Chapter 4Communication and Network Security (Domain 4)

SUBDOMAINS

  • 4.1 Apply secure design principles in network architectures
  • 4.2 Secure network components
  • 4.3 Implement secure communication channels according to design
  1. Gary wants to distribute a large file and prefers a peer-to-peer content delivery network (CDN). Which of the following is the most common example of this type of technology?
    1. CloudFlare
    2. BitTorrent
    3. Amazon CloudFront
    4. Akamai Edge
  2. What is the purpose of a virtual domain (VDOM)?
    1. They combine multiple virtual instances into a single domain.
    2. They divide a firewall device or appliance into two or more virtual firewalls.
    3. They create a virtual domain controller.
    4. They allow the hosting of multiple domain names for a single host. ...

Get ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.