Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

The SecOps Group CNSP Certified Network Security Practitioner (CNSP) Exam Practice Test

Page: 1 / 6
Total 60 questions

Certified Network Security Practitioner (CNSP) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which of the following algorithms could be used to negotiate a shared encryption key?

Options:

A.

Triple-DES

B.

SHA1

C.

Diffie-Hellman

D.

AES

Question 2

Which of the following is an example of a SUID program?

Options:

A.

/bin/ls

B.

/usr/bin/curl

C.

/usr/bin/passwd

D.

None of the above

Question 3

The Management Information Base (MIB) is a collection of object groups that is managed by which service?

Options:

A.

SMTP

B.

SNMP

C.

NTP

D.

TACACS

Question 4

On a Microsoft Windows operating system, what does the following command do?

net localgroup Sales Sales_domain /add

Options:

A.

Display the list of the users of a local group Sales

B.

Add a domain group to the local group Sales

C.

Add a new user to the local group Sales

D.

Add a local group Sales to the domain group

Question 5

Which of the following is true for SNMP?

A)The default community string for read-only access is "public."

B)The default community string for read/write access is "private."

Options:

A.

Only A

B.

Only B

C.

Both A and B

D.

None of the above

Question 6

How many octets are there in an IPv6 address?

Options:

A.

16

B.

32

C.

64

D.

128

Question 7

Which of the aforementioned SSL/TLS protocols are considered to be unsafe?

Options:

A.

SSLv2 and SSLv3

B.

TLSv1.0 and TLSv1.1

C.

Both A and B

D.

SSLv2, SSLv3, TLSv1.0, TLSv1.1, TLSv1.2, and TLSv1.3

Question 8

Which of the following services use TCP protocol?

Options:

A.

SNMP

B.

NTP

C.

HTTP

D.

IKE

Question 9

Which of the following files has the SGID permission set?

    -rwxr-sr-x 1 root root 4096 Jan 1 08:00 myfile

    -rwsr-xr-x 1 root root 4096 Jan 1 00:08 myprogram

    -rw-r--r-s 1 root root 4896 Jan 1 00:00 anotherfile

Options:

A.

myfile

B.

myprogram

C.

anotherfile

D.

All of the above

Question 10

Which one of the following is a phishing email?

Options:

A.

Only A

B.

Only B

C.

Both A and B

D.

None of the above

Question 11

Which of the following is not a DDoS attack?

Options:

A.

SYN Flood

B.

NTP Amplification

C.

UDP Flood

D.

Brute Force

Question 12

What is the response from a closed TCP port which is not behind a firewall?

Options:

A.

ICMP message showing Port Unreachable

B.

A FIN and an ACK packet

C.

A RST and an ACK packet

D.

A SYN and an ACK packet

Question 13

Where are the password hashes stored in the Linux file system?

Options:

A.

/etc/passwd

B.

/etc/password

C.

/etc/shadow

D.

/usr/bin/shadow

Question 14

Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?

Options:

A.

DNS tunneling

B.

VLAN hopping

C.

Covert channels

D.

All of the above

Question 15

Where is the system registry file stored in a Microsoft Windows Operating System?

Options:

A.

C:\Windows\debug

B.

C:\Windows\System32\Config

C.

C:\Windows\security

D.

All of the above

Question 16

According to the screenshot below, which of the following statements are correct?

Options:

A.

The application is running on port 443 and the HTTPS protocol.

B.

The credentials have been submitted over the HTTP protocol.

C.

The credentials have been submitted over the HTTPS protocol.

D.

The application is running on port 80 and the HTTP protocol.

Question 17

In a Linux-based architecture, what does the /mnt directory contain?

Options:

A.

Temporary-mounted filesystems

B.

System configuration files and initialization scripts

C.

Loadable driver modules needed to boot the system

D.

System files which represent the current state of the kernel

Question 18

Where are the password hashes stored in a Microsoft Windows 64-bit system?

Options:

A.

C:\Windows\System64\config\SAM

B.

C:\Windows\System32\config\SAM

C.

C:\System64\config\SAM

D.

C:\Windows\config\System32\SAM

Page: 1 / 6
Total 60 questions