(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What refers to temporary networks that can bypass standard security controls?

  1. Honeypot

  2. Honeynet

  3. Ad-Hoc Network

  4. Temporary LAN

The correct answer is: Ad-Hoc Network

The correct answer is the concept of an ad-hoc network. An ad-hoc network is a type of decentralized wireless network that allows devices to connect directly to one another without needing a pre-existing infrastructure, such as a router or a centralized network management system. This can sometimes lead to bypassing standard security controls, as these networks are typically created spontaneously for specific purposes and may lack the necessary security measures in place, like authentication and encryption, that are present in traditional network setups. Ad-hoc networks can be useful for quick, short-term communication, but they can introduce security risks due to their lack of structured oversight. This makes them susceptible to unauthorized access and can result in data being transmitted without adequate protection. In the context of the other options, honeypots and honeynets are security mechanisms designed to lure attackers and study their behavior in a controlled environment. They are specifically built to test and enhance security measures rather than bypassing them. A temporary LAN is a localized area network that has a structured setup similar to traditional LANs and maintains standard security controls, negating the characteristics of an ad-hoc network.