ISC2 CC Domain 4: Network Security carries 24% of your exam weight — making it the second-largest domain on the ISC2 Certified in Cybersecurity (CC) exam. With 100 multiple-choice questions, a 120-minute time limit, and a passing score of 700/1000, you can’t afford to treat network security as an afterthought. This guide breaks down every key concept the exam tests, walks you through real-world scenarios, and includes practice questions to sharpen your thinking before exam day.
What the ISC2 CC Exam Expects from Domain 4
Domain 4 isn’t about memorizing port numbers for their own sake — it’s about understanding why network security controls exist and how they protect organizational assets. The exam will present you with scenarios and ask you to identify the appropriate control, recognize a specific attack type, or determine why a particular solution is more secure than another. Let’s break down the core areas.
The OSI Model and TCP/IP — Know the Layers That Matter
The exam expects you to understand the OSI model’s seven layers and how they map to real-world security controls. You don’t need to recite every layer from memory in isolation — you need to understand which layer a given attack or control operates at. For example, firewalls typically operate at Layer 3 (Network) and Layer 4 (Transport), while application-layer firewalls work at Layer 7. TCP/IP protocols like HTTP (port 80), HTTPS (port 443), and FTP (port 21) appear in scenario questions where you must identify secure versus insecure choices.
A practical anchor: when the exam describes unencrypted file transfers, think FTP on port 21 — and think about why that’s a problem. Plaintext transmission means anyone with network access can read the data in transit. HTTPS and SFTP exist precisely to address this.
Firewalls: Your First Line of Defense
Firewalls are foundational to network security. The CC exam tests three primary types:
- Packet-filtering firewalls — Inspect individual packets based on IP address, port, and protocol. Fast but limited in intelligence.
- Stateful inspection firewalls — Track the state of active connections, providing more context-aware filtering than simple packet inspection.
- Next-generation firewalls (NGFW) — Combine stateful inspection with deep packet inspection, application awareness, and integrated intrusion prevention.
For exam scenarios, focus on which problem each firewall type solves. A stateful firewall is better than a packet filter because it understands whether a packet is part of an established, legitimate session — not just whether the port number looks acceptable.
IDS and IPS: Detection vs. Prevention
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are consistently tested in Domain 4. Here’s the critical distinction:
- IDS monitors and alerts — it does not block traffic. It’s passive.
- IPS monitors and actively blocks suspicious traffic inline — it’s active.
Both can be network-based (NIDS/NIPS) or host-based (HIDS/HIPS). Detection methods include signature-based detection (matching known attack patterns) and anomaly-based detection (flagging deviations from a baseline).
The exam also tests your understanding of detection accuracy. Know the four possible outcomes: true positive (real threat correctly flagged), false positive (benign activity incorrectly flagged), true negative (clean traffic correctly cleared), and false negative (real threat missed). False negatives are the most dangerous. Excessive false positives cause alert fatigue — analysts become desensitized and may miss real incidents.
VPNs: Secure Tunnels Over Untrusted Networks
Virtual Private Networks (VPNs) create encrypted tunnels between endpoints, allowing secure communication over public or untrusted networks like the internet. The exam frequently presents scenarios involving remote workers who need access to internal systems. The correct answer is almost always a VPN — not opening firewall ports directly to internal servers, not using unencrypted protocols, and not exposing internal resources to the public internet.
Common VPN protocols you should recognize include IPsec (used for site-to-site VPNs and remote access) and SSL/TLS-based VPNs (often used for clientless browser-based access). The underlying principle is confidentiality and integrity of data in transit — two pillars of the CIA triad.
Network Segmentation and Defense in Depth
Network segmentation divides a network into isolated zones to contain breaches and limit lateral movement. A DMZ (Demilitarized Zone) is a classic segmentation strategy — it places publicly accessible servers (like web servers) in a separate network zone between the internet and the internal corporate network. If an attacker compromises a DMZ server, they don’t automatically gain access to internal systems.
This concept connects directly to Defense in Depth — the idea that security should be layered so that no single failure exposes the entire environment. Domain 4 asks you to apply this principle in network architecture scenarios.
Wireless Security: Protocols That Matter
Wireless networks introduce unique vulnerabilities because signals extend beyond physical walls. The exam tests wireless security protocols in order of strength:
- WEP — Wired Equivalent Privacy. Deprecated and broken. Never use it.
- WPA — Wi-Fi Protected Access. Improved on WEP but still has vulnerabilities.
- WPA2 — Uses AES encryption. The current standard for most environments.
- WPA3 — The latest standard with stronger protections against offline password attacks.
Public Wi-Fi without encryption is a significant risk vector. Attackers on the same network can intercept unencrypted traffic — a scenario the CC exam explicitly tests.
Test Your Knowledge: Domain 4 Practice Questions
Question 1: Your organization has remote staff who need to access internal file servers and business applications securely from home. Which solution should the IT team deploy?
- A) Open firewall rules to allow direct internet access to each internal server
- B) Implement a VPN so remote users can access internal resources through an encrypted tunnel
- C) Use unencrypted FTP to share files with remote employees
- D) Assign public IP addresses to each remote employee’s device
Answer: B. A VPN provides an encrypted, authenticated channel between the remote user and the corporate network. Opening firewall ports to internal servers exposes those servers directly to the internet. FTP transmits data in plaintext. Public IP addresses don’t solve the security problem and introduce new ones.
Question 2: A network intrusion detection system alerts your security team about traffic that matches a known exploit signature. After investigation, the traffic turns out to be harmless internal testing. What type of detection result is this?
- A) True positive
- B) False positive
- C) True negative
- D) False negative
Answer: B. A false positive occurs when a security system flags legitimate activity as malicious. While this isn’t harmful in isolation, frequent false positives cause alert fatigue — analysts begin to ignore alerts, increasing the risk that a real threat goes unnoticed.
Want more practice? Try free practice questions on Certcy — with 110+ expert-written questions across all CC domains, you’ll be ready for every scenario the exam throws at you.
Key Study Tips for Domain 4
- Think in scenarios, not definitions. The exam won’t ask you to define a VPN — it will describe a business problem and expect you to choose the right solution.
- Understand why controls exist. A firewall blocks unauthorized traffic because of the principle of least privilege. A VPN encrypts data because confidentiality is a CIA triad pillar. Connect concepts to principles.
- Know the attack types. Man-in-the-Middle attacks exploit unencrypted or unauthenticated channels. Denial of Service attacks target availability. Each attack type maps to a specific defensive control.
- Review the OSI model with security in mind. Ask yourself: at which layer does this control operate? At which layer does this attack occur?
- Don’t overlook wireless. WEP, WPA, WPA2, and WPA3 differences appear in exam questions — know which are deprecated and why.
Frequently Asked Questions
How much of the ISC2 CC exam covers Domain 4: Network Security?
Domain 4 accounts for 24% of the ISC2 CC exam, making it the second-largest domain after Security Principles (26%). On a 100-question exam, you can expect approximately 24 questions to draw from network security concepts including firewalls, VPNs, IDS/IPS, wireless security, and network segmentation.
Do I need hands-on networking experience to pass the CC exam?
No hands-on prerequisites are required for the ISC2 CC. However, conceptual understanding matters more than memorization. The exam presents real-world scenarios where you must identify the correct security control or recognize an attack type. Studying with scenario-based practice questions — rather than just reading definitions — is the most effective preparation strategy.
What is the difference between IDS and IPS on the CC exam?
An IDS (Intrusion Detection System) is passive — it monitors traffic and generates alerts but does not block anything. An IPS (Intrusion Prevention System) is active — it sits inline with traffic and can block or modify packets in real time. The CC exam expects you to know this distinction and apply it in scenarios where you must choose between detection and prevention capabilities.
How do I avoid confusing false positives and false negatives?
Think of it from the system’s perspective. A false positive means the system said “threat” when there wasn’t one — a false alarm. A false negative means the system said “no threat” when there actually was one — a missed attack. False negatives are the more dangerous outcome because real threats go undetected. False positives waste analyst time and contribute to alert fatigue. Both concepts appear regularly on Domain 4 questions.
Domain 4 is highly learnable with the right practice — and you’ve got this. The ISC2 CC exam rewards candidates who understand the why behind network security controls, not just the terminology. To build that understanding quickly, download Certcy free and work through our full library of ISC2 CC practice questions. With gamified quizzes, AI-personalized study plans that target your weak areas, and offline access so you can study anywhere, Certcy is built to get you to that 700/1000 passing score. Start today — your certification is closer than you think.
Ready to Pass Your Certification?
Practice with 310+ expert-written questions across CompTIA A+, ISC2 CC, and SSCP.
Free to start — no credit card required.
Related Study Guides
SSCP Domain 4: Incident Response and Recovery — Complete Study Guide
Cybersecurity CertificationsISC2 CC vs CompTIA Security+: Which Cybersecurity Cert Should You Get First?
Cybersecurity CertificationsNetwork Security Fundamentals: Firewalls, IDS, and VPNs Explained for Exam Success