This is a scored practice assessment. It is not timed. Use it to identify weak domains before a timed attempt.
Network models practice assessment. Practice
12 questions

Which control is best described as layer-aware security?

security

A packet capture can be defensible practice when it focuses on:

observability

Segmentation is most effective when it is paired with:

segmentation

Scenario: You want to reduce MTTR. Which practice helps most?

observability

Layer-aware security is weakest when teams:

security

Scenario: You segment networks but incidents still spread. What is missing?

segmentation

Scenario: Teams argue about where the problem is. What makes evidence 'shared truth'?

observability

Scenario: You rely on segmentation alone for security. What is the major gap?

security

Scenario: You want to reduce lateral movement. What is the most defensible network pattern?

segmentation

Scenario: A network change causes an outage. What is the most defensible process control?

operations

Scenario: You want to detect DNS manipulation. What is a strong signal?

observability

Scenario: You expose an internal service externally. What is the most defensible minimum set?

security
Add CPD reflection (optional)
One short paragraph makes your CPD evidence much stronger.
For one incorrect answer, write down the evidence you would collect (commands, logs, timings) and the single layer you would test first.

Quick feedback

Optional. This helps improve accuracy and usefulness. No accounts required.