Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CNSP Certified Network Security Practitioner (CNSP) Questions and Answers

Questions 4

On a Microsoft Windows operating system, what does the following command do?

net localgroup Sales Sales_domain /add

Options:

A.

Display the list of the users of a local group Sales

B.

Add a domain group to the local group Sales

C.

Add a new user to the local group Sales

D.

Add a local group Sales to the domain group

Buy Now
Questions 5

Which SMB (Server Message Block) network protocol versions are vulnerable to the EternalBlue (MS17-010) Windows exploit?

Options:

A.

SMBv1 only

B.

SMBv2 only

C.

SMBv3 only

D.

Both SMBv1 and SMBv2

Buy Now
Questions 6

In the context of the SSH (Secure Shell) public-private key authentication mechanism, which key is uploaded to the server and which key is used by the end-user for authentication?

Options:

A.

The public key is uploaded to the server and the private key is used by the end user for authentication.

B.

The private key is uploaded to the server and the public key is used by the end user for authentication.

Buy Now
Questions 7

What is the response from a closed UDP port which is not behind a firewall?

Options:

A.

ICMP message showing Destination Unreachable

B.

A RST packet

C.

No response

D.

None of the above

Buy Now
Questions 8

If a hash begins with $2a$, what hashing algorithm has been used?

Options:

A.

Blowfish

B.

SHA256

C.

MD5

D.

SHA512

Buy Now
Questions 9

Which of the following protocols is not vulnerable to address spoofing attacks if implemented correctly?

Options:

A.

UDP

B.

ARP

C.

TCP

D.

IP

Buy Now
Questions 10

You are performing a security audit on a company's infrastructure and have discovered that the domain name system (DNS) server is vulnerable to a DNS cache poisoning attack. What is the primary security risk?

Options:

A.

The primary risk is that an attacker could redirect traffic to a malicious website and steal sensitive information.

B.

The primary risk is that an attacker could manipulate the cache of the web server or proxy server to return incorrect content for a specific URL or web page.

Buy Now
Questions 11

Which of the following commands will work on a Microsoft operating system to add a new domain admin user?

Options:

A.

net group "Domain Admins" John /add /domain

B.

net user John "Domain Admins" /add /domain

C.

net user John /add /domain /admin

D.

net group "Administrator" John /add

Buy Now
Questions 12

Which of the following attacks are associated with an ICMP protocol?

Options:

A.

Ping of death

B.

Smurf attack

C.

ICMP flooding

D.

All of the following

Buy Now
Questions 13

Which built-in Windows utility can be used to verify the validity of a Kerberos ticket?

Options:

A.

Klist

B.

Kerbtray

C.

Netsh

D.

Kerberos Manager

Buy Now
Questions 14

What ports can be queried to perform a DNS zone transfer?

Options:

A.

53/TCP

B.

53/UDP

C.

Both 1 and 2

D.

None of the above

Buy Now
Questions 15

Which is the correct command to change the MAC address for an Ethernet adapter in a Unix-based system?

Options:

A.

ifconfig eth0 hw ether AA:BB:CC:DD:EE:FF

B.

ifconfig eth0 hdw ether AA:BB:CC:DD:EE:FF

C.

ifconfig eth0 hdwr ether AA:BB:CC:DD:EE:FF

D.

ifconfig eth0 hwr ether AA:BB:CC:DD:EE:FF

Buy Now
Questions 16

Which of the following is not a DDoS attack?

Options:

A.

SYN Flood

B.

NTP Amplification

C.

UDP Flood

D.

Brute Force

Buy Now
Questions 17

Which of the following files has the SGID permission set?

    -rwxr-sr-x 1 root root 4096 Jan 1 08:00 myfile

    -rwsr-xr-x 1 root root 4096 Jan 1 00:08 myprogram

    -rw-r--r-s 1 root root 4896 Jan 1 00:00 anotherfile

Options:

A.

myfile

B.

myprogram

C.

anotherfile

D.

All of the above

Buy Now
Questions 18

If you find the 111/TCP port open on a Unix system, what is the next logical step to take?

Options:

A.

Run "rpcinfo -p " to enumerate the RPC services.

B.

Telnet to the port to look for a banner.

C.

Telnet to the port, send "GET / HTTP/1.0" and gather information from the response.

D.

None of the above.

Buy Now
Exam Code: CNSP
Exam Name: Certified Network Security Practitioner (CNSP)
Last Update: Sep 11, 2025
Questions: 60

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99