Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

The SecOps Group CNSP - Certified Network Security Practitioner (CNSP)

Page: 2 / 2
Total 60 questions

What will be the subnet mask for 192.168.0.1/18?

A.

255.255.255.0

B.

255.225.225.0

C.

255.255.192.0

D.

255.225.192.0

Which built-in Windows utility can be used to verify the validity of a Kerberos ticket?

A.

Klist

B.

Kerbtray

C.

Netsh

D.

Kerberos Manager

WannaCry, an attack, spread throughout the world in May 2017 using machines running on outdated Microsoft operating systems. What is WannaCry?

A.

Ransomware

B.

Malware

What types of attacks are phishing, spear phishing, vishing, scareware, and watering hole?

A.

Probes

B.

Insider threats

C.

Social engineering

D.

Ransomware

You are performing a security audit on a company's infrastructure and have discovered that the domain name system (DNS) server is vulnerable to a DNS cache poisoning attack. What is the primary security risk?

A.

The primary risk is that an attacker could redirect traffic to a malicious website and steal sensitive information.

B.

The primary risk is that an attacker could manipulate the cache of the web server or proxy server to return incorrect content for a specific URL or web page.

What user account is required to create a Golden Ticket in Active Directory?

A.

Local User account

B.

Domain User account

C.

Service account

D.

KRBTGT account

Which is the correct command to change the MAC address for an Ethernet adapter in a Unix-based system?

A.

ifconfig eth0 hw ether AA:BB:CC:DD:EE:FF

B.

ifconfig eth0 hdw ether AA:BB:CC:DD:EE:FF

C.

ifconfig eth0 hdwr ether AA:BB:CC:DD:EE:FF

D.

ifconfig eth0 hwr ether AA:BB:CC:DD:EE:FF

What RID is given to an Administrator account on a Microsoft Windows machine?

A.

0

B.

500

C.

501

D.

100