Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CNSP Exam Dumps - The SecOps Group Security Practitioner Questions and Answers

Question # 4

The Management Information Base (MIB) is a collection of object groups that is managed by which service?

Options:

A.

SMTP

B.

SNMP

C.

NTP

D.

TACACS

Buy Now
Question # 5

Which of the following represents a valid Windows Registry key?

Options:

A.

HKEY_LOCAL_MACHINE

B.

HKEY_INTERNAL_CONFIG

C.

HKEY_ROOT_CLASSES

D.

HKEY_LOCAL_USER

Buy Now
Question # 6

What is the response from an open UDP port which is not behind a firewall?

Options:

A.

ICMP message showing Port Unreachable

B.

No response

C.

A SYN packet

D.

A FIN packet

Buy Now
Question # 7

Which of the following is true for SNMP?

A)The default community string for read-only access is "public."

B)The default community string for read/write access is "private."

Options:

A.

Only A

B.

Only B

C.

Both A and B

D.

None of the above

Buy Now
Question # 8

Where are the password hashes stored in a Microsoft Windows 64-bit system?

Options:

A.

C:\Windows\System64\config\SAM

B.

C:\Windows\System32\config\SAM

C.

C:\System64\config\SAM

D.

C:\Windows\config\System32\SAM

Buy Now
Question # 9

A system encrypts data prior to transmitting it over a network, and the system on the other end of the transmission media decrypts it. If the systems are using a symmetric encryption algorithm for encryption and decryption, which of the following statements is true?

Options:

A.

A symmetric encryption algorithm uses the same key to encrypt and decrypt data at both ends of the transmission media.

B.

A symmetric encryption algorithm uses different keys to encrypt and decrypt data at both ends of the transmission media.

C.

A symmetric encryption algorithm does not use keys to encrypt and decrypt data at both ends of the transmission media.

D.

A symmetric encryption algorithm is an insecure method used to encrypt data transmitted over transmission media.

Buy Now
Question # 10

How many octets are there in an IPv6 address?

Options:

A.

16

B.

32

C.

64

D.

128

Buy Now
Question # 11

What is the response from a closed TCP port which is not behind a firewall?

Options:

A.

ICMP message showing Port Unreachable

B.

A FIN and an ACK packet

C.

A RST and an ACK packet

D.

A SYN and an ACK packet

Buy Now
Question # 12

Which of the following algorithms could be used to negotiate a shared encryption key?

Options:

A.

Triple-DES

B.

SHA1

C.

Diffie-Hellman

D.

AES

Buy Now
Question # 13

The Active Directory database file stores the data and schema information for the Active Directory database on domain controllers in Microsoft Windows operating systems. Which of the following file is the Active Directory database file?

Options:

A.

NTDS.DAT

B.

NTDS.MDB

C.

MSAD.MDB

D.

NTDS.DIT

Buy Now
Exam Code: CNSP
Exam Name: Certified Network Security Practitioner (CNSP)
Last Update: Apr 15, 2025
Questions: 60
CNSP pdf

CNSP PDF

$29.75  $84.99
CNSP Engine

CNSP Testing Engine

$33.25  $94.99
CNSP PDF + Engine

CNSP PDF + Testing Engine

$47.25  $134.99