Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CNSP Certified Network Security Practitioner (CNSP) Questions and Answers

Questions 4

Which of the aforementioned SSL/TLS protocols are considered to be unsafe?

Options:

A.

SSLv2 and SSLv3

B.

TLSv1.0 and TLSv1.1

C.

Both A and B

D.

SSLv2, SSLv3, TLSv1.0, TLSv1.1, TLSv1.2, and TLSv1.3

Buy Now
Questions 5

On a Microsoft Windows operating system, what does the following command do?

net localgroup Sales Sales_domain /add

Options:

A.

Display the list of the users of a local group Sales

B.

Add a domain group to the local group Sales

C.

Add a new user to the local group Sales

D.

Add a local group Sales to the domain group

Buy Now
Questions 6

In a Linux-based architecture, what does the /mnt directory contain?

Options:

A.

Temporary-mounted filesystems

B.

System configuration files and initialization scripts

C.

Loadable driver modules needed to boot the system

D.

System files which represent the current state of the kernel

Buy Now
Questions 7

How many usable TCP/UDP ports are there?

Options:

A.

65536

B.

65535

C.

63535

D.

65335

Buy Now
Questions 8

What will be the subnet mask for 192.168.0.1/18?

Options:

A.

255.255.255.0

B.

255.225.225.0

C.

255.255.192.0

D.

255.225.192.0

Buy Now
Questions 9

Which one of the following is not an online attack?

Options:

A.

Brute force attack

B.

Rainbow table attack

C.

Password spraying attack

D.

Phishing attack

Buy Now
Questions 10

Which of the following statements regarding Authorization and Authentication is true?

Options:

A.

Authorization is the process where requests to access a particular resource are granted or denied. Authentication is providing and validating the identity.

B.

Authentication is the process where requests to access a particular resource are granted or denied. Authorization is providing and validating identity.

C.

Authentication includes the execution rules that determine what functionality and data the user can access. Authentication and Authorization are both the same thing.

D.

Authentication controls which processes a person can use and which files they can access, read, or modify. Authentication and authorization typically do not operate together, thus making it impossible to determine who is accessing the information.

Buy Now
Questions 11

Which SMB (Server Message Block) network protocol versions are vulnerable to the EternalBlue (MS17-010) Windows exploit?

Options:

A.

SMBv1 only

B.

SMBv2 only

C.

SMBv3 only

D.

Both SMBv1 and SMBv2

Buy Now
Questions 12

What is the response from an open TCP port which is not behind a firewall?

Options:

A.

A FIN and an ACK packet

B.

A SYN packet

C.

A SYN and an ACK packet

D.

A RST and an ACK packet

Buy Now
Questions 13

Where are the password hashes stored in the Linux file system?

Options:

A.

/etc/passwd

B.

/etc/password

C.

/etc/shadow

D.

/usr/bin/shadow

Buy Now
Questions 14

WannaCry, an attack, spread throughout the world in May 2017 using machines running on outdated Microsoft operating systems. What is WannaCry?

Options:

A.

Ransomware

B.

Malware

Buy Now
Questions 15

What types of attacks are phishing, spear phishing, vishing, scareware, and watering hole?

Options:

A.

Probes

B.

Insider threats

C.

Social engineering

D.

Ransomware

Buy Now
Questions 16

What is the response from a closed UDP port which is not behind a firewall?

Options:

A.

ICMP message showing Destination Unreachable

B.

A RST packet

C.

No response

D.

None of the above

Buy Now
Questions 17

What is the response from a closed TCP port which is behind a firewall?

Options:

A.

A FIN and an ACK packet

B.

RST and an ACK packet

C.

A SYN and an ACK packet

D.

No response

Buy Now
Questions 18

You are performing a security audit on a company's infrastructure and have discovered that the domain name system (DNS) server is vulnerable to a DNS cache poisoning attack. What is the primary security risk?

Options:

A.

The primary risk is that an attacker could redirect traffic to a malicious website and steal sensitive information.

B.

The primary risk is that an attacker could manipulate the cache of the web server or proxy server to return incorrect content for a specific URL or web page.

Buy Now
Exam Code: CNSP
Exam Name: Certified Network Security Practitioner (CNSP)
Last Update: May 11, 2026
Questions: 60

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CNSP testing engine

PDF (Q&A)

$43.57  $124.49
buy now CNSP pdf