37. What is the primary purpose of a reverse proxy?
Protect internal servers from direct access
Replace load balancers
Only monitor outgoing traffic
Manage DNS records
✅ Correct Answer: Protect internal servers from direct access
38. Which protocol provides secure VoIP communications?
SRTP
RTP
SIP
H.323
✅ Correct Answer: SRTP
39. What is the primary purpose of a network intrusion detection system (NIDS)?
Monitor network traffic for suspicious activity
Block all malicious traffic
Replace firewalls
Manage user permissions
✅ Correct Answer: Monitor network traffic for suspicious activity
40. Which technique helps prevent MAC flooding attacks?
Port security
ARP inspection
VLAN segmentation
Network access control
✅ Correct Answer: Port security
41. What is the primary purpose of a forward proxy?
Control outbound traffic from internal users
Replace VPNs
Monitor database activity
Manage web servers
✅ Correct Answer: Control outbound traffic from internal users
42. Which protocol provides secure time synchronization?
NTP with authentication
SNTP
NTP
PTP
✅ Correct Answer: NTP with authentication
43. What is the primary purpose of a unified threat management (UTM) device?
Combine multiple security functions in one appliance
Replace all network security controls
Only monitor user behavior
Manage cloud storage
✅ Correct Answer: Combine multiple security functions in one appliance
44. Which technique helps prevent STP manipulation attacks?
BPDU guard
Port security
Root guard
VLAN segmentation
✅ Correct Answer: BPDU guard
45. What is the primary purpose of network behavior analysis (NBA)?
Detect anomalies in network traffic patterns
Replace IDS systems
Encrypt all communications
Manage user accounts
✅ Correct Answer: Detect anomalies in network traffic patterns
46. Which protocol provides secure directory services?
LDAPS
LDAP
Active Directory
Kerberos
✅ Correct Answer: LDAPS
47. What is the primary purpose of a network access control list (ACL)?
Define rules for permitted network traffic
Replace firewalls
Encrypt data in transit
Monitor user activity
✅ Correct Answer: Define rules for permitted network traffic
48. Which technique helps prevent DNS tunneling?
DNS filtering
DNSSEC
DNS load balancing
DNS forwarding
✅ Correct Answer: DNS filtering
49. What is the primary purpose of a network time protocol (NTP) server?
Synchronize time across network devices
Replace authentication servers
Encrypt network traffic
Monitor user behavior
✅ Correct Answer: Synchronize time across network devices
50. Which technique helps prevent ICMP flood attacks?
Rate limiting
Port security
ARP inspection
VLAN segmentation
✅ Correct Answer: Rate limiting
51. What is the primary purpose of a network segmentation gateway?
Control traffic between network segments
Replace all firewalls
Encrypt database backups
Monitor user activity
✅ Correct Answer: Control traffic between network segments
52. Which protocol provides secure SNMP communications?
SNMPv3
SNMPv2
SNMPv1
RMON
✅ Correct Answer: SNMPv3
53. What is the primary purpose of a network admission control (NAC) system?
Enforce security policies before granting network access
Replace VPNs
Monitor database activity
Encrypt email communications
✅ Correct Answer: Enforce security policies before granting network access
54. Which technique helps prevent DHCP spoofing?
DHCP snooping
Port security
ARP inspection
VLAN segmentation
✅ Correct Answer: DHCP snooping
55. What is the primary purpose of a network load balancer?
Distribute traffic across multiple servers
Replace firewalls
Encrypt network traffic
Monitor user behavior
✅ Correct Answer: Distribute traffic across multiple servers
56. Which protocol provides secure syslog transmissions?
Syslog over TLS
Syslog
SNMP
NetFlow
✅ Correct Answer: Syslog over TLS
57. What is the primary purpose of a network access server (NAS)?
Handle authentication for remote users
Replace all firewalls
Encrypt database backups
Monitor network performance
✅ Correct Answer: Handle authentication for remote users
58. Which technique helps prevent IP spoofing?
Ingress filtering
Egress filtering
Port security
VLAN segmentation
✅ Correct Answer: Ingress filtering
59. What is the primary purpose of a network time protocol (NTP) server?
Synchronize time across network devices
Replace authentication servers
Encrypt network traffic
Monitor user behavior
✅ Correct Answer: Synchronize time across network devices
60. Which technique helps prevent SYN flood attacks?
SYN cookies
Port security
ARP inspection
VLAN segmentation
✅ Correct Answer: SYN cookies
The SCNP IACRB Scns Tactical Perimeter Defense certification is a globally recognized credential for IT professionals.
This practice test helps you prepare by covering key topics like hardware, networking, troubleshooting, and security.
Want more practice? Check out our other mock exams: