CPSA Comprehensive Exam Questions And Answers Already Passed.
6 views 0 purchase
Course
CREST CPSA
Institution
CREST CPSA
In active directory, what does FSMO (pronounced "Fizz-Mo") stand for? - Answer Fixed Single Master Operations Flexible Security Master Operations Flexible Single Master Operations Forest Single Master Operations Forest Security Master Operations Flexible Single Master Operations
The active di...
CPSA Comprehensive Exam Questions
And Answers Already Passed.
In active directory, what does FSMO (pronounced "Fizz-Mo") stand for? - Answer Fixed Single Master
Operations Flexible Security Master Operations Flexible Single Master Operations Forest Single Master
Operations Forest Security Master Operations Flexible Single Master Operations
The active directory database file is: - Answer NTDS.DAT NTDS.MDB MSAD.DIT NTDS.DIT MDAD.MDB
NTDS.DIT
What command might you use to obtain a list of systems from a master browser, together with details
about the version and available services. - Answer amap nbtstat lservers nbtquery hping3 lservers
What is used for authentication in a Microsoft Active Directory domain? - Answer RADIUS TACACS +
TACACS + + Kerberos NIDS Kerberos
Which of the following Windows programs will list all the members of the Master Browser List? - Answer
whoami dompromo lservers nbtstat None of the above nbtstat
"What does the following command achieve? - Answer
Telnet <IP Address> <Port 80> - Answer
HEAD /HTTP/1.0 - Answer
<Return> - Answer
<Return>" - Answer This command returns the home page for the IP address specified This command
opens a backdoor Telnet session to the IP address specified This command returns the banner of the
website specified by the IP address This command allows a hacker to determine if the server has a SQL
database None of these This command returns the banner of the website specified by the IP address
,A system encrypts data prior to transmitting it over a network, and the system on the other end of the
transmission media decrypts it. If the systems are using a symmetric encryption algorithm for encryption
and decryption, which of the following statements is true? - Answer A symmetric encryption algorithm
uses the same key to encrypt and decrypt data at both ends of the transmission media A symmetric
encryption algorithm uses different keys to encrypt and decrypt data at both ends of the transmission
media A symmetric encryption algorithm does not use keys to encrypt and decrypt data at both ends of
the transmission media A symmetric encryption algorithm is an insecure method used to encrypt data
transmitted over transmission media None of these A symmetric encryption algorithm uses the same key
to encrypt and decrypt data at both ends of the transmission media
How many bits does SYSKEY use for encryption? - Answer 48 bits 56 bits 128 bits 256 bits None of
these 128 bits
How many secret bits in a 128-bit WEP key? - Answer 128 64 104 40 96 104
In an IPSEC VPN there are four main attribute classes. Which of the following is NOT one of those
classes? - Answer Encryption Algorithm Hash Algorithm Authentication Method Aggressive Mode
Diffie-Hellman group Aggressive Mode
Of the following choices, what can you use to encrypt e-mail? - Answer HMAC RIPEMD PII S/ MIME
None of these S/ MIME
Of the following choices, what is a benefit of IPsec? - Answer MAC filtering Flood guard Load balancing
Payload encryption Secures your IP Payload encryption
Sally encrypted a project file with her public key. Later, an administrator accidentally deleted her account
that had exclusive access to her private key. Can this project file be retrieved? - Answer No. If the
private key is lost, the data cannot be retrieved Yes. The public key can decrypt the file Yes, if a copy of
her public key is stored in escrow Yes, if the organization uses a recovery agent Yes, if she uses her
password Yes, if the organization uses a recovery agent
What are the four mandatory transform attributes for an IKE Phase-1 SA? - Answer Encryption
Algorithm, Hash Algorithm, Authentication Method, Diffie Hellman Group Encryption Algorithm, Key
Length, Authentication Method, SA Lifetime SA Lifetime, Key length, PRF, Field Size SA Lifetime, Hash
What do programs, such as Tripwire, MD5sum, and Windows System File Protection, all rely on? -
Answer Digital certificates Hashing Digital signatures Steganography Encryption Hashing
What does "export" signify for an SSL cipher - Answer It is a weak cipher that was acceptable for export
under the old US cryptography export regulations It is the strongest cipher that is currently permitted to
be exported from the US It is a cipher with integrated key escrow, which allows the NSA to recover the
key It is a cipher that is suitable for encrypting information to be sent across national borders It is a
stronger version of a cipher, similar to export versions of European lagers It is a weak cipher that was
acceptable for export under the old US cryptography export regulations
What is IKE? - Answer Internet Key Exchange Initial Key Exchange IBM Key Exchange Internal Key
Exchange Integrated Key Exchange Internet Key Exchange
What is SSL used for? - Answer Encrypt data as it travels over a network Encrypt files located on a Web
server Encrypt passwords for storage in a database Encrypt specific elements of data for application-
specific purposes Encrypt digital certificates used to authenticate a Web site Encrypt data as it travels
over a network
What is the length of the IV for a WEP key? - Answer 128 bits 64 bits 40 bits 24 bits 56 bits 24 bits
Which of the following algorithms could be used to negotiate a shared encryption key? - Answer Triple-
DES SHA1 DES AES Diffie-Hellman Diffie-Hellman
Which of the following is the correct definition of WEP? - Answer Wireless Encrypted Password Wired
Equivalent Privacy Wireless Enabled Password Wireless Extended Privacy Wired Equivalent Password
Wired Equivalent Privacy
Which of the following key sizes is considered the minimum recommended for a new SSL certificate? -
Answer 768 bits 1024 bits 2048 bits 3072 bits 256 bits 2048 bits
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TestSolver9. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.