Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Network Security Practitioner (CNSP)

Last Update 19 hours ago Total Questions : 60

The Certified Network Security Practitioner (CNSP) content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include CNSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CNSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CNSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Network Security Practitioner (CNSP) practice test comfortably within the allotted time.

Question # 11

Which of the following files has the SUID permission set?

    -rwxr-sr-x 1 root root 4096 Jan 1 00:00 myfile

    -rwsr-xr-x 1 root root 4896 Jan 1 08:00 myprogram

    -rw-r--r-s 1 root root 4096 Jan 1 00:00 anotherfile

A.

myfile

B.

myprogram

C.

anotherfile

D.

All of the above

Question # 12

According to the screenshot below, which of the following statements are correct?

A.

The application is running on port 443 and the HTTPS protocol.

B.

The credentials have been submitted over the HTTP protocol.

C.

The credentials have been submitted over the HTTPS protocol.

D.

The application is running on port 80 and the HTTP protocol.

Question # 13

Which of the following files has the SGID permission set?

    -rwxr-sr-x 1 root root 4096 Jan 1 08:00 myfile

    -rwsr-xr-x 1 root root 4096 Jan 1 00:08 myprogram

    -rw-r--r-s 1 root root 4896 Jan 1 00:00 anotherfile

A.

myfile

B.

myprogram

C.

anotherfile

D.

All of the above

Question # 14

A system encrypts data prior to transmitting it over a network, and the system on the other end of the transmission media decrypts it. If the systems are using a symmetric encryption algorithm for encryption and decryption, which of the following statements is true?

A.

A symmetric encryption algorithm uses the same key to encrypt and decrypt data at both ends of the transmission media.

B.

A symmetric encryption algorithm uses different keys to encrypt and decrypt data at both ends of the transmission media.

C.

A symmetric encryption algorithm does not use keys to encrypt and decrypt data at both ends of the transmission media.

D.

A symmetric encryption algorithm is an insecure method used to encrypt data transmitted over transmission media.

Question # 15

What is the response from a closed TCP port which is behind a firewall?

A.

A FIN and an ACK packet

B.

RST and an ACK packet

C.

A SYN and an ACK packet

D.

No response

Question # 16

Which Kerberos ticket is required to generate a Silver Ticket?

A.

Session Ticket

B.

Ticket-Granting Ticket

C.

Service Account Ticket

D.

There is no specific ticket required for generating a Silver Ticket

Question # 17

What is the response from an open UDP port which is not behind a firewall?

A.

ICMP message showing Port Unreachable

B.

No response

C.

A SYN packet

D.

A FIN packet

Question # 18

Which of the following services do not encrypt its traffic by default?

A.

DNS

B.

SSH

C.

FTPS

D.

All of these

Go to page: