Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Certified Network Security Practitioner (CNSP) Question and Answers

Certified Network Security Practitioner (CNSP)

Last Update Oct 7, 2025
Total Questions : 60

We are offering FREE CNSP The SecOps Group exam questions. All you do is to just go and sign up. Give your details, prepare CNSP free exam questions and then go for complete pool of Certified Network Security Practitioner (CNSP) test questions that will help you more.

CNSP pdf

CNSP PDF

$42  $104.99
CNSP Engine

CNSP Testing Engine

$50  $124.99
CNSP PDF + Engine

CNSP PDF + Testing Engine

$66  $164.99
Questions 1

Which of the following is not a DDoS attack?

Options:

A.  

SYN Flood

B.  

NTP Amplification

C.  

UDP Flood

D.  

Brute Force

Discussion 0
Questions 2

Which is the correct command to change the MAC address for an Ethernet adapter in a Unix-based system?

Options:

A.  

ifconfig eth0 hw ether AA:BB:CC:DD:EE:FF

B.  

ifconfig eth0 hdw ether AA:BB:CC:DD:EE:FF

C.  

ifconfig eth0 hdwr ether AA:BB:CC:DD:EE:FF

D.  

ifconfig eth0 hwr ether AA:BB:CC:DD:EE:FF

Discussion 0
Questions 3

What types of attacks are phishing, spear phishing, vishing, scareware, and watering hole?

Options:

A.  

Probes

B.  

Insider threats

C.  

Social engineering

D.  

Ransomware

Discussion 0
Questions 4

Which of the following files has the SGID permission set?

    -rwxr-sr-x 1 root root 4096 Jan 1 08:00 myfile

    -rwsr-xr-x 1 root root 4096 Jan 1 00:08 myprogram

    -rw-r--r-s 1 root root 4896 Jan 1 00:00 anotherfile

Options:

A.  

myfile

B.  

myprogram

C.  

anotherfile

D.  

All of the above

Discussion 0
Questions 5

Which built-in Windows utility can be used to verify the validity of a Kerberos ticket?

Options:

A.  

Klist

B.  

Kerbtray

C.  

Netsh

D.  

Kerberos Manager

Discussion 0
Questions 6

If a hash begins with $2a$, what hashing algorithm has been used?

Options:

A.  

Blowfish

B.  

SHA256

C.  

MD5

D.  

SHA512

Discussion 0
Questions 7

The application is showing a TLS error message as a result of a website administrator failing to timely renew the TLS certificate. But upon deeper analysis, it appears that the problem is brought on by the expiration of the TLS certificate. Which of the following statements is correct?

Options:

A.  

The communication between the browser and the server is now no longer over TLS.

B.  

The communication between the browser and the server is still over TLS.

Discussion 0
Questions 8

Which of the following attacks are associated with an ICMP protocol?

Options:

A.  

Ping of death

B.  

Smurf attack

C.  

ICMP flooding

D.  

All of the following

Discussion 0
Questions 9

How would you establish a null session to a Windows host from a Windows command prompt?

Options:

A.  

net use \hostname\c$ "" /u:NULL

B.  

net use \hostname\c$ "" /u:""

C.  

net use \hostname\ipc$ "" /u:""

D.  

net use \hostname\ipc$ "" /u:NULL

Discussion 0
Questions 10

What is the response from an open UDP port which is not behind a firewall?

Options:

A.  

ICMP message showing Port Unreachable

B.  

No response

C.  

A SYN packet

D.  

A FIN packet

Discussion 0
Questions 11

What ports can be queried to perform a DNS zone transfer?

Options:

A.  

53/TCP

B.  

53/UDP

C.  

Both 1 and 2

D.  

None of the above

Discussion 0
Questions 12

If you find the 111/TCP port open on a Unix system, what is the next logical step to take?

Options:

A.  

Run "rpcinfo -p " to enumerate the RPC services.

B.  

Telnet to the port to look for a banner.

C.  

Telnet to the port, send "GET / HTTP/1.0" and gather information from the response.

D.  

None of the above.

Discussion 0
Questions 13

What will be the subnet mask for 192.168.0.1/18?

Options:

A.  

255.255.255.0

B.  

255.225.225.0

C.  

255.255.192.0

D.  

255.225.192.0

Discussion 0
Questions 14

The Management Information Base (MIB) is a collection of object groups that is managed by which service?

Options:

A.  

SMTP

B.  

SNMP

C.  

NTP

D.  

TACACS

Discussion 0
Questions 15

WannaCry, an attack, spread throughout the world in May 2017 using machines running on outdated Microsoft operating systems. What is WannaCry?

Options:

A.  

Ransomware

B.  

Malware

Discussion 0
Questions 16

Where are the password hashes stored in the Linux file system?

Options:

A.  

/etc/passwd

B.  

/etc/password

C.  

/etc/shadow

D.  

/usr/bin/shadow

Discussion 0
Questions 17

What is the response from a closed TCP port which is behind a firewall?

Options:

A.  

A FIN and an ACK packet

B.  

RST and an ACK packet

C.  

A SYN and an ACK packet

D.  

No response

Discussion 0
Questions 18

Which of the aforementioned SSL/TLS protocols are considered to be unsafe?

Options:

A.  

SSLv2 and SSLv3

B.  

TLSv1.0 and TLSv1.1

C.  

Both A and B

D.  

SSLv2, SSLv3, TLSv1.0, TLSv1.1, TLSv1.2, and TLSv1.3

Discussion 0