attacker requires no further interaction with the network. Mitigations: (1) Use WPA3-SAE which prevents offline attacks (SAE doesn't expose enough information to enable offline cracking); (2) Use a long, random PSK (20+ characters) to make brute-force impractical; (3) Use WPA2-Enterprise (802.1X) which eliminates the shared password entirely.
CISSP Mindset: WPA2-PSK 4-way handshake = offline dictionary attack possible. WPA3-SAE = offline attack prevented. Weak passwords + WPA2-PSK = high risk. Strong random PSK or WPA3 required.
FinTech Company X upgrades its corporate Wi-Fi from WPA2-PSK to WPA3-SAE. What is the SPECIFIC cryptographic advantage that makes WPA3-SAE resistant to offline dictionary attacks that WPA2-PSK is vulnerable to?
WPA3-SAE (Dragonfly Key Exchange / IEEE 802.11s): Unlike WPA2-PSK's 4-way handshake, the SAE handshake is designed so that: (1) The password is used to derive a point on an elliptic curve (via the "hunting and pecking" or hash-to-curve method); (2) The resulting key exchange does not expose enough data to verify a password guess without completing the full protocol with the AP; (3) An attacker must interact with the AP for EACH password guess — the AP can rate-limit these; (4) Even if a session is captured, the session key cannot be retroactively derived from a guessed password (provides forward secrecy). This defeats offline dictionary attacks completely. WPA3-SAE still uses a password — it changes HOW the password is used in the key exchange.
CISSP Mindset: WPA3-SAE = password stays offline (never transmitted); SAE handshake = cannot verify guesses without AP interaction. This is the fundamental difference from WPA2-PSK.
FinTech Company X deploys WPA2-Enterprise (802.1X) on its corporate SSID "TS-Corp". A new employee tries to connect. Which component verifies the employee's credentials and grants access?
802.1X has three roles: (1) Supplicant — the client device (employee laptop) requesting access; (2) Authenticator — the wireless AP (or switch in wired 802.1X): receives credentials and forwards them via RADIUS to the authentication server; (3) Authentication Server — the RADIUS server (typically integrated with Active Directory via LDAP/Kerberos): validates credentials, returns Accept/Reject, and may assign VLAN. The AP does NOT verify credentials itself — it is a controlled conduit. This architecture centralizes authentication, enables per-user policies, and avoids sharing credentials with each AP. No single password = no single point of credential compromise.
CISSP Mindset: 802.1X roles: Supplicant (client) → Authenticator (AP/switch) → Authentication Server (RADIUS). The AP is a gatekeeper, not the credential checker.
FinTech Company X is choosing between EAP-TLS and PEAP for its WPA2-Enterprise wireless implementation. Which statement BEST describes the security difference?
EAP-TLS: (1) Requires a client certificate on every device (provisioned via MDM/PKI); (2) Mutual certificate authentication — both client and RADIUS server present certificates; (3) Strongest EAP method — eliminates password-based attacks entirely; (4) Higher operational overhead — managing client certificates for all devices. PEAP (Protected EAP): (1) Only the RADIUS server presents a certificate; (2) Creates a TLS tunnel, then tunnels inner authentication (usually MSCHAPv2 with username/password) through it; (3) Easier to deploy — no client certificates needed; (4) Weaker — inner MSCHAPv2 credentials can be attacked if the TLS tunnel is improperly validated (RADIUS server certificate not validated by client). Operational recommendation: EAP-TLS for security-critical corporate access; PEAP for simpler deployments with proper server certificate validation.
CISSP Mindset: EAP-TLS = strongest (mutual certs). PEAP = simpler (server cert + password inside tunnel). The managerial choice depends on security requirements vs. operational complexity.
An attacker sets up a rogue access point with the same SSID as FinTech Company X's "TS-Corp" Wi-Fi with a stronger signal, luring employees to connect. What is this attack called and what is the BEST technical mitigation?
Evil twin attack: Attacker creates a rogue AP with the same SSID ("TS-Corp") and higher signal strength, causing devices to associate with the rogue AP instead of the legitimate one. The attacker performs a MITM attack on all associated traffic. Mitigation: 802.1X/EAP with strict server certificate validation: (1) The legitimate RADIUS server has a specific TLS certificate; (2) The rogue AP cannot obtain this certificate; (3) Client devices are configured to validate the RADIUS server certificate and reject connections from APs that cannot authenticate with the correct RADIUS certificate; (4) This makes evil twin attacks against 802.1X networks ineffective. WPA2-PSK is vulnerable to evil twins because anyone can create an AP with the correct password. SSID hiding (option D) provides no real security — SSID is transmitted in probe responses.
CISSP Mindset: Evil twin defeats WPA2-PSK. 802.1X defeats evil twin because the attacker cannot forge the RADIUS server certificate. Server cert validation must be enforced on client devices.
An attacker sends forged 802.11 deauthentication frames to continuously disconnect employees from FinTech Company X's corporate Wi-Fi. Which technology directly prevents this attack?
Deauthentication attacks exploit the fact that 802.11 management frames (deauth, disassociation) are sent in cleartext without authentication — any device can forge them. This is a DoS attack that disrupts Wi-Fi service or forces clients to reconnect (enabling handshake capture). PMF (Protected Management Frames): (1) IEEE 802.11w standard; (2) Cryptographically protects unicast management frames using keys derived from the association process; (3) Forged deauth frames from an attacker are rejected because they cannot pass the integrity check; (4) PMF is MANDATORY in WPA3; it is optional but recommended in WPA2. WPA3-SAE alone protects the authentication handshake but does not address management frame forgery unless PMF is also enabled. MAC filtering (D) is trivially bypassed and does not protect management frames.
CISSP Mindset: Deauth attack = management frame forgery. PMF = cryptographic protection of management frames. WPA3 mandates PMF; WPA2 should enable it. Know: PMF = 802.11w = management frame protection.
Before deploying wireless APs in FinTech Company X's new office floor, the network team performs a site survey. What is the PRIMARY security-relevant purpose of a wireless site survey?
A wireless site survey has multiple security purposes: (1) Rogue AP detection — identify unauthorized APs already operating in the space before deployment; (2) Signal bleed mapping — ensure the corporate Wi-Fi signal does not extend into public areas (parking lots, adjacent offices) where attackers can connect; (3) Coverage optimization — identify dead zones that could force devices to connect to rogue APs or external networks; (4) Channel interference — identify competing signals that may affect security (deauth attacks easier in congested spectrum); (5) Establish a baseline for future comparison to detect unauthorized new APs. Site surveys are both an operational and security activity.
CISSP Mindset: Site survey = pre-deployment security baseline. Key outputs: rogue AP map, signal bleed boundaries, channel plan. Signal bleed beyond the physical perimeter = unauthorized access risk.
FinTech Company X's CISO asks: "Should we deploy WPA3-Personal (SAE) or WPA3-Enterprise (802.1X) for the corporate wireless network?" What is the MOST operationally and security-appropriate recommendation?
WPA3-Personal (SAE): Still uses a shared password — all corporate employees share one password. Better than WPA2-PSK but a compromised employee device exposes the password. No per-user accountability. WPA3-Enterprise (802.1X + RADIUS): (1) Per-user/device credentials — each person has unique credentials (or certificate); (2) When an employee leaves, their access is revoked individually — no password change needed; (3) Integrates with Active Directory/LDAP for centralized IAM; (4) Audit trail — per-user authentication logs; (5) With EAP-TLS: eliminates passwords entirely. For a fintech like FinTech Company X with regulatory requirements, WPA3-Enterprise is the correct answer. WPA3-Personal is appropriate for home networks, guest networks, or small businesses without AD.
CISSP Mindset: Corporate Wi-Fi = Enterprise (802.1X). Shared password = shared risk. Per-user credentials = granular access control, revocation, and accountability.
An employee at FinTech Company X's HCMC office connects a personal Wi-Fi hotspot device to a wired Ethernet port in a conference room, creating an unauthorized wireless network. What is this called and what is the BEST technical control to prevent it?
A rogue access point is any unauthorized AP connected to the corporate network — whether malicious or well-intentioned (employee wanting better coverage). Risks: bypasses security controls, creates unmonitored wireless access, enables external attackers to reach the internal network via Wi-Fi. Prevention: 802.1X on wired switch ports — the hotspot device must authenticate before the switch port activates. Without 802.1X, the device gets blocked at the port level. Additional controls: (1) Wireless IDS scanning for unauthorized SSIDs; (2) DHCP fingerprinting to detect unexpected device types; (3) Physical port security policies; (4) Network monitoring for new MAC addresses. Employee education addresses the accidental aspect, but technical controls are required.
CISSP Mindset: Rogue APs = unauthorized network extension. 802.1X on wired ports = technical control. Wi-Fi scanning for unknown SSIDs = detection. Both prevention and detection are needed.
Which Bluetooth attack involves an attacker sending unsolicited data (files or messages) to a Bluetooth-enabled device without the owner's knowledge, potentially introducing malware?
Bluetooth attack taxonomy: (1) Bluejacking — sending unsolicited data (contacts, messages, files) to a discoverable Bluetooth device. The recipient may be tricked into accepting the data. Primarily annoying but can introduce malware if malicious files are accepted; (2) Bluesnarfing — unauthorized access to data ON the victim's device (contacts, calendar, emails) exploiting Bluetooth vulnerabilities without authentication; (3) Bluebugging — full remote control of the victim's device (calls, SMS, microphone) through Bluetooth vulnerabilities. Mitigations: Set Bluetooth to "non-discoverable" when not pairing; disable Bluetooth when not in use; never accept pairing or file transfer requests from unknown devices.
CISSP Mindset: Bluejacking = send to victim (annoyance/malware). Bluesnarfing = steal from victim (data theft). Bluebugging = control victim (full compromise). Know the distinction for the exam.
FinTech Company X's security policy ranks Wi-Fi security protocols. Rank these from MOST to LEAST secure for enterprise corporate use: WEP, WPA2-PSK, WPA2-Enterprise, WPA3-Enterprise, WPA3-Personal.
Security ranking rationale: (1) WPA3-Enterprise — 802.1X + RADIUS + 192-bit security mode (in WPA3-Enterprise 192-bit standard) + PMF mandatory + SAE or TLS-based auth = strongest; (2) WPA3-Personal — SAE handshake resists offline attacks + PMF mandatory, but still shared password = not suitable for corporate; (3) WPA2-Enterprise — 802.1X + RADIUS + per-user auth + PMF optional = strong for corporate but older protocol with more known vulnerabilities; (4) WPA2-PSK — shared password, offline dictionary attack vulnerability, no per-user accountability; (5) WEP — completely broken, attackable in minutes. WPA3-Personal ranks above WPA2-Enterprise because SAE prevents offline attacks that can threaten WPA2-Enterprise (credential stuffing on RADIUS), despite WPA2-Enterprise's per-user advantage.
CISSP Mindset: Protocol strength: WPA3 > WPA2 (same category); Enterprise > Personal (for corporate use). Combine the best of both: WPA3-Enterprise is the gold standard.
The KRACK (Key Reinstallation Attack) vulnerability in WPA2 allowed attackers to force nonce reuse in the 4-way handshake. What is the PRIMARY mitigation for KRACK, and why doesn't the risk fully justify replacing WPA2 immediately in all organizations?
KRACK (2017): Exploits the WPA2 4-way handshake to reinstall a previously used key, enabling nonce reuse that can break AES-CCMP encryption and allow decryption/injection. Mitigations: (1) Vendor patches — client-side patch prevents nonce reuse (KRACK requires the client side to be unpatched; the AP alone doesn't need to be vulnerable); (2) Why not full replacement: Even if WPA2 encryption is broken by KRACK, HTTPS/TLS protects application data at a higher layer. Attackers decrypting WPA2 traffic only see encrypted HTTPS, not plaintext loan application data. Defense in depth means higher-layer encryption limits KRACK's real impact. Full migration to WPA3 is the long-term goal but is not always immediately operationally feasible.
CISSP Mindset: KRACK = patch + higher-layer encryption as defense in depth. Perfect defense-in-depth means Wi-Fi encryption is just one layer — HTTPS protects even if Wi-Fi is broken.
FinTech Company X provides a guest Wi-Fi network "TS-Guest" in its lobby for visitors. What security controls MUST be implemented to protect the corporate network while providing guest access?
Guest Wi-Fi security requirements: (1) VLAN isolation — guest VLAN must be completely isolated from corporate VLANs; firewall rules prevent guest→corporate traffic; (2) Internet-only access — guests can reach the internet but not internal servers, databases, or printers; (3) Captive portal — collects acceptable use agreement, may require email/phone verification for basic identity; (4) Bandwidth throttling — prevents guests from consuming all available bandwidth; (5) Client isolation — prevents guests from attacking other guest devices; (6) DNS filtering — block malicious sites. Using the same network (A) completely negates VLAN security. Guest VPN (C) is unreasonable for visitors. No controls (D) ignores the risk of guest devices being used for attacks through the corporate internet connection.
CISSP Mindset: Guest Wi-Fi = separate VLAN + internet-only + client isolation. The guest network must be treated as untrusted — equivalent to internet exposure to the corporate network.
FinTech Company X is migrating from WPA2 to WPA3 but has legacy devices that only support WPA2. What is the security risk of using "WPA2/WPA3 Transition Mode" during migration?
WPA3 Transition Mode (also called Mixed Mode): Allows WPA2 and WPA3 clients on the same SSID. The AP advertises support for both. Security risk: An attacker can set up a rogue AP supporting only WPA2 with the same SSID. WPA3 clients that are in transition mode may associate with the rogue WPA2 AP, reducing their security to WPA2 levels — vulnerable to offline dictionary attacks (WPA2-PSK) or RADIUS credential attacks (WPA2-Enterprise). Mitigation: (1) Use separate SSIDs for WPA2 legacy and WPA3 clients during transition; (2) Accelerate legacy device replacement to shorten the transition window; (3) Enable PMF mandatory on the WPA3 SSID; (4) Monitor for rogue APs. Pure WPA3-only mode eliminates this risk but breaks legacy device connectivity.
CISSP Mindset: Transition modes always introduce downgrade risk. Separate SSIDs during migration > mixed mode. The migration period is a security-sensitive window requiring close monitoring.
FinTech Company X's network team is configuring IPSec for the site-to-site VPN connecting to Bank A. A key requirement is that the traffic MUST be both encrypted (confidential) AND authenticated (integrity). Which IPSec protocol satisfies BOTH requirements?
IPSec has two security protocols: (1) AH (Authentication Header) — provides integrity and authentication ONLY, NO encryption. It authenticates the entire packet including the IP header. AH is incompatible with NAT because NAT changes the IP header which breaks AH integrity checks; (2) ESP (Encapsulating Security Payload) — provides confidentiality (encryption), integrity, and authentication. ESP does NOT authenticate the outer IP header in tunnel mode. For the Bank A VPN requiring both encryption AND authentication, ESP is the correct choice. AH alone provides NO confidentiality.
CISSP Mindset: AH = Authentication only (no encryption). ESP = Encryption + Authentication. When you need both confidentiality and integrity, use ESP. AH + NAT = incompatible.
FinTech Company X uses IPSec to encrypt traffic between its headquarters and Bank A's data center (site-to-site VPN). Which IPSec mode is MOST appropriate for this use case and why?
IPSec modes: (1) Tunnel mode — the entire original IP packet (header + payload) is encrypted and encapsulated in a NEW IP packet with new gateway IP headers. This hides internal network addressing. Used for: site-to-site VPNs, remote access VPNs where VPN gateway proxies for internal hosts. (2) Transport mode — only the payload is encrypted; the original IP headers are preserved. Used for: direct host-to-host communication (e.g., between two specific servers that both run IPSec). For FinTech Company X↔Bank A site-to-site VPN, tunnel mode is correct because traffic from many internal hosts traverses the gateway.
CISSP Mindset: Tunnel mode = gateway-to-gateway = encrypts everything including original IP header. Transport mode = host-to-host = encrypts payload only. Site-to-site = tunnel mode always.
The Bank A VPN gateway must traverse a NAT device between FinTech Company X and Bank A. The security team initially configured AH for packet integrity. After deployment, the VPN fails to establish. What is the MOST LIKELY cause?
AH (Authentication Header) protects the integrity of the ENTIRE IP packet, including the IP header fields like source and destination IP. When a NAT device translates the source IP address, the IP header changes — this invalidates the AH integrity check because the receiving end computes the hash over the packet and finds it does not match the AH value. Solution: Use ESP instead of AH (ESP does not protect the outer IP header in tunnel mode), or use NAT-Traversal (NAT-T) which encapsulates IPSec packets in UDP port 4500 to traverse NAT. This is a classic IPSec/NAT incompatibility issue.
CISSP Mindset: AH + NAT = broken. AH signs the IP header; NAT modifies it. Use ESP or NAT-T when NAT is in the path. This is a common exam trap.
FinTech Company X's security policy mandates that ALL TLS connections between Platform C microservices must provide Perfect Forward Secrecy (PFS). Which TLS version and key exchange combination GUARANTEES PFS?
PFS (Perfect Forward Secrecy) ensures that compromise of the long-term private key does not compromise past session keys. TLS version differences: (1) TLS 1.0/1.1: Deprecated; vulnerable to BEAST, POODLE; RSA key exchange (no PFS) is common; (2) TLS 1.2: PFS is OPTIONAL — cipher suites with RSA key exchange (no PFS) are still supported alongside DHE/ECDHE (PFS); (3) TLS 1.3: PFS is MANDATORY — RSA key exchange is completely removed; only ECDHE (and DHE) are supported. For FinTech Company X's Platform C microservices, TLS 1.3 guarantees PFS without configuration risk.
CISSP Mindset: TLS 1.3 = PFS mandatory (RSA key exchange removed). TLS 1.2 = PFS optional (depends on cipher suite). If policy requires PFS, TLS 1.3 is the only guaranteed answer.
FinTech Company X's Platform C platform uses mTLS (mutual TLS) between its microservices. How does mTLS differ from standard TLS, and why is it important for microservice security?
Standard TLS: Server presents a certificate to prove its identity to the client. The client is not authenticated by certificate (may use username/password instead). mTLS (mutual TLS): BOTH parties present X.509 certificates. The server verifies the client certificate, and the client verifies the server certificate. For FinTech Company X's Platform C microservices, mTLS ensures that only authorized microservices with valid certificates can communicate — preventing rogue services or lateral movement by attackers who have compromised network access. This is the zero-trust network principle: "never trust, always verify" regardless of network location.
CISSP Mindset: mTLS = zero-trust for services. Both sides prove identity. Standard TLS = server-only authentication. mTLS prevents unauthorized service-to-service calls.
An attacker intercepts HTTP traffic from a user before it reaches FinTech Company X's Platform C portal and prevents the HTTPS redirect, keeping the session unencrypted. What is this attack called and what is the PRIMARY technical control that defeats it?
SSL stripping (invented by Moxie Marlinspike): The attacker positions themselves between the user and the server. When the user requests http://, the attacker maintains an HTTPS connection to the server but downgrades the user's connection to HTTP. The user sees no lock icon but may not notice. HSTS (HTTP Strict Transport Security): The server sends the header "Strict-Transport-Security: max-age=31536000; includeSubDomains" telling browsers to ALWAYS use HTTPS for this domain for the specified period — stored in the browser. The browser will refuse HTTP connections to HSTS-enabled sites, defeating SSL stripping. HSTS preloading adds the domain to browser-built-in lists.
CISSP Mindset: SSL stripping = MITM downgrade to HTTP. HSTS = browser policy preventing HTTP. HSTS must be delivered over HTTPS first — the first visit is still vulnerable (TOFU problem), solved by HSTS preloading.
FinTech Company X allows employees to use VPN for remote access. The security team is debating whether to enable or disable split tunneling. What is the PRIMARY security risk of enabling split tunneling?
Split tunneling sends only corporate-bound traffic through the VPN; internet traffic (YouTube, banking, etc.) goes directly to the internet without VPN. Security risk: If the employee's device is compromised by malware, the attacker has a foothold on a device with simultaneous access to both the internet (for C2 communication) and the corporate network (through the active VPN tunnel). This creates a bridge. Without split tunneling (full tunnel), all traffic goes through the corporate VPN where security controls (proxy, NGFW, DLP) can inspect it. Trade-off: Full tunnel increases corporate bandwidth usage and latency.
CISSP Mindset: Split tunneling = operational convenience vs. security risk. A compromised endpoint with split tunneling = attacker has a pivot point into the corporate network. Disable split tunneling when security is paramount.
FinTech Company X's compliance team asks: "Why does TLS 1.3 provide better security than TLS 1.2 for Platform C's external API?" Which answer BEST explains the key improvements?
TLS 1.3 key improvements over TLS 1.2: (1) Removes weak/broken cipher suites: RC4, 3DES, MD5, SHA-1, export-grade ciphers, RSA key exchange all removed; (2) Mandates PFS: Only ECDHE (and DHE) key exchange — static RSA removed; (3) Improved handshake: 1-RTT (vs. 2-RTT in TLS 1.2) reduces connection latency; (4) 0-RTT session resumption for returning clients (with replay attack risk if not handled carefully); (5) Encrypted handshake: More of the handshake is encrypted vs. TLS 1.2. Key length (e.g., 2048 vs 4096) is a separate configuration from TLS version and not the defining difference.
CISSP Mindset: TLS 1.3 = cleaner, faster, more secure. The key exam points: removed RSA key exchange (PFS mandatory), removed weak ciphers, 1-RTT handshake. Know these for the exam.
FinTech Company X's Partner D (Platform C for Business) platform uses HMAC-based API authentication for B2B partners. A partner claims their request was rejected due to authentication failure despite having the correct API key. Which scenario would MOST LIKELY cause this?
HMAC-based API authentication typically includes a timestamp in the signed message to prevent replay attacks (an attacker capturing a valid request cannot replay it after the time window expires). If the partner server's clock is skewed beyond the tolerance window (commonly 5 minutes), the signature will be rejected even if the HMAC key is correct — because the timestamp makes the signature appear too old or from the future. Solution: Ensure NTP synchronization on both client and server. This is a common operational issue for HMAC-based B2B APIs like FinTech Company X's Partner D integrations.
CISSP Mindset: HMAC with timestamp = replay protection. Clock skew = HMAC failure. NTP synchronization is a security dependency for timestamp-based authentication. Know the operational implications.
FinTech Company X must choose between an IPSec VPN and an SSL/TLS VPN for remote employee access. Which statement BEST represents the operational security trade-off?
Trade-offs: IPSec VPN: (1) Layer 3 — encrypts all IP traffic (not just web); (2) Requires a VPN client installed on the device; (3) Full network access (all protocols); (4) Compatible with NAT-Traversal (NAT-T); (5) Better for site-to-site or full corporate access. SSL/TLS VPN (clientless): (1) Layer 7 — can run in a browser; (2) Works easily through firewalls (port 443 is usually open); (3) Often provides application-specific access (not full network); (4) Better for remote/BYOD access when installing clients is impractical. Both can be equally secure when properly configured.
CISSP Mindset: IPSec = full network Layer 3 tunnel. SSL VPN = Layer 7 browser-accessible. The "best" choice depends on the use case: IPSec for site-to-site; SSL VPN for flexible remote access.
Q81–Q100 Network Attacks & Mitigations
FinTech Company X's Partner C API server is experiencing a SYN flood attack. How do SYN cookies mitigate this attack without storing half-open connections?
SYN flood exploits TCP's half-open connection state: the server allocates memory for each SYN but spoofed SYNs never complete — exhausting the connection table. SYN cookies: (1) When SYN is received, the server encodes a cryptographic hash of (client IP, client port, server IP, server port, timestamp, secret) into the ISN of the SYN-ACK — no memory allocated yet; (2) If the client is legitimate, it returns a valid ACK; (3) Server verifies the ACK by recomputing the hash — if valid, THEN allocates a connection entry; (4) Spoofed SYNs never generate valid ACKs — no memory consumed. CloudFlare uses SYN cookies for Partner C traffic protection at the edge.
CISSP Mindset: SYN cookies = stateless SYN-ACK. Memory allocated ONLY after valid ACK. The connection table cannot be exhausted by spoofed SYNs.
An attacker inside FinTech Company X's office network sends gratuitous ARP replies to associate the default gateway's IP with their own MAC address. What switch-level control DIRECTLY prevents this?
ARP has no authentication — any device can claim any IP-to-MAC mapping. DAI: (1) Works with DHCP snooping — maintains a binding table {IP, MAC, VLAN, switch port}; (2) Intercepts all ARP packets on untrusted switch ports; (3) Validates: does the ARP sender IP+MAC match the binding table? (4) Invalid ARP replies are dropped at the switch. Port security (A) limits MAC count per port but does not validate IP-to-MAC bindings. Static ARP (D) is operationally impractical at scale. DAI + DHCP snooping + IP Source Guard provides defense in depth against Layer 2 attacks. Enable DAI on all untrusted ports; trunk/uplink ports are trusted.
CISSP Mindset: ARP poisoning = Layer 2 MITM. DAI = Layer 2 control. Must be paired with DHCP snooping (provides the binding table). Enable on all access ports.
An attacker exploits 802.1Q double-encapsulation to send frames into a restricted VLAN at FinTech Company X. Which switch hardening steps BEST prevent VLAN hopping?
VLAN hopping via double-encapsulation: An attacker tags a frame with two 802.1Q headers. The switch strips the outer tag (native VLAN) and forwards the inner-tagged frame to the target VLAN. This only works when the attacker is on a port in the native VLAN. Mitigations: (1) Change native VLAN to an unused VLAN ID (not VLAN 1, not any user VLAN) — double-tagged frames for VLAN X only work from the native VLAN; (2) Disable DTP (Dynamic Trunking Protocol) on access ports — prevents negotiated trunk links from attacker ports; (3) Explicitly set all ports to access or trunk mode — never "auto" or "desirable"; (4) Prune allowed VLANs on trunk ports to only necessary VLANs. VLAN hopping via switch spoofing (DTP) is a separate sub-technique requiring DTP disablement.
CISSP Mindset: VLAN hopping = two sub-techniques: double-tagging (fix: change native VLAN) + switch spoofing via DTP (fix: disable DTP). Both require Layer 2 switch hardening.
FinTech Company X's Platform C platform experiences a volumetric DDoS attack generating 500 Gbps of traffic targeting its internet uplink. The origin server's 10 Gbps link is overwhelmed. Which mitigation strategy is MOST effective for volumetric attacks at this scale?
Volumetric DDoS at 500 Gbps overwhelms any on-premises hardware. The only effective mitigation is upstream absorption: (1) Cloud DDoS scrubbing (CloudFlare, Akamai, AWS Shield Advanced): Traffic is routed through the CDN's anycast network; the CDN's aggregate capacity (100+ Tbps in CloudFlare's case) absorbs the attack; scrubbing removes attack traffic and forwards only clean traffic to origin; (2) Anycast routing: The DDoS traffic is distributed across hundreds of PoPs globally — no single PoP is overwhelmed. FinTech Company X uses CloudFlare for Partner C, providing this protection. An IPS (A) cannot handle volumetric traffic overwhelming the uplink — it's inline and would be overwhelmed too. Upgrading the link (C) is never fast enough for DDoS. Geofencing (D) does not stop DDoS from within unblocked geographies.
CISSP Mindset: Volumetric DDoS = upstream absorption. On-premises controls fail when the uplink is saturated. Cloud scrubbing + anycast is the only viable defense at scale.
FinTech Company X learns that a BGP hijacking incident diverted traffic destined for its API endpoints through a foreign AS. Which long-term control BEST prevents BGP origin hijacking?
BGP hijacking: A rogue AS announces a more specific or equal-length prefix for FinTech Company X's IP space — BGP's best-path selection diverts traffic to the rogue AS. RPKI (Resource Public Key Infrastructure): (1) The IP prefix owner creates a ROA (Route Origin Authorization) — a signed certificate stating "AS XXXXX is authorized to originate prefix a.b.c.d/24"; (2) Routers with RPKI validation reject BGP announcements from ASNs not listed in the ROA; (3) ROAs are published in a globally distributed RPKI repository; (4) This provides cryptographic proof of prefix ownership. BGP-SEC (path validation) extends RPKI to validate the full AS path. IPSec on BGP sessions (A) prevents BGP session tampering but not prefix hijacking from rogue ASes. DNSSEC (C) protects DNS records, not BGP routing.
CISSP Mindset: BGP hijacking = routing layer threat. RPKI = cryptographic solution for BGP route origin validation. RPKI ROAs bind prefixes to ASNs. Without RPKI, any AS can announce any prefix.
A FinTech Company X employee uses a coffee shop Wi-Fi to access the Platform C portal. An attacker performs SSL stripping, maintaining HTTPS with Platform C's servers but serving HTTP to the employee. The employee's browser shows no padlock. What would have PREVENTED the employee's connection from being stripped to HTTP?
SSL stripping: The attacker is a MITM at the network layer (coffee shop Wi-Fi). The attacker communicates with Platform C via HTTPS but serves HTTP to the employee — the employee never receives an HTTPS redirect. Certificate trust (A) is irrelevant because the attacker never presents a certificate to the employee — the employee never triggers a TLS handshake. TLS 1.3 (C) doesn't help if the connection is downgraded to HTTP before TLS starts. HSTS solution: The browser has stored (from a previous HTTPS visit) or preloaded the HSTS policy for aula.company-x.com. When the attacker serves HTTP, the browser checks its HSTS store — finding the policy, it REFUSES to proceed over HTTP and generates an error. The employee cannot be tricked into accepting the HTTP connection.
CISSP Mindset: SSL stripping defeats HTTPS redirects. HSTS defeats SSL stripping. HSTS preloading defeats it for first-time visitors too. This is the definitive MITM prevention for web protocols.
An attacker on FinTech Company X's internal network attempts a MITM attack between the Platform C loan scoring service and the credit bureau service. Both services use mTLS. Why does mTLS SPECIFICALLY defeat this MITM attempt?
Standard TLS MITM: An attacker with a fraudulent (but CA-signed) certificate can impersonate the server. mTLS MITM: The attacker must also impersonate the CLIENT to the server. To do so, they need the Platform C service's client certificate AND private key. The private key never leaves the Platform C service's secure key store. Without the private key, the attacker cannot complete the mTLS handshake with the credit bureau service. The attack fails because: (1) Platform C → Attacker: Attacker cannot present Platform C's client certificate (no private key); (2) Even if the attacker positions themselves in the middle, they cannot authenticate as Platform C to the credit bureau. mTLS zero-trust principle: both sides must authenticate — compromising network position alone is insufficient.
CISSP Mindset: mTLS defeats MITM because the attacker cannot forge the client identity. The private key never leaves the service. This is the zero-trust architecture principle in action.
A Smurf attack sends ICMP echo requests with a spoofed source IP (FinTech Company X's IP) to a broadcast address. All hosts on the amplifier network reply to FinTech Company X, flooding it. Which mitigation at the amplifier network level prevents Smurf amplification?
Smurf attack mechanism: Attacker sends ICMP echo-request to a subnet's directed broadcast address (e.g., 192.168.1.255) with spoofed source IP = victim IP. Every host on that subnet sends an ICMP echo-reply to the victim. Amplification factor = number of hosts on the subnet. Mitigation at amplifier networks: Disable IP directed broadcast on all router interfaces (Cisco: "no ip directed-broadcast"). This is now the default on modern routers (RFC 2644) but older routers may still have it enabled. Additional mitigation: BCP38 ingress filtering at ISPs prevents IP spoofing from originating. Smurf is largely a historical threat due to RFC 2644 adoption, but relevant for legacy network assessments.
CISSP Mindset: Smurf = ICMP amplification via directed broadcast. Fix at amplifier: disable directed broadcast. Fix at origin: BCP38 ingress filtering. Fix at victim: CloudFlare/scrubbing.
During a penetration test of FinTech Company X, the assessor performs a SYN scan (half-open scan) against the Platform C server. Why is a SYN scan more stealthy than a full TCP connect scan?
TCP connect scan: Completes the full three-way handshake (SYN → SYN-ACK → ACK → data → FIN). The connection appears in application logs as a completed connection. Requires no special privileges. SYN scan (half-open): Sends SYN. If SYN-ACK received (port open): sends RST immediately — never completes the handshake. The application server typically only logs fully established connections — the RST prevents the connection from being recorded in many application logs (though IDS and firewall logs will still capture SYN packets). Requires raw socket privileges (root/admin). Stealth benefit: reduced connection log artifacts. Modern IDS systems (Snort, Suricata) detect SYN scans via rate analysis, so "stealthy" is relative. FinTech Company X's NGFW and IPS should detect SYN scan patterns.
CISSP Mindset: SYN scan = half-open = stealthier than full connect but still detectable by network IDS. Rate-based detection catches SYN scans. Application-layer stealth ≠ network-layer stealth.
An attacker sends fragmented IP packets to FinTech Company X's Platform C server such that the fragments reassemble into a malicious payload that bypasses stateless packet filtering rules. What type of attack is this and what control defeats it?
IP fragmentation attacks: Large IP packets can be split into fragments (each fragment is a separate IP packet with an offset). Stateless firewalls inspect each fragment independently — a firewall rule blocking port 80 may pass a payload split across fragments that reassemble to port 80 content. Teardrop attack: Overlapping fragments with incorrect offsets crash fragmentation reassembly. Stateful firewalls and NGFW: Reassemble all fragments before applying security rules — the complete, reassembled packet is inspected. This defeats fragmentation-based evasion. Additional controls: rate-limit or block IP fragments on internet-facing interfaces (most legitimate traffic should not be fragmented with proper MTU settings). MTU Path Discovery should be enabled to prevent fragmentation at the network layer.
CISSP Mindset: Fragmentation attacks exploit stateless inspection. Stateful firewall reassembles before inspecting = defeats fragmentation evasion. This is a key difference between stateless and stateful firewalls.
FinTech Company X's CloudFlare WAF is blocking a legitimate partner API request from Bank A, generating a false positive. What is the BEST operational approach to resolve this while maintaining security?
WAF false positive management — operational security balance: (1) Disabling the rule globally (A) removes protection for all traffic — fixes one false positive but creates a vulnerability for all other requests; (2) Scoped exception (B): Whitelist only Bank A's known source IP ranges for the specific API path — the rule remains active for all other sources and paths. Review the exception periodically to ensure Bank A's IPs haven't changed; (3) Moving to HTTP (C) is unacceptable — removes all encryption and WAF inspection; (4) Global whitelist (D) defeats the purpose of having a WAF. Exception management best practice: document the business justification, scope minimally (specific IPs + specific paths), set expiry or review dates, alert if the excepted IP range changes.
CISSP Mindset: WAF false positives = tune exceptions with minimum scope, not disable rules globally. Security vs. availability requires surgical precision, not blunt workarounds.
An attacker sends a FinTech Company X employee a link to the Platform C portal that pre-sets a known session ID. If the employee logs in using that link, what attack has succeeded and what is the mitigation?
Session fixation: The attacker establishes a session with the target site (e.g., gets a session ID: ABC123), then tricks the victim into authenticating using that pre-set session ID (via a crafted URL or cookie). After authentication, the session ABC123 is now an authenticated session — the attacker, who already knows ABC123, has a valid authenticated session without knowing credentials. Mitigation: After successful authentication, the server MUST generate a NEW session ID and invalidate the old one. The attacker's known ABC123 is discarded; the new session ID (unknown to the attacker) is assigned. This is required in OWASP Top 10 session management guidelines and relevant to FinTech Company X's Platform C loan application portal security.
CISSP Mindset: Session fixation = attacker controls pre-auth session ID. Mitigation = regenerate session ID at authentication. Non-regeneration = fixation vulnerability. This is an Platform C webapp security requirement.
A threat actor captures a valid API request from a Bank A partner to FinTech Company X's Partner D platform and replays it 100 times, each time submitting the same loan data. What mechanisms BEST prevent replay attacks on the Partner D HMAC API?
TLS (A) protects requests in transit but does not prevent replay of a captured legitimate request that was valid over TLS. Replay attacks occur when a legitimate request is captured and retransmitted. Defense: (1) Timestamp: Include the current timestamp in the HMAC message. The server rejects requests with timestamps older than N minutes (e.g., 5 minutes) — limits replay window; (2) Nonce: A unique random value included in each request and signed in the HMAC. The server stores received nonces in a cache for the time window. If the same nonce appears twice within the window, the second is rejected as a replay. Together: timestamp limits the window; nonce prevents ANY replay within that window. This is FinTech Company X Partner D's B2B API security pattern. The nonce cache must be distributed/shared if Partner D runs multiple instances.
CISSP Mindset: Replay prevention = timestamp (limits window) + nonce (prevents any replay within window). TLS alone does not prevent replays of captured legitimate requests. Both mechanisms are needed.
FinTech Company X's internet traffic shows a high volume of packets with source IPs from RFC 1918 private address space (10.x.x.x, 192.168.x.x) arriving from the internet. What does this indicate and what is the correct mitigation?
RFC 1918 private addresses (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) are not routed on the public internet. Receiving packets from the internet with private source IPs indicates IP spoofing — someone is forging source addresses. These are typically part of DDoS attacks, reconnaissance, or amplification attacks. Ingress filtering (BCP38 / RFC 2827): Block inbound packets at the internet perimeter with source IPs that are: RFC 1918 private ranges; loopback (127.0.0.0/8); link-local (169.254.0.0/16); TEST-NET; multicast (224.0.0.0/4). Also implement egress filtering: block outbound packets with source IPs NOT belonging to FinTech Company X's allocated ranges — prevents FinTech Company X from being an unwitting spoofing source for attacks on others.
CISSP Mindset: Private IPs from internet = spoofed. BCP38 ingress filtering = drop impossible source IPs. Both ingress AND egress filtering are best practice. This is an ISP-level and enterprise-level responsibility.
FinTech Company X's Platform C web server is being hit by a Slowloris attack — the attacker holds HTTP connections open by sending partial request headers slowly, exhausting the server's connection limit. What is the MOST effective mitigation?
Slowloris: Layer 7 DoS — attacker opens many HTTP connections and sends headers very slowly (a few bytes every ~15 seconds), preventing the server from completing the HTTP request and timing out the connection. The server holds thousands of sockets open waiting for the complete request, eventually exhausting its connection limit. Mitigations: (1) Web server timeouts: Set short timeouts for incomplete HTTP headers (Apache: RequestReadTimeout; Nginx handles this by default); (2) Minimum data rate: close connections below a minimum bytes/second threshold; (3) Reverse proxy/CDN (CloudFlare): The CDN handles slow client connections and only forwards complete requests to the origin — the origin never sees slow clients; (4) Connection limiting per IP. SYN cookies (C) protect Layer 4 — Slowloris is a Layer 7 attack where the TCP connection is fully established.
CISSP Mindset: Slowloris = Layer 7 resource exhaustion. Timeouts + rate limits at the web server level. CDN/reverse proxy offloads slow clients from the origin. SYN cookies protect Layer 4, not Layer 7.
FinTech Company X's security architect proposes micro-segmentation for the Platform C microservices network. What is the PRIMARY security benefit of micro-segmentation over traditional perimeter-only security?
Traditional perimeter security: "Hard outside, soft inside" — once an attacker breaches the perimeter, they can often move freely between internal systems. Micro-segmentation: (1) Applies zero-trust principles inside the network — "never trust, always verify" even for east-west internal traffic; (2) Granular firewall policies between individual workloads/microservices; (3) Limits lateral movement — a compromised Platform C loan scoring service cannot communicate with the payment service unless explicitly permitted; (4) Implemented via software-defined networking (SDN), service mesh (Istio), or host-based firewalls. Combining mTLS (for authentication) with micro-segmentation (for network access control) creates a layered defense that FinTech Company X's Platform C microservices benefit from. This is the foundation of zero-trust network architecture (ZTNA).
CISSP Mindset: Micro-segmentation = zero-trust internal networking. Perimeter is just the first line; micro-segmentation limits damage when the perimeter is breached. Lateral movement containment = resilience.
Which of the following BEST describes the difference between a Ping of Death attack and a Teardrop attack, and are modern systems still vulnerable to them?
Ping of Death: Sends ICMP echo-request packets exceeding the 65,535-byte maximum IP packet size. When fragments are reassembled, the oversized packet causes a buffer overflow, crashing or freezing the target. Teardrop: Sends IP fragments with overlapping fragment offsets (e.g., fragment 2 starts at byte 0 instead of byte 1481). When the OS tries to reassemble overlapping fragments, the reassembly logic crashes. Both attacks target IP fragmentation reassembly vulnerabilities in the OS kernel. Modern status: Both have been patched in modern operating systems since the late 1990s/early 2000s. They are largely historical but may still affect: (1) Unpatched legacy embedded systems; (2) IoT devices with minimal OS stacks; (3) Some network appliances with older firmware. Relevant for legacy environment assessments.
CISSP Mindset: Historical attacks (Ping of Death, Teardrop) test IP fragmentation reassembly. Patched in modern OS. Still relevant for legacy/embedded systems and IoT. Know they are "largely historical."
FinTech Company X's CISO proposes moving to a Zero Trust Network Architecture (ZTNA) for Platform C microservices. Which combination of controls BEST embodies the core "never trust, always verify" principle for east-west (internal) microservice traffic?
Zero Trust for microservices requires multiple complementary controls: (1) mTLS — every service authenticates its peer; no service trusts another based on network location alone; (2) Micro-segmentation — network policy explicitly permits only necessary service-to-service communication paths; deny-all default with explicit allow rules; (3) Service mesh (Istio/Linkerd) — provides mTLS certificate lifecycle management, per-request authorization policies (RBAC based on service identity), observability (metrics, traces, logs); (4) Continuous monitoring — anomaly detection to catch unexpected communication patterns even within permitted paths. The traditional VPN + perimeter model (A) assumes internal network is trusted — ZTNA explicitly rejects this assumption. VLAN + ACLs (C) is coarse-grained and static; cannot verify identity. IPSec (D) provides encryption but not per-service identity verification.
CISSP Mindset: ZTNA = identity-based access regardless of network location. For microservices: mTLS (who are you?) + micro-segmentation (what can you access?) + service mesh (enforce + observe) = complete ZTNA.
A threat actor drives around FinTech Company X's office district collecting Wi-Fi SSID information, signal strengths, security protocols (WPA2/WPA3), and GPS coordinates. What is this activity called, and what information does it NOT reveal?
War driving: Driving while using a wireless adapter in monitor mode to passively collect 802.11 beacon frames. Tools: Kismet, airodump-ng. Information collected: (1) SSID (network name); (2) BSSID (AP MAC address — manufacturer identifiable); (3) Security protocol (Open, WEP, WPA2-PSK, WPA3); (4) Signal strength (RSSI); (5) GPS coordinates (mapping databases like WiGLE.net); (6) Channel. Information NOT revealed: Network traffic content, passwords, internal IP addressing, or user data (all encrypted if WPA2/WPA3 is used). Relevance: War driving reveals attack surface — Open networks are immediate targets; WEP networks are trivially attacked; WPA2-PSK networks can be attacked if handshakes are captured. FinTech Company X's war driving defense: WPA3-Enterprise + non-revealing SSID naming (not "TS-Corporate-Confidential").
CISSP Mindset: War driving = passive reconnaissance (metadata only). Strong wireless security (WPA3-Enterprise) means war driving reveals only protocol info, not content. Reduce information exposure by not revealing network purpose in SSID names.
FinTech Company X's CISO is presenting a holistic network security strategy to the board. Which single statement BEST captures the CISSP managerial mindset for network security at a fintech like FinTech Company X?
The CISSP managerial mindset synthesizes all Domain 4 concepts: (1) No single control is sufficient — defense in depth across all OSI layers (Layer 1 physical security → Layer 7 WAF/application controls); (2) Risk management: controls must be proportionate to business risk — FinTech Company X's financial data warrants strong controls; (3) CIA Triad balance: security cannot compromise availability (fintech loans need 24/7 uptime); (4) Operational practicality: mTLS + WPA3-Enterprise + CloudFlare WAF + DMARC p=reject + IPSec VPN is the operationally viable combination FinTech Company X uses; (5) Assume breach: even with all controls, have monitoring (SIEM), detection (IDS/IPS), and response (IR playbooks); (6) Compliance as a floor, not a ceiling: PCI-DSS, MAS TRM, and PDPA are minimum requirements — FinTech Company X should exceed them. This integrates all topics: OSI layers, firewalls, VPN, wireless, email security, and attack mitigations.
CISSP Mindset: The ISC2 exam always favors the managerial, risk-based, defense-in-depth answer. Security is never absolute — it is always a risk trade-off. Balance CIA with operational reality. This is the overarching principle of all 100 questions.
Quiz Complete!
You have completed all 100 Domain 4 practice questions covering OSI Model, Network Devices, VPN & TLS, Wireless Security, Email & DNS Security, and Network Attacks.