Pre-Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > The SecOps Group > Security Practitioner > CNSP

CNSP Certified Network Security Practitioner (CNSP) Question and Answers

Question # 4

In a Linux-based architecture, what does the /mnt directory contain?

A.

Temporary-mounted filesystems

B.

System configuration files and initialization scripts

C.

Loadable driver modules needed to boot the system

D.

System files which represent the current state of the kernel

Full Access
Question # 5

What is the response from an open TCP port which is not behind a firewall?

A.

A FIN and an ACK packet

B.

A SYN packet

C.

A SYN and an ACK packet

D.

A RST and an ACK packet

Full Access
Question # 6

Which of the following is not a DDoS attack?

A.

SYN Flood

B.

NTP Amplification

C.

UDP Flood

D.

Brute Force

Full Access
Question # 7

The Active Directory database file stores the data and schema information for the Active Directory database on domain controllers in Microsoft Windows operating systems. Which of the following file is the Active Directory database file?

A.

NTDS.DAT

B.

NTDS.MDB

C.

MSAD.MDB

D.

NTDS.DIT

Full Access
Question # 8

If a hash begins with $2a$, what hashing algorithm has been used?

A.

Blowfish

B.

SHA256

C.

MD5

D.

SHA512

Full Access
Question # 9

Which one of the following services is not a UDP-based protocol?

A.

SNMP

B.

NTP

C.

IKE

D.

SSH

Full Access
Question # 10

An 'EICAR' file can be used to?

A.

Test the response of an antivirus program

B.

Test the encryption algorithms

Full Access
Question # 11

Which one of the following is not an online attack?

A.

Brute force attack

B.

Rainbow table attack

C.

Password spraying attack

D.

Phishing attack

Full Access
Question # 12

How many octets are there in an IPv6 address?

A.

16

B.

32

C.

64

D.

128

Full Access
Question # 13

Which of the following represents a valid Windows Registry key?

A.

HKEY_LOCAL_MACHINE

B.

HKEY_INTERNAL_CONFIG

C.

HKEY_ROOT_CLASSES

D.

HKEY_LOCAL_USER

Full Access
Question # 14

In the context of a Unix-based system, where does a daemon process execute in the memory?

A.

Kernel space

B.

User space

Full Access
Question # 15

Which built-in Windows utility can be used to verify the validity of a Kerberos ticket?

A.

Klist

B.

Kerbtray

C.

Netsh

D.

Kerberos Manager

Full Access
Question # 16

Which Kerberos ticket is required to generate a Silver Ticket?

A.

Session Ticket

B.

Ticket-Granting Ticket

C.

Service Account Ticket

D.

There is no specific ticket required for generating a Silver Ticket

Full Access
Question # 17

You are performing a security audit on a company's network infrastructure and have discovered the SNMP community string set to the default value of "public" on several devices. What security risks could this pose, and how might you exploit it?

A.

The potential risk is that an attacker could use the SNMP protocol to gather sensitive information about the devices. You might use a tool like Snmpwalk to query the devices for information.

B.

The potential risk is that an attacker could use the SNMP protocol to modify the devices' configuration settings. You might use a tool like Snmpset to change the settings.

C.

Both A and B.

D.

None of the above.

Full Access
Question # 18

What ports does an MSSQL server typically use?

A.

1433/TCP, 2433/UDP, and 3433/TCP

B.

1433/TCP, 1434/UDP, and 1434/TCP

C.

1433/TCP, 2433/UDP, and 1434/TCP

D.

1533/TCP, 1434/UDP, and 2434/TCP

Full Access