Package deal
CREST CPSA Exam Bundle Questions and Answers Latest Update 100% SOLVED
CREST CPSA Exam Bundle Questions and Answers Latest Update 100% SOLVED
[Show more]CREST CPSA Exam Bundle Questions and Answers Latest Update 100% SOLVED
[Show more]TCP - ANSWER-Transmission Control Protocol 
 
UDP - ANSWER-User Datagram Protocol 
 
Port 21 - ANSWER-FTP 
 
FTP - ANSWER-File Transfer Protocol 
 
Port 22 - ANSWER-SSH 
 
SSH - ANSWER-Secure Shell 
 
Port 23 - ANSWER-Telnet 
 
Port 25 - ANSWER-SMTP 
 
SMTP - ANSWER-Simple Mail Transfer Protocol 
 
...
Preview 3 out of 26 pages
Add to cartTCP - ANSWER-Transmission Control Protocol 
 
UDP - ANSWER-User Datagram Protocol 
 
Port 21 - ANSWER-FTP 
 
FTP - ANSWER-File Transfer Protocol 
 
Port 22 - ANSWER-SSH 
 
SSH - ANSWER-Secure Shell 
 
Port 23 - ANSWER-Telnet 
 
Port 25 - ANSWER-SMTP 
 
SMTP - ANSWER-Simple Mail Transfer Protocol 
 
...
TCP Port 1 - ANSWER-Multiplexer tcpmux 
 
TCP Port 7 - ANSWER-Echo 
 
TCP Port 11 - ANSWER-System status. syst at 
 
TCP 13 - ANSWER-Date and time. 
 
TCP 15 - ANSWER-netstat 
 
TCP 19 - ANSWER-chargen 
 
TCP 21 - ANSWER-ftp 
 
TCP 22 - ANSWER-ssh 
 
TCP 23 - ANSWER-Telnet 
 
TCP 25 - ANSWER-smtp 
 ...
Preview 2 out of 7 pages
Add to cartTCP Port 1 - ANSWER-Multiplexer tcpmux 
 
TCP Port 7 - ANSWER-Echo 
 
TCP Port 11 - ANSWER-System status. syst at 
 
TCP 13 - ANSWER-Date and time. 
 
TCP 15 - ANSWER-netstat 
 
TCP 19 - ANSWER-chargen 
 
TCP 21 - ANSWER-ftp 
 
TCP 22 - ANSWER-ssh 
 
TCP 23 - ANSWER-Telnet 
 
TCP 25 - ANSWER-smtp 
 ...
A1) Pentest structure - ANSWER-Reconnaissance (i.e. find live hosts, sweeping, find services, scanning, banner matching, find vulnerabilities). Target prioritisation (e.g. assess servers rather than printers). Testing of services and exploitation if applicable. Consult/Confirm with customer if ok to...
Preview 4 out of 49 pages
Add to cartA1) Pentest structure - ANSWER-Reconnaissance (i.e. find live hosts, sweeping, find services, scanning, banner matching, find vulnerabilities). Target prioritisation (e.g. assess servers rather than printers). Testing of services and exploitation if applicable. Consult/Confirm with customer if ok to...
TCP Port 7 - ANSWER-Echo 
 
TCP Port 11 - ANSWER-System status. syst at 
 
TCP 13 - ANSWER-Date and time. 
 
TCP 15 - ANSWER-netstat 
 
TCP 19 - ANSWER-chargen 
 
TCP 21 - ANSWER-ftp 
 
TCP 22 - ANSWER-ssh 
 
TCP 23 - ANSWER-Telnet 
 
TCP 25 - ANSWER-smtp 
 
TCP 37 - ANSWER-Time 
 
TCP 42 - ANSWER-w...
Preview 2 out of 7 pages
Add to cartTCP Port 7 - ANSWER-Echo 
 
TCP Port 11 - ANSWER-System status. syst at 
 
TCP 13 - ANSWER-Date and time. 
 
TCP 15 - ANSWER-netstat 
 
TCP 19 - ANSWER-chargen 
 
TCP 21 - ANSWER-ftp 
 
TCP 22 - ANSWER-ssh 
 
TCP 23 - ANSWER-Telnet 
 
TCP 25 - ANSWER-smtp 
 
TCP 37 - ANSWER-Time 
 
TCP 42 - ANSWER-w...
548 - ANSWER-Apple Filing Protocol (AFP) 
 
179 - ANSWER-BGP (Border Gateway Protocol) 
 
67 - ANSWER-DHCP 
 
68 - ANSWER-DHCP 
 
19 - ANSWER-Chargen 
 
13 - ANSWER-Daytime 
 
135 - ANSWER-DCE Endpoint Resolution / RPC Endpoint Mapper / DCOM 
 
546 - ANSWER-DHCPv6 (Client) 
 
547 - ANSWER-DHCPv6 Ser...
Preview 1 out of 4 pages
Add to cart548 - ANSWER-Apple Filing Protocol (AFP) 
 
179 - ANSWER-BGP (Border Gateway Protocol) 
 
67 - ANSWER-DHCP 
 
68 - ANSWER-DHCP 
 
19 - ANSWER-Chargen 
 
13 - ANSWER-Daytime 
 
135 - ANSWER-DCE Endpoint Resolution / RPC Endpoint Mapper / DCOM 
 
546 - ANSWER-DHCPv6 (Client) 
 
547 - ANSWER-DHCPv6 Ser...
IMAP - ANSWER-143 
 
Border Gateway Protocol - ANSWER-179 
 
SNMP - ANSWER-161 
 
DHCP Server - ANSWER-67 UDP 
 
DHCP Client - ANSWER-68 UDP 
 
ARP - ANSWER-219 
 
DNS - ANSWER-53 UDP 
 
Echo - ANSWER-7 
 
Finger - ANSWER-79 
 
FTP Control - ANSWER-21 
 
FTP Data - ANSWER-20 
 
FTPS - ANSWER-989 
 
...
Preview 1 out of 2 pages
Add to cartIMAP - ANSWER-143 
 
Border Gateway Protocol - ANSWER-179 
 
SNMP - ANSWER-161 
 
DHCP Server - ANSWER-67 UDP 
 
DHCP Client - ANSWER-68 UDP 
 
ARP - ANSWER-219 
 
DNS - ANSWER-53 UDP 
 
Echo - ANSWER-7 
 
Finger - ANSWER-79 
 
FTP Control - ANSWER-21 
 
FTP Data - ANSWER-20 
 
FTPS - ANSWER-989 
 
...
WMIC - ANSWER-Windows Management Instrumentation Command Line Tool 
 
TKIP - ANSWER-Temporal Key Integrity Protocol 
 
CCMP - ANSWER-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
Preview 1 out of 1 pages
Add to cartWMIC - ANSWER-Windows Management Instrumentation Command Line Tool 
 
TKIP - ANSWER-Temporal Key Integrity Protocol 
 
CCMP - ANSWER-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
Black Box Testing - ANSWER-Occurs when a tester is not provided with any information about the system or program prior to conducting the test 
 
Grey Box Testing - ANSWER-This refers to a situation where the tester has partial knowledge of internal architectures and systems, or other preliminary inf...
Preview 1 out of 1 pages
Add to cartBlack Box Testing - ANSWER-Occurs when a tester is not provided with any information about the system or program prior to conducting the test 
 
Grey Box Testing - ANSWER-This refers to a situation where the tester has partial knowledge of internal architectures and systems, or other preliminary inf...
Risk Assessment is done based on (Format: 
1. answer 
2. answer 
etc) - ANSWER-1. Asset value 
2. Vulnerability 
3. Threat 
4. Probability 
5. Impact 
 
The steps involved in Risk Assessment are (Format: 
1. R 
2. V 
3. P) - ANSWER-1. Resource Identification 
2. Vulnerability and threat identifica...
Preview 3 out of 16 pages
Add to cartRisk Assessment is done based on (Format: 
1. answer 
2. answer 
etc) - ANSWER-1. Asset value 
2. Vulnerability 
3. Threat 
4. Probability 
5. Impact 
 
The steps involved in Risk Assessment are (Format: 
1. R 
2. V 
3. P) - ANSWER-1. Resource Identification 
2. Vulnerability and threat identifica...
DTP - ANSWER-Dynamic Trunking Protocol 
 
SLIP - ANSWER-Serial Line Internet Protocol 
 
L2F - ANSWER-Layer 2 Forwarding 
 
L2TP - ANSWER-Layer 2 tunneling protocol 
 
ISDN - ANSWER-Integrated services digital network 
 
IGMP - ANSWER-Internet Group Management Protocol 
 
IOC - ANSWER-Indications of...
Preview 3 out of 20 pages
Add to cartDTP - ANSWER-Dynamic Trunking Protocol 
 
SLIP - ANSWER-Serial Line Internet Protocol 
 
L2F - ANSWER-Layer 2 Forwarding 
 
L2TP - ANSWER-Layer 2 tunneling protocol 
 
ISDN - ANSWER-Integrated services digital network 
 
IGMP - ANSWER-Internet Group Management Protocol 
 
IOC - ANSWER-Indications of...
ACL - ANSWER-Access Control List 
 
AD - ANSWER-Active Directory 
 
AES - ANSWER-Advanced Encryption Standard 
 
AJAX - ANSWER-Asynchronous JavaScript and XML 
 
ARP - ANSWER-Address Resolution Protocol 
 
BGP - ANSWER-Border Gateway Protocol 
 
BoF - ANSWER-Buffer Overflow 
 
CA - ANSWER-Certificat...
Preview 2 out of 5 pages
Add to cartACL - ANSWER-Access Control List 
 
AD - ANSWER-Active Directory 
 
AES - ANSWER-Advanced Encryption Standard 
 
AJAX - ANSWER-Asynchronous JavaScript and XML 
 
ARP - ANSWER-Address Resolution Protocol 
 
BGP - ANSWER-Border Gateway Protocol 
 
BoF - ANSWER-Buffer Overflow 
 
CA - ANSWER-Certificat...
How Do We Define A Computer Breach or Intrusion? - ANSWER-A computer breach can be considered as either an intentional or unintentional situation which affects the C.I.A of a computer. 
 
Goals of Incident Response - ANSWER-1. Prepare for the inevitable 
 
2. Identify the Intrusion 
 
3. Contain the...
Preview 2 out of 7 pages
Add to cartHow Do We Define A Computer Breach or Intrusion? - ANSWER-A computer breach can be considered as either an intentional or unintentional situation which affects the C.I.A of a computer. 
 
Goals of Incident Response - ANSWER-1. Prepare for the inevitable 
 
2. Identify the Intrusion 
 
3. Contain the...
full protection of rights, return of land, freedom from british imperial - ANSWER-aims 
 
demonstrations and strikes/ supported the rand revolt in 1922 - ANSWER-methods 
 
initially supported by white workers but by 1940s there were 7000 black members/ established trade unions to raise wages such as...
Preview 1 out of 1 pages
Add to cartfull protection of rights, return of land, freedom from british imperial - ANSWER-aims 
 
demonstrations and strikes/ supported the rand revolt in 1922 - ANSWER-methods 
 
initially supported by white workers but by 1940s there were 7000 black members/ established trade unions to raise wages such as...
Risk Assessment is done based on (Format: 
1. answer 
2. answer 
etc) - ANSWER-1. Asset value 
2. Vulnerability 
3. Threat 
4. Probability 
5. Impact 
 
The steps involved in Risk Assessment are (Format: 
1. R 
2. V 
3. P) - ANSWER-1. Resource Identification 
2. Vulnerability and threat identifica...
Preview 3 out of 16 pages
Add to cartRisk Assessment is done based on (Format: 
1. answer 
2. answer 
etc) - ANSWER-1. Asset value 
2. Vulnerability 
3. Threat 
4. Probability 
5. Impact 
 
The steps involved in Risk Assessment are (Format: 
1. R 
2. V 
3. P) - ANSWER-1. Resource Identification 
2. Vulnerability and threat identifica...
What is MPLS? - ANSWER-Multiprotocol Label Switching (MPLS) is a type of data-carrying technique for high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing t...
Preview 2 out of 7 pages
Add to cartWhat is MPLS? - ANSWER-Multiprotocol Label Switching (MPLS) is a type of data-carrying technique for high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing t...
NTDS.DIT MDAD.MDB NTDS.DIT 
 
What command might you use to obtain a list of systems from a master browser, together with details about the version and available services. - ANSWER-amap nbtstat lservers nbtquery hping3 lservers 
 
What is used for authentication in a Microsoft Active Directory domai...
Preview 3 out of 20 pages
Add to cartNTDS.DIT MDAD.MDB NTDS.DIT 
 
What command might you use to obtain a list of systems from a master browser, together with details about the version and available services. - ANSWER-amap nbtstat lservers nbtquery hping3 lservers 
 
What is used for authentication in a Microsoft Active Directory domai...
802.3 - ANSWER-Ethernet 
 
802.5 - ANSWER-Token Ring 
 
802.11 - ANSWER-wireless 
 
ppp - ANSWER-Point-to-Point Protocol 
 
hdlc - ANSWER-High-Level Data Link Control 
 
Mac Address - ANSWER-Media Access Control 
 
Mac Address Bits - ANSWER-48 
 
Mac Address Bytes - ANSWER-12 
 
Mac Address OUI - AN...
Preview 1 out of 4 pages
Add to cart802.3 - ANSWER-Ethernet 
 
802.5 - ANSWER-Token Ring 
 
802.11 - ANSWER-wireless 
 
ppp - ANSWER-Point-to-Point Protocol 
 
hdlc - ANSWER-High-Level Data Link Control 
 
Mac Address - ANSWER-Media Access Control 
 
Mac Address Bits - ANSWER-48 
 
Mac Address Bytes - ANSWER-12 
 
Mac Address OUI - AN...
Patch Enumeration Tools - ANSWER-Patches Tool - Solaris Management Console Tool 
patchadd - Add patches 
patchrm - remove patches 
 
Patch Management Tools - ANSWER-patchadd -p 
showrev -p 
showrev -a 
 
System Wide Crontab - ANSWER-/etc/crontab 
 
List missing patches - Update - ANSWER-sunpatchche...
Preview 1 out of 1 pages
Add to cartPatch Enumeration Tools - ANSWER-Patches Tool - Solaris Management Console Tool 
patchadd - Add patches 
patchrm - remove patches 
 
Patch Management Tools - ANSWER-patchadd -p 
showrev -p 
showrev -a 
 
System Wide Crontab - ANSWER-/etc/crontab 
 
List missing patches - Update - ANSWER-sunpatchche...
Host based Access Control? - ANSWER-- Based on DNS/IP, add hosts to the list via the xhost command. 
- Not secure as anyone on the remote machine can access your display 
- xhost + command grants access to everyone 
- xhost - command restricts access, but is still possible on localhost 
 
User Base...
Preview 1 out of 1 pages
Add to cartHost based Access Control? - ANSWER-- Based on DNS/IP, add hosts to the list via the xhost command. 
- Not secure as anyone on the remote machine can access your display 
- xhost + command grants access to everyone 
- xhost - command restricts access, but is still possible on localhost 
 
User Base...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller IMORA. Stuvia facilitates payment to the seller.
No, you only buy these notes for $22.99. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
67866 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now