Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium The SecOps Group CNSP Dumps Questions Answers

Page: 1 / 5
Total 60 questions

Certified Network Security Practitioner (CNSP) Questions and Answers

Question 1

Which of the following attacks are associated with an ICMP protocol?

Options:

A.

Ping of death

B.

Smurf attack

C.

ICMP flooding

D.

All of the following

Buy Now
Question 2

What ports does an MSSQL server typically use?

Options:

A.

1433/TCP, 2433/UDP, and 3433/TCP

B.

1433/TCP, 1434/UDP, and 1434/TCP

C.

1433/TCP, 2433/UDP, and 1434/TCP

D.

1533/TCP, 1434/UDP, and 2434/TCP

Question 3

The application is showing a TLS error message as a result of a website administrator failing to timely renew the TLS certificate. But upon deeper analysis, it appears that the problem is brought on by the expiration of the TLS certificate. Which of the following statements is correct?

Options:

A.

The communication between the browser and the server is now no longer over TLS.

B.

The communication between the browser and the server is still over TLS.

Question 4

Which of the following services do not encrypt its traffic by default?

Options:

A.

DNS

B.

SSH

C.

FTPS

D.

All of these

Question 5

Which Kerberos ticket is required to generate a Silver Ticket?

Options:

A.

Session Ticket

B.

Ticket-Granting Ticket

C.

Service Account Ticket

D.

There is no specific ticket required for generating a Silver Ticket

Question 6

What RID is given to an Administrator account on a Microsoft Windows machine?

Options:

A.

0

B.

500

C.

501

D.

100

Question 7

On a Microsoft Windows operating system, what does the following command do?

net localgroup Sales Sales_domain /add

Options:

A.

Display the list of the users of a local group Sales

B.

Add a domain group to the local group Sales

C.

Add a new user to the local group Sales

D.

Add a local group Sales to the domain group

Question 8

Which one of the following services is not a UDP-based protocol?

Options:

A.

SNMP

B.

NTP

C.

IKE

D.

SSH

Question 9

Which is the correct command to change the MAC address for an Ethernet adapter in a Unix-based system?

Options:

A.

ifconfig eth0 hw ether AA:BB:CC:DD:EE:FF

B.

ifconfig eth0 hdw ether AA:BB:CC:DD:EE:FF

C.

ifconfig eth0 hdwr ether AA:BB:CC:DD:EE:FF

D.

ifconfig eth0 hwr ether AA:BB:CC:DD:EE:FF

Question 10

Which of the following is not a DDoS attack?

Options:

A.

SYN Flood

B.

NTP Amplification

C.

UDP Flood

D.

Brute Force

Question 11

In a Linux-based architecture, what does the /mnt directory contain?

Options:

A.

Temporary-mounted filesystems

B.

System configuration files and initialization scripts

C.

Loadable driver modules needed to boot the system

D.

System files which represent the current state of the kernel

Question 12

Which one of the following is a phishing email?

Options:

A.

Only A

B.

Only B

C.

Both A and B

D.

None of the above

Question 13

Where are the password hashes stored in the Linux file system?

Options:

A.

/etc/passwd

B.

/etc/password

C.

/etc/shadow

D.

/usr/bin/shadow

Question 14

How many usable TCP/UDP ports are there?

Options:

A.

65536

B.

65535

C.

63535

D.

65335

Question 15

What ports can be queried to perform a DNS zone transfer?

Options:

A.

53/TCP

B.

53/UDP

C.

Both 1 and 2

D.

None of the above

Question 16

Which one of the following is not an online attack?

Options:

A.

Brute force attack

B.

Rainbow table attack

C.

Password spraying attack

D.

Phishing attack

Question 17

The Management Information Base (MIB) is a collection of object groups that is managed by which service?

Options:

A.

SMTP

B.

SNMP

C.

NTP

D.

TACACS

Question 18

Which SMB (Server Message Block) network protocol versions are vulnerable to the EternalBlue (MS17-010) Windows exploit?

Options:

A.

SMBv1 only

B.

SMBv2 only

C.

SMBv3 only

D.

Both SMBv1 and SMBv2

Page: 1 / 5
Total 60 questions