Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

The SecOps Group CNSP Certified Network Security Practitioner (CNSP) Exam Practice Test

Demo: 18 questions
Total 60 questions

Certified Network Security Practitioner (CNSP) Questions and Answers

Question 1

What user account is required to create a Golden Ticket in Active Directory?

Options:

A.

Local User account

B.

Domain User account

C.

Service account

D.

KRBTGT account

Question 2

Which of the following represents a valid Windows Registry key?

Options:

A.

HKEY_LOCAL_MACHINE

B.

HKEY_INTERNAL_CONFIG

C.

HKEY_ROOT_CLASSES

D.

HKEY_LOCAL_USER

Question 3

The Active Directory database file stores the data and schema information for the Active Directory database on domain controllers in Microsoft Windows operating systems. Which of the following file is the Active Directory database file?

Options:

A.

NTDS.DAT

B.

NTDS.MDB

C.

MSAD.MDB

D.

NTDS.DIT

Question 4

Which SMB (Server Message Block) network protocol version introduced support for encrypting SMB traffic?

Options:

A.

SMBv1

B.

SMBv2

C.

SMBv3

D.

None of the above

Question 5

A system encrypts data prior to transmitting it over a network, and the system on the other end of the transmission media decrypts it. If the systems are using a symmetric encryption algorithm for encryption and decryption, which of the following statements is true?

Options:

A.

A symmetric encryption algorithm uses the same key to encrypt and decrypt data at both ends of the transmission media.

B.

A symmetric encryption algorithm uses different keys to encrypt and decrypt data at both ends of the transmission media.

C.

A symmetric encryption algorithm does not use keys to encrypt and decrypt data at both ends of the transmission media.

D.

A symmetric encryption algorithm is an insecure method used to encrypt data transmitted over transmission media.

Question 6

The application is showing a TLS error message as a result of a website administrator failing to timely renew the TLS certificate. But upon deeper analysis, it appears that the problem is brought on by the expiration of the TLS certificate. Which of the following statements is correct?

Options:

A.

The communication between the browser and the server is now no longer over TLS.

B.

The communication between the browser and the server is still over TLS.

Question 7

In the context of the SSH (Secure Shell) public-private key authentication mechanism, which key is uploaded to the server and which key is used by the end-user for authentication?

Options:

A.

The public key is uploaded to the server and the private key is used by the end user for authentication.

B.

The private key is uploaded to the server and the public key is used by the end user for authentication.

Question 8

The Management Information Base (MIB) is a collection of object groups that is managed by which service?

Options:

A.

SMTP

B.

SNMP

C.

NTP

D.

TACACS

Question 9

If you find the 111/TCP port open on a Unix system, what is the next logical step to take?

Options:

A.

Run "rpcinfo -p " to enumerate the RPC services.

B.

Telnet to the port to look for a banner.

C.

Telnet to the port, send "GET / HTTP/1.0" and gather information from the response.

D.

None of the above.

Question 10

Which one of the following is a phishing email?

Options:

A.

Only A

B.

Only B

C.

Both A and B

D.

None of the above

Question 11

Which one of the following is not an online attack?

Options:

A.

Brute force attack

B.

Rainbow table attack

C.

Password spraying attack

D.

Phishing attack

Question 12

Which of the following is not a DDoS attack?

Options:

A.

SYN Flood

B.

NTP Amplification

C.

UDP Flood

D.

Brute Force

Question 13

Where are the password hashes stored in a Microsoft Windows 64-bit system?

Options:

A.

C:\Windows\System64\config\SAM

B.

C:\Windows\System32\config\SAM

C.

C:\System64\config\SAM

D.

C:\Windows\config\System32\SAM

Question 14

What is the response from an open UDP port which is behind a firewall (port is open on the firewall)?

Options:

A.

ICMP message showing Port Unreachable

B.

No response

C.

A SYN Packet

D.

A FIN Packet

Question 15

Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?

Options:

A.

DNS tunneling

B.

VLAN hopping

C.

Covert channels

D.

All of the above

Question 16

What ports does an MSSQL server typically use?

Options:

A.

1433/TCP, 2433/UDP, and 3433/TCP

B.

1433/TCP, 1434/UDP, and 1434/TCP

C.

1433/TCP, 2433/UDP, and 1434/TCP

D.

1533/TCP, 1434/UDP, and 2434/TCP

Question 17

In a Linux-based architecture, what does the /mnt directory contain?

Options:

A.

Temporary-mounted filesystems

B.

System configuration files and initialization scripts

C.

Loadable driver modules needed to boot the system

D.

System files which represent the current state of the kernel

Question 18

What ports can be queried to perform a DNS zone transfer?

Options:

A.

53/TCP

B.

53/UDP

C.

Both 1 and 2

D.

None of the above

Demo: 18 questions
Total 60 questions