Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

The SecOps Group CNSP - Certified Network Security Practitioner (CNSP)

Page: 1 / 2
Total 60 questions

Which of the following services use TCP protocol?

A.

SNMP

B.

NTP

C.

HTTP

D.

IKE

Which of the following commands will work on a Microsoft operating system to add a new domain admin user?

A.

net group "Domain Admins" John /add /domain

B.

net user John "Domain Admins" /add /domain

C.

net user John /add /domain /admin

D.

net group "Administrator" John /add

In the context of the SSH (Secure Shell) public-private key authentication mechanism, which key is uploaded to the server and which key is used by the end-user for authentication?

A.

The public key is uploaded to the server and the private key is used by the end user for authentication.

B.

The private key is uploaded to the server and the public key is used by the end user for authentication.

Which of the following attacks are associated with an ICMP protocol?

A.

Ping of death

B.

Smurf attack

C.

ICMP flooding

D.

All of the following

Which of the following is not a DDoS attack?

A.

SYN Flood

B.

NTP Amplification

C.

UDP Flood

D.

Brute Force

Which one of the following is not an online attack?

A.

Brute force attack

B.

Rainbow table attack

C.

Password spraying attack

D.

Phishing attack

How many usable TCP/UDP ports are there?

A.

65536

B.

65535

C.

63535

D.

65335

You are performing a security audit on a company's network infrastructure and have discovered the SNMP community string set to the default value of "public" on several devices. What security risks could this pose, and how might you exploit it?

A.

The potential risk is that an attacker could use the SNMP protocol to gather sensitive information about the devices. You might use a tool like Snmpwalk to query the devices for information.

B.

The potential risk is that an attacker could use the SNMP protocol to modify the devices' configuration settings. You might use a tool like Snmpset to change the settings.

C.

Both A and B.

D.

None of the above.

What is the response from an open UDP port which is not behind a firewall?

A.

ICMP message showing Port Unreachable

B.

No response

C.

A SYN packet

D.

A FIN packet

In the context of a Unix-based system, where does a daemon process execute in the memory?

A.

Kernel space

B.

User space