🛡️ Network Security - SCOR Practice Questions

Master Cisco Firepower, ASA, IPS/IDS, zone-based firewalls, NAT, VPNs (site-to-site, remote access), and network segmentation.

6Questions Available
1Exam Domains

Practice Network Security Questions Now

Start a timed practice session focusing on Network Security topics from the SCOR question bank.

Start SCOR Practice Quiz →

SCOR Network Security Question Bank (6 Questions)

Browse all 6 practice questions covering Network Security for the SCOR certification exam. Each question includes the full answer and a detailed explanation to help you understand the concepts.

  1. Question 1Network Security

    In a Cisco zone-based policy firewall (ZBPF), what happens to traffic between interfaces in the same security zone by default?

    ATraffic is denied
    BTraffic is permitted
    CTraffic is logged and dropped
    DTraffic is rate-limited
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    In a zone-based firewall, traffic between interfaces in the same security zone is permitted by default. Traffic between different zones is denied by default unless a policy explicitly allows it.

  2. Question 2Network Security

    What is the primary advantage of Cisco GET VPN over traditional point-to-point IPsec VPNs?

    AIt requires no encryption
    BIt preserves the original IP header, allowing native routing and multicast support
    CIt uses SSL/TLS instead of IPsec
    DIt eliminates the need for pre-shared keys or certificates
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Cisco Group Encrypted Transport VPN (GET VPN) preserves the original IP header (tunnel-less design), enabling native routing, QoS, and multicast to work seamlessly across the encrypted WAN. It uses a group key model rather than pairwise tunnels.

  3. Question 3Network Security

    What is the key difference between an Intrusion Prevention System (IPS) and an Intrusion Detection System (IDS)?

    AIDS is deployed inline while IPS uses a span port
    BIPS can block traffic inline while IDS only alerts
    CIDS uses signatures while IPS uses anomaly detection only
    DIPS monitors encrypted traffic while IDS cannot
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    An IPS is deployed inline and can actively block or drop malicious traffic in real time. An IDS passively monitors traffic (typically via a SPAN/mirror port) and generates alerts but cannot block traffic directly.

  4. Question 4Network Security

    Which deployment mode allows a Cisco Firepower Threat Defense (FTD) device to inspect traffic without being in the direct path of network traffic?

    ARouted mode
    BTransparent mode
    CInline tap mode
    DMulti-context mode
    Show Answer & Explanation
    Correct Answer: C
    Explanation:

    Inline tap mode allows FTD to receive a copy of traffic (via a tap or SPAN) for inspection without being in the direct traffic path. It can detect but not block threats, making it useful for monitoring without affecting traffic flow.

  5. Question 5Network Security

    Which Cisco firewall technology provides stateful packet inspection, VPN, and advanced threat protection?

    ACisco ASA
    BCisco Firepower Threat Defense (FTD)
    CCisco Umbrella
    DCisco StealthWatch
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Cisco Firepower Threat Defense (FTD) combines ASA firewall capabilities with Firepower IPS, URL filtering, malware defense, and application visibility in a unified platform.

  6. Question 6Network Security

    What is the difference between IDS and IPS?

    ANo difference
    BIDS detects and alerts on threats passively; IPS detects and actively blocks/prevents threats inline
    CIDS blocks; IPS detects
    DIDS is hardware; IPS is software
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    IDS monitors traffic copies (passive) and generates alerts. IPS sits inline in the traffic path and can actively drop or modify malicious packets in real-time.

Key Network Security Concepts for SCOR

firewallfirepowerasaipsidsvpnipsecnatzone-based

SCOR Network Security Exam Tips

Network Security questions in SCOR are typically scenario-based. Focus on service-level decision making aligned to official exam objectives. Priority concepts: firewall, firepower, asa, ips, ids, vpn.

What SCOR Expects

  • Anchor your answer in select the most practical, secure, and scalable answer for the stated scenario.
  • Network Security scenarios for SCOR are frequently mapped to Domain 2 (20%), so read the objective carefully before picking controls or architecture.
  • Expect multi-service scenarios where Network Security interacts with IAM, networking, storage, or observability patterns rather than appearing as an isolated service question.
  • When two options are both technically valid, prefer the choice that best aligns with the exam's operational scope (Professional) and managed-service best practices.

High-Value Network Security Concepts

  • Know the core Network Security building blocks cold: firewall, firepower, asa, ips.
  • Review the edge-case features and limits for ids, vpn; these details are commonly used to differentiate answer choices.
  • Practice service-integration reasoning: how Network Security pairs with Security Concepts, Cloud Security in real deployment patterns.
  • For SCOR, explain why the chosen Network Security design meets reliability, security, and cost expectations better than the alternatives.

Common SCOR Traps

  • Watch for answers that partially solve the requirement but miss operational constraints.
  • Questions in Network Security often include distractors that look correct for Network Security but violate least-privilege, durability, or availability requirements.
  • Avoid picking options purely by feature name; validate data path, failure handling, and governance impact before answering.
  • If the prompt hints at automation or repeatability, eliminate manual-only operational answers first.

Fast Review Checklist

  • Can you compare at least two Network Security implementation paths and justify which one best fits the scenario?
  • Can you map the chosen answer back to Network Security (20%) outcomes for SCOR?
  • Can you explain security and access boundaries for Network Security without relying on default-open assumptions?
  • Can you describe how Network Security integrates with Security Concepts and Cloud Security during failure, scaling, and monitoring events?

Exam Domains Covering Network Security

Related Resources

More SCOR Study Resources