Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CNSP Certified Network Security Practitioner (CNSP) Questions and Answers

Questions 4

What will be the subnet mask for 192.168.0.1/18?

Options:

A.

255.255.255.0

B.

255.225.225.0

C.

255.255.192.0

D.

255.225.192.0

Buy Now
Questions 5

If a hash begins with $2a$, what hashing algorithm has been used?

Options:

A.

Blowfish

B.

SHA256

C.

MD5

D.

SHA512

Buy Now
Questions 6

A system encrypts data prior to transmitting it over a network, and the system on the other end of the transmission media decrypts it. If the systems are using a symmetric encryption algorithm for encryption and decryption, which of the following statements is true?

Options:

A.

A symmetric encryption algorithm uses the same key to encrypt and decrypt data at both ends of the transmission media.

B.

A symmetric encryption algorithm uses different keys to encrypt and decrypt data at both ends of the transmission media.

C.

A symmetric encryption algorithm does not use keys to encrypt and decrypt data at both ends of the transmission media.

D.

A symmetric encryption algorithm is an insecure method used to encrypt data transmitted over transmission media.

Buy Now
Questions 7

On a Microsoft Windows operating system, what does the following command do?

net localgroup Sales Sales_domain /add

Options:

A.

Display the list of the users of a local group Sales

B.

Add a domain group to the local group Sales

C.

Add a new user to the local group Sales

D.

Add a local group Sales to the domain group

Buy Now
Questions 8

In a Linux-based architecture, what does the /mnt directory contain?

Options:

A.

Temporary-mounted filesystems

B.

System configuration files and initialization scripts

C.

Loadable driver modules needed to boot the system

D.

System files which represent the current state of the kernel

Buy Now
Questions 9

Which built-in Windows utility can be used to verify the validity of a Kerberos ticket?

Options:

A.

Klist

B.

Kerbtray

C.

Netsh

D.

Kerberos Manager

Buy Now
Questions 10

Where are the password hashes stored in the Linux file system?

Options:

A.

/etc/passwd

B.

/etc/password

C.

/etc/shadow

D.

/usr/bin/shadow

Buy Now
Questions 11

Which of the following services use TCP protocol?

Options:

A.

SNMP

B.

NTP

C.

HTTP

D.

IKE

Buy Now
Questions 12

Which one of the following is a phishing email?

Options:

A.

Only A

B.

Only B

C.

Both A and B

D.

None of the above

Buy Now
Questions 13

Which one of the following is not an online attack?

Options:

A.

Brute force attack

B.

Rainbow table attack

C.

Password spraying attack

D.

Phishing attack

Buy Now
Questions 14

Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?

Options:

A.

DNS tunneling

B.

VLAN hopping

C.

Covert channels

D.

All of the above

Buy Now
Questions 15

What is the response from an open UDP port which is not behind a firewall?

Options:

A.

ICMP message showing Port Unreachable

B.

No response

C.

A SYN packet

D.

A FIN packet

Buy Now
Questions 16

You are performing a security audit on a company's network infrastructure and have discovered the SNMP community string set to the default value of "public" on several devices. What security risks could this pose, and how might you exploit it?

Options:

A.

The potential risk is that an attacker could use the SNMP protocol to gather sensitive information about the devices. You might use a tool like Snmpwalk to query the devices for information.

B.

The potential risk is that an attacker could use the SNMP protocol to modify the devices' configuration settings. You might use a tool like Snmpset to change the settings.

C.

Both A and B.

D.

None of the above.

Buy Now
Questions 17

What is the response from an open UDP port which is behind a firewall (port is open on the firewall)?

Options:

A.

ICMP message showing Port Unreachable

B.

No response

C.

A SYN Packet

D.

A FIN Packet

Buy Now
Questions 18

In the context of the SSH (Secure Shell) public-private key authentication mechanism, which key is uploaded to the server and which key is used by the end-user for authentication?

Options:

A.

The public key is uploaded to the server and the private key is used by the end user for authentication.

B.

The private key is uploaded to the server and the public key is used by the end user for authentication.

Buy Now
Exam Code: CNSP
Exam Name: Certified Network Security Practitioner (CNSP)
Last Update: Apr 30, 2025
Questions: 60
CNSP pdf

CNSP PDF

$25.5  $84.99
CNSP Engine

CNSP Testing Engine

$30  $99.99
CNSP PDF + Engine

CNSP PDF + Testing Engine

$40.5  $134.99