Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
Categories
- Not categorized 0%
Unlock Your Full Report
You missed {missed_count} questions. Enter your email to see exactly which ones you got wrong and read the detailed explanations.
Submit to instantly unlock detailed explanations for every question.
Success! Your results are now unlocked. You can see the correct answers and detailed explanations below.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
The risk committee at a payment services provider is debating standards for Defense in Depth Strategy as part of risk appetite review. The central issue is that while the organization has implemented robust perimeter firewalls and encrypted VPNs for remote access, recent internal audit findings suggest that lateral movement within the internal network remains a significant risk. The Chief Information Security Officer (CISO) proposes a strategy that integrates controls across multiple layers of the TCP/IP stack to ensure that a breach at the network access layer does not automatically compromise the application layer. Which of the following audit procedures would most effectively evaluate the effectiveness of the organization’s Defense in Depth strategy regarding internal network segmentation?
Correct
Correct: Reviewing VLAN and internal firewall configurations directly addresses the risk of lateral movement by ensuring that even if one segment (such as the web tier) is compromised, the attacker cannot easily access more sensitive areas (such as the database tier). This demonstrates a layered approach at the network and transport layers of the TCP/IP suite, which is a core component of a Defense in Depth strategy.
Incorrect: Updating external firewall firmware is a maintenance task for a perimeter control but does not address internal lateral movement once the perimeter is breached. Security awareness training is an administrative control that helps prevent initial entry but does not provide the technical network-level defense in depth required to stop an active intruder. Failover testing relates to availability and disaster recovery rather than the structural security layers designed to impede an intruder’s progress through the network.
Takeaway: A robust Defense in Depth strategy requires overlapping technical controls across different network layers to prevent a single point of failure from compromising the entire system.
Incorrect
Correct: Reviewing VLAN and internal firewall configurations directly addresses the risk of lateral movement by ensuring that even if one segment (such as the web tier) is compromised, the attacker cannot easily access more sensitive areas (such as the database tier). This demonstrates a layered approach at the network and transport layers of the TCP/IP suite, which is a core component of a Defense in Depth strategy.
Incorrect: Updating external firewall firmware is a maintenance task for a perimeter control but does not address internal lateral movement once the perimeter is breached. Security awareness training is an administrative control that helps prevent initial entry but does not provide the technical network-level defense in depth required to stop an active intruder. Failover testing relates to availability and disaster recovery rather than the structural security layers designed to impede an intruder’s progress through the network.
Takeaway: A robust Defense in Depth strategy requires overlapping technical controls across different network layers to prevent a single point of failure from compromising the entire system.
-
Question 2 of 10
2. Question
Which consideration is most important when selecting an approach to Private VLANs? An internal auditor is evaluating the network security architecture of a multi-tenant data center where the organization has implemented Private VLANs (PVLANs) to provide Layer 2 isolation between different client servers while sharing a single IP subnet. During the review of the switch configurations, the auditor must determine if the current implementation effectively mitigates the risk of unauthorized lateral movement between hosts within the same broadcast domain.
Correct
Correct: Private VLANs function by associating a primary VLAN with one or more secondary VLANs (isolated or community). The primary VLAN facilitates communication from the promiscuous port to all other ports, while the secondary VLANs define the specific isolation rules. Ensuring the correct mapping is the most critical factor because it dictates whether hosts can communicate with each other (community) or are completely blocked from peer communication (isolated), which is the core objective of the security control.
Incorrect: Configuring DHCP relay agents on every isolated port is unnecessary and technically incorrect, as PVLANs typically operate within a single subnet where the relay agent resides at the Layer 3 boundary (SVI). Restricting community ports from reaching the promiscuous port would break network connectivity, as the promiscuous port is usually the gateway to the rest of the network. Using classful addressing is an obsolete networking practice that does not enhance the security or functionality of Layer 2 PVLAN segmentation.
Takeaway: The effectiveness of Private VLANs as a security control depends on the accurate configuration of primary-to-secondary VLAN mappings to enforce host isolation within a shared subnet.
Incorrect
Correct: Private VLANs function by associating a primary VLAN with one or more secondary VLANs (isolated or community). The primary VLAN facilitates communication from the promiscuous port to all other ports, while the secondary VLANs define the specific isolation rules. Ensuring the correct mapping is the most critical factor because it dictates whether hosts can communicate with each other (community) or are completely blocked from peer communication (isolated), which is the core objective of the security control.
Incorrect: Configuring DHCP relay agents on every isolated port is unnecessary and technically incorrect, as PVLANs typically operate within a single subnet where the relay agent resides at the Layer 3 boundary (SVI). Restricting community ports from reaching the promiscuous port would break network connectivity, as the promiscuous port is usually the gateway to the rest of the network. Using classful addressing is an obsolete networking practice that does not enhance the security or functionality of Layer 2 PVLAN segmentation.
Takeaway: The effectiveness of Private VLANs as a security control depends on the accurate configuration of primary-to-secondary VLAN mappings to enforce host isolation within a shared subnet.
-
Question 3 of 10
3. Question
How should BGP Route Reflectors and Confederation be correctly understood for NET Achievement Measurement 2E (AM2E)? An internal auditor is reviewing the network architecture of a global financial institution that has recently transitioned from a full-mesh iBGP topology to a hybrid model using Route Reflectors and Confederations to manage its growing Autonomous System (AS). During the risk assessment, the auditor identifies that several clusters have been established without redundant Route Reflectors. Which of the following best describes the primary control risk associated with this architectural choice and the fundamental difference between these two scaling mechanisms?
Correct
Correct: In a Route Reflector (RR) environment, if a cluster has only one RR and it fails, all clients in that cluster lose their BGP routes, leading to routing isolation. Technically, RRs solve the iBGP full-mesh requirement by selectively relaxing the split-horizon rule, which normally prevents an iBGP router from re-advertising a route learned from one iBGP peer to another. Confederations scale the network by breaking a large AS into smaller sub-ASs, where eBGP-like rules apply between the sub-ASs, effectively reducing the number of required iBGP sessions.
Incorrect: The suggestion that Confederations rely on MED for loop prevention is incorrect; they use AS_PATH segments (AS_CONFED_SEQUENCE) to prevent loops. The claim that Route Reflectors require physical connectivity is a misconception, as BGP peering is a logical Layer 4 connection. Finally, Route Reflectors do not masquerade AS numbers; while a Confederation appears as a single AS to the outside world, the risk of internal topology exposure is not the primary concern addressed by these specific scaling mechanisms.
Takeaway: Route Reflectors and Confederations are essential BGP scaling tools that must be implemented with redundancy to avoid single points of failure while managing the iBGP split-horizon rule and AS partitioning respectively.
Incorrect
Correct: In a Route Reflector (RR) environment, if a cluster has only one RR and it fails, all clients in that cluster lose their BGP routes, leading to routing isolation. Technically, RRs solve the iBGP full-mesh requirement by selectively relaxing the split-horizon rule, which normally prevents an iBGP router from re-advertising a route learned from one iBGP peer to another. Confederations scale the network by breaking a large AS into smaller sub-ASs, where eBGP-like rules apply between the sub-ASs, effectively reducing the number of required iBGP sessions.
Incorrect: The suggestion that Confederations rely on MED for loop prevention is incorrect; they use AS_PATH segments (AS_CONFED_SEQUENCE) to prevent loops. The claim that Route Reflectors require physical connectivity is a misconception, as BGP peering is a logical Layer 4 connection. Finally, Route Reflectors do not masquerade AS numbers; while a Confederation appears as a single AS to the outside world, the risk of internal topology exposure is not the primary concern addressed by these specific scaling mechanisms.
Takeaway: Route Reflectors and Confederations are essential BGP scaling tools that must be implemented with redundancy to avoid single points of failure while managing the iBGP split-horizon rule and AS partitioning respectively.
-
Question 4 of 10
4. Question
Senior management at a fintech lender requests your input on Wireless Intrusion Detection and Prevention as part of onboarding. Their briefing note explains that during a recent quarterly security audit, several unauthorized access points were discovered broadcasting a duplicate corporate SSID to perform ‘Evil Twin’ attacks. To enhance the organization’s defensive posture, the internal audit team is reviewing the technical controls used by the Wireless Intrusion Prevention System (WIPS) to mitigate these threats. Which mechanism is most effective for a WIPS to actively prevent client devices from maintaining a connection with a detected rogue access point?
Correct
Correct: The most common and effective method for active containment in a WIPS is the use of 802.11 deauthentication frames. These are management frames defined in the Layer 2 protocol that instruct the client and the access point to terminate their current association. By continuously sending these frames, the WIPS prevents the client from successfully communicating through the rogue device.
Incorrect: Updating DHCP exclusion lists is ineffective because a rogue access point may use static IP addressing or provide its own DHCP services, bypassing the corporate server entirely. DNS sinkholing is a Layer 7/Application layer control that requires the client to already be connected and using specific DNS servers; it does not prevent the initial wireless connection. Increasing signal strength to cause interference is not a standard security practice, is technically unreliable, and would likely cause performance degradation for legitimate users on the network.
Takeaway: Wireless Intrusion Prevention Systems (WIPS) primarily utilize Layer 2 deauthentication frames to actively disrupt and contain unauthorized wireless connections to rogue access points.
Incorrect
Correct: The most common and effective method for active containment in a WIPS is the use of 802.11 deauthentication frames. These are management frames defined in the Layer 2 protocol that instruct the client and the access point to terminate their current association. By continuously sending these frames, the WIPS prevents the client from successfully communicating through the rogue device.
Incorrect: Updating DHCP exclusion lists is ineffective because a rogue access point may use static IP addressing or provide its own DHCP services, bypassing the corporate server entirely. DNS sinkholing is a Layer 7/Application layer control that requires the client to already be connected and using specific DNS servers; it does not prevent the initial wireless connection. Increasing signal strength to cause interference is not a standard security practice, is technically unreliable, and would likely cause performance degradation for legitimate users on the network.
Takeaway: Wireless Intrusion Prevention Systems (WIPS) primarily utilize Layer 2 deauthentication frames to actively disrupt and contain unauthorized wireless connections to rogue access points.
-
Question 5 of 10
5. Question
Which preventive measure is most critical when handling RF Interference and Mitigation? During an operational audit of a logistics firm’s wireless network, an internal auditor notes that handheld scanners frequently lose connection in the warehouse. The auditor is evaluating the controls intended to maintain signal integrity in an environment with significant metal shelving and competing electronic devices.
Correct
Correct: A physical site survey is a fundamental preventive control that identifies environmental obstacles and sources of electromagnetic interference. By establishing a frequency plan that utilizes non-overlapping channels, such as 1, 6, and 11 in the 2.4 GHz band, the organization can prevent co-channel interference and ensure reliable connectivity for mobile devices. This systematic approach allows for the optimization of signal-to-noise ratios before deployment.
Incorrect
Correct: A physical site survey is a fundamental preventive control that identifies environmental obstacles and sources of electromagnetic interference. By establishing a frequency plan that utilizes non-overlapping channels, such as 1, 6, and 11 in the 2.4 GHz band, the organization can prevent co-channel interference and ensure reliable connectivity for mobile devices. This systematic approach allows for the optimization of signal-to-noise ratios before deployment.
-
Question 6 of 10
6. Question
Following an on-site examination at a fintech lender, regulators raised concerns about Network Access Control (NAC) in the context of conflicts of interest. Their preliminary finding is that the current implementation of DHCP and DNS services allows unauthorized devices to bypass security posture assessments. Specifically, the internal audit team discovered that contractors were able to manually configure static IP addresses within the server subnet to circumvent the NAC’s DHCP-based enforcement mechanism during a 90-day project window. To address this risk and ensure robust access control at the network layer, which of the following controls would be most effective for the internal auditor to recommend?
Correct
Correct: Implementing DHCP Snooping and IP Source Guard is the most effective control because it creates a binding database of legitimate DHCP leases. IP Source Guard then uses this database to drop any traffic from a host that attempts to use an IP address not specifically assigned to its MAC address by the DHCP server, effectively preventing the use of unauthorized static IPs to bypass NAC.
Incorrect: Increasing DNS zone transfer frequency focuses on the consistency of name resolution records across servers but does not provide any mechanism to block unauthorized network access or validate IP assignments. DHCP Option 82 provides additional circuit and remote ID information which is useful for identifying the physical point of attachment, but it does not inherently prevent a user from manually configuring a static IP to bypass a DHCP-based NAC. While IPv6 includes IPsec in its architecture, simply moving to Global Unicast addresses does not automatically enforce NAC or prevent static IP spoofing without additional configuration and infrastructure.
Takeaway: Effective Network Access Control requires the integration of DHCP snooping and source validation to ensure that only dynamically authorized IP-to-MAC bindings can transmit traffic.
Incorrect
Correct: Implementing DHCP Snooping and IP Source Guard is the most effective control because it creates a binding database of legitimate DHCP leases. IP Source Guard then uses this database to drop any traffic from a host that attempts to use an IP address not specifically assigned to its MAC address by the DHCP server, effectively preventing the use of unauthorized static IPs to bypass NAC.
Incorrect: Increasing DNS zone transfer frequency focuses on the consistency of name resolution records across servers but does not provide any mechanism to block unauthorized network access or validate IP assignments. DHCP Option 82 provides additional circuit and remote ID information which is useful for identifying the physical point of attachment, but it does not inherently prevent a user from manually configuring a static IP to bypass a DHCP-based NAC. While IPv6 includes IPsec in its architecture, simply moving to Global Unicast addresses does not automatically enforce NAC or prevent static IP spoofing without additional configuration and infrastructure.
Takeaway: Effective Network Access Control requires the integration of DHCP snooping and source validation to ensure that only dynamically authorized IP-to-MAC bindings can transmit traffic.
-
Question 7 of 10
7. Question
The supervisory authority has issued an inquiry to an investment firm concerning Application-Specific Network Problems in the context of complaints handling. The letter states that several high-net-worth clients reported an inability to execute trades during the first 10 minutes of the trading day over a three-day period. Internal audit’s review of the system logs reveals that while the network bandwidth was only at 40% capacity, the application server logged thousands of incomplete TCP connection attempts. Which of the following observations by the internal auditor identifies the most probable technical root cause related to the TCP/IP protocol suite?
Correct
Correct: In the TCP three-way handshake (SYN, SYN-ACK, ACK), the server must maintain a queue of ‘half-open’ connections (those that have sent a SYN but not yet completed the handshake). If an application server is overwhelmed by a sudden burst of requests, this SYN backlog queue can become exhausted. When this happens, the server cannot respond with a SYN-ACK to new requests, resulting in the ‘incomplete’ connection attempts observed by the auditor, even if the overall network bandwidth is not saturated.
Incorrect: Low DNS TTL settings would increase the frequency of DNS queries but would not result in incomplete TCP connection attempts on the application server itself. Classful addressing is a legacy method of IP allocation and would not cause intermittent connection failures if the network was already functioning. DHCP lease issues would cause a client to lose its IP address entirely, which would prevent any packets from reaching the server, rather than resulting in incomplete handshakes logged at the server level.
Takeaway: Internal auditors should recognize that application availability can be compromised at the transport layer through TCP backlog exhaustion, even when network layer bandwidth appears sufficient.
Incorrect
Correct: In the TCP three-way handshake (SYN, SYN-ACK, ACK), the server must maintain a queue of ‘half-open’ connections (those that have sent a SYN but not yet completed the handshake). If an application server is overwhelmed by a sudden burst of requests, this SYN backlog queue can become exhausted. When this happens, the server cannot respond with a SYN-ACK to new requests, resulting in the ‘incomplete’ connection attempts observed by the auditor, even if the overall network bandwidth is not saturated.
Incorrect: Low DNS TTL settings would increase the frequency of DNS queries but would not result in incomplete TCP connection attempts on the application server itself. Classful addressing is a legacy method of IP allocation and would not cause intermittent connection failures if the network was already functioning. DHCP lease issues would cause a client to lose its IP address entirely, which would prevent any packets from reaching the server, rather than resulting in incomplete handshakes logged at the server level.
Takeaway: Internal auditors should recognize that application availability can be compromised at the transport layer through TCP backlog exhaustion, even when network layer bandwidth appears sufficient.
-
Question 8 of 10
8. Question
The compliance framework at a credit union is being updated to address Security Breach Investigations as part of outsourcing. A challenge arises because the third-party service provider manages the DHCP and DNS infrastructure, limiting the internal audit team’s direct access to real-time logs. During a recent audit of a suspected data exfiltration event, the internal auditor notes that several internal IP addresses were associated with suspicious outbound TCP connections to an external host. To verify if a full session was established rather than just a scanning attempt, the auditor must evaluate the evidence of the transport layer interaction. Which of the following pieces of evidence would most reliably confirm that a successful bidirectional communication channel was established between the internal host and the external entity?
Correct
Correct: In the TCP/IP protocol suite, a successful connection requires the completion of the three-way handshake (SYN, SYN-ACK, and ACK). Confirming that the internal host sent the final ACK after receiving a SYN-ACK from the external server proves that a stateful connection was established, which is a critical step in investigating whether data exfiltration could have occurred.
Incorrect: DNS queries only indicate that a host attempted to resolve a domain name to an IP address, not that a connection was actually made. DHCP lease logs only confirm that a device was authorized to be on the network and assigned an IP, but they provide no information about specific traffic sessions. ICMP Destination Unreachable messages indicate that the connection attempt failed or was blocked by a security appliance, which would suggest the breach attempt was unsuccessful.
Takeaway: Verifying the completion of the TCP three-way handshake is the standard method for confirming that a reliable network session was established during a security breach investigation.
Incorrect
Correct: In the TCP/IP protocol suite, a successful connection requires the completion of the three-way handshake (SYN, SYN-ACK, and ACK). Confirming that the internal host sent the final ACK after receiving a SYN-ACK from the external server proves that a stateful connection was established, which is a critical step in investigating whether data exfiltration could have occurred.
Incorrect: DNS queries only indicate that a host attempted to resolve a domain name to an IP address, not that a connection was actually made. DHCP lease logs only confirm that a device was authorized to be on the network and assigned an IP, but they provide no information about specific traffic sessions. ICMP Destination Unreachable messages indicate that the connection attempt failed or was blocked by a security appliance, which would suggest the breach attempt was unsuccessful.
Takeaway: Verifying the completion of the TCP three-way handshake is the standard method for confirming that a reliable network session was established during a security breach investigation.
-
Question 9 of 10
9. Question
A client relationship manager at a payment services provider seeks guidance on Scalable Network Designs as part of client suitability. They explain that the organization is initiating a 24-month expansion plan to integrate several hundred new merchant locations into their existing infrastructure. The current network utilizes a flat addressing structure that has led to significant routing table bloat and difficulty in managing address exhaustion. To ensure the new architecture supports this rapid growth while maintaining efficient routing and minimizing address wastage, which strategy should the internal auditor identify as the most effective control for IP address management?
Correct
Correct: Variable Length Subnet Masking (VLSM) is a critical component of scalable network design because it allows for the efficient allocation of IP addresses by creating subnets of varying sizes based on the actual needs of each segment. When combined with hierarchical addressing, it enables route summarization (aggregation), which significantly reduces the size of routing tables, improves router performance, and enhances network stability by isolating topology changes within specific areas.
Incorrect: Classful addressing is an obsolete method that leads to significant address wastage and lacks the flexibility required for modern scalable networks. Static NAT for every internal endpoint is administratively unfeasible and does not solve the underlying issue of internal IP management or routing efficiency. Fixed Length Subnet Masking (FLSM) is inefficient in environments with diverse segment sizes, as it forces the same subnet size on both large and small locations, leading to either address exhaustion or significant wastage.
Takeaway: Scalable network designs prioritize VLSM and hierarchical addressing to optimize IP address utilization and ensure efficient routing through route summarization.
Incorrect
Correct: Variable Length Subnet Masking (VLSM) is a critical component of scalable network design because it allows for the efficient allocation of IP addresses by creating subnets of varying sizes based on the actual needs of each segment. When combined with hierarchical addressing, it enables route summarization (aggregation), which significantly reduces the size of routing tables, improves router performance, and enhances network stability by isolating topology changes within specific areas.
Incorrect: Classful addressing is an obsolete method that leads to significant address wastage and lacks the flexibility required for modern scalable networks. Static NAT for every internal endpoint is administratively unfeasible and does not solve the underlying issue of internal IP management or routing efficiency. Fixed Length Subnet Masking (FLSM) is inefficient in environments with diverse segment sizes, as it forces the same subnet size on both large and small locations, leading to either address exhaustion or significant wastage.
Takeaway: Scalable network designs prioritize VLSM and hierarchical addressing to optimize IP address utilization and ensure efficient routing through route summarization.
-
Question 10 of 10
10. Question
The information security manager at a credit union is tasked with addressing 802.1X Authentication during control testing. After reviewing a regulator information request, the key concern is that several branch offices recently reported unauthorized devices successfully connecting to the wired network despite the implementation of port-based access control. An internal audit review of the RADIUS server logs from the last quarter indicates that while authentication is required, the fallback mechanisms and certificate validation processes may not be aligned with the organization’s risk appetite. Which of the following findings would represent the most significant control weakness regarding the 802.1X implementation?
Correct
Correct: A “fail-open” configuration (often referred to as a critical VLAN or auth-fail VLAN) is designed to maintain business continuity if the RADIUS server is unreachable. However, if this VLAN is not properly secured with egress filters or ACLs, it provides a loophole for unauthorized devices to access internal resources or move laterally. From an audit perspective, this represents a failure of the primary security objective of 802.1X, which is to ensure only authenticated and authorized devices gain network access.
Incorrect: Using EAP-TLS is a robust security measure and represents a control strength rather than a weakness. A short re-authentication timer is a performance and availability concern that may cause network overhead, but it does not inherently allow unauthorized access. While integrating physical and logical security logs is a mature security practice for monitoring, its absence is a secondary reporting issue rather than a fundamental failure of the 802.1X authentication control mechanism.
Takeaway: Internal auditors must evaluate the security of fallback configurations in 802.1X environments to ensure that availability measures do not inadvertently create unauthorized access paths.
Incorrect
Correct: A “fail-open” configuration (often referred to as a critical VLAN or auth-fail VLAN) is designed to maintain business continuity if the RADIUS server is unreachable. However, if this VLAN is not properly secured with egress filters or ACLs, it provides a loophole for unauthorized devices to access internal resources or move laterally. From an audit perspective, this represents a failure of the primary security objective of 802.1X, which is to ensure only authenticated and authorized devices gain network access.
Incorrect: Using EAP-TLS is a robust security measure and represents a control strength rather than a weakness. A short re-authentication timer is a performance and availability concern that may cause network overhead, but it does not inherently allow unauthorized access. While integrating physical and logical security logs is a mature security practice for monitoring, its absence is a secondary reporting issue rather than a fundamental failure of the 802.1X authentication control mechanism.
Takeaway: Internal auditors must evaluate the security of fallback configurations in 802.1X environments to ensure that availability measures do not inadvertently create unauthorized access paths.