Special Summer Sale Limited Time Flat 70% Discount offer - Ends in 1d 7h 20m 30s - Coupon code: 70spcl

The SecOps Group CNSP Certified Network Security Practitioner (CNSP) Exam Practice Test

Page: 1 / 6
Total 60 questions

Certified Network Security Practitioner (CNSP) Questions and Answers

Question 1

Which of the following is an example of a SUID program?

Options:

A.

/bin/ls

B.

/usr/bin/curl

C.

/usr/bin/passwd

D.

None of the above

Question 2

The application is showing a TLS error message as a result of a website administrator failing to timely renew the TLS certificate. But upon deeper analysis, it appears that the problem is brought on by the expiration of the TLS certificate. Which of the following statements is correct?

Options:

A.

The communication between the browser and the server is now no longer over TLS.

B.

The communication between the browser and the server is still over TLS.

Question 3

If you find the 111/TCP port open on a Unix system, what is the next logical step to take?

Options:

A.

Run "rpcinfo -p " to enumerate the RPC services.

B.

Telnet to the port to look for a banner.

C.

Telnet to the port, send "GET / HTTP/1.0" and gather information from the response.

D.

None of the above.

Question 4

Which of the following services do not encrypt its traffic by default?

Options:

A.

DNS

B.

SSH

C.

FTPS

D.

All of these

Question 5

What is the response from a closed TCP port which is not behind a firewall?

Options:

A.

ICMP message showing Port Unreachable

B.

A FIN and an ACK packet

C.

A RST and an ACK packet

D.

A SYN and an ACK packet

Question 6

What kind of files are "Dotfiles" in a Linux-based architecture?

Options:

A.

Library files

B.

Driver files

C.

System files

D.

Hidden files

Question 7

How would you establish a null session to a Windows host from a Windows command prompt?

Options:

A.

net use \hostname\c$ "" /u:NULL

B.

net use \hostname\c$ "" /u:""

C.

net use \hostname\ipc$ "" /u:""

D.

net use \hostname\ipc$ "" /u:NULL

Question 8

If a hash begins with $2a$, what hashing algorithm has been used?

Options:

A.

Blowfish

B.

SHA256

C.

MD5

D.

SHA512

Question 9

What is the response from a closed TCP port which is behind a firewall?

Options:

A.

A FIN and an ACK packet

B.

RST and an ACK packet

C.

A SYN and an ACK packet

D.

No response

Question 10

What is the response from a closed UDP port which is not behind a firewall?

Options:

A.

ICMP message showing Destination Unreachable

B.

A RST packet

C.

No response

D.

None of the above

Question 11

In the context of a Unix-based system, where does a daemon process execute in the memory?

Options:

A.

Kernel space

B.

User space

Question 12

A system encrypts data prior to transmitting it over a network, and the system on the other end of the transmission media decrypts it. If the systems are using a symmetric encryption algorithm for encryption and decryption, which of the following statements is true?

Options:

A.

A symmetric encryption algorithm uses the same key to encrypt and decrypt data at both ends of the transmission media.

B.

A symmetric encryption algorithm uses different keys to encrypt and decrypt data at both ends of the transmission media.

C.

A symmetric encryption algorithm does not use keys to encrypt and decrypt data at both ends of the transmission media.

D.

A symmetric encryption algorithm is an insecure method used to encrypt data transmitted over transmission media.

Question 13

Which of the following protocols is not vulnerable to address spoofing attacks if implemented correctly?

Options:

A.

UDP

B.

ARP

C.

TCP

D.

IP

Question 14

What is the response from an open TCP port which is not behind a firewall?

Options:

A.

A FIN and an ACK packet

B.

A SYN packet

C.

A SYN and an ACK packet

D.

A RST and an ACK packet

Question 15

Which SMB (Server Message Block) network protocol versions are vulnerable to the EternalBlue (MS17-010) Windows exploit?

Options:

A.

SMBv1 only

B.

SMBv2 only

C.

SMBv3 only

D.

Both SMBv1 and SMBv2

Question 16

According to the screenshot below, which of the following statements are correct?

Question # 16

Options:

A.

The application is running on port 443 and the HTTPS protocol.

B.

The credentials have been submitted over the HTTP protocol.

C.

The credentials have been submitted over the HTTPS protocol.

D.

The application is running on port 80 and the HTTP protocol.

Question 17

On a Microsoft Windows Operating System, what does the following command do?

net localgroup administrators

Options:

A.

List domain admin users for the current domain

B.

Displays the local administrators group on the computer

Question 18

What will be the subnet mask for 192.168.0.1/18?

Options:

A.

255.255.255.0

B.

255.225.225.0

C.

255.255.192.0

D.

255.225.192.0

Page: 1 / 6
Total 60 questions