100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CREST CPSA 4, CPSA 5 Questions And Answers Graded A+. $10.99   Add to cart

Exam (elaborations)

CREST CPSA 4, CPSA 5 Questions And Answers Graded A+.

 0 view  0 purchase
  • Course
  • CREST CPSA 4, CPSA 5
  • Institution
  • CREST CPSA 4, CPSA 5

CREST CPSA 4, CPSA 5 Questions And Answers Graded A+. 100 - correct answer. Continue 101 - correct answer. Switching Protocols 102 - correct answer. Processing Internet Protocol Security (IPsec) - correct answer. a secure network protocol suite that aut...

[Show more]

Preview 3 out of 23  pages

  • November 3, 2024
  • 23
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CREST CPSA 4, CPSA 5
  • CREST CPSA 4, CPSA 5
avatar-seller
techgrades
CREST CPSA 4, CPSA 5 Questions And
Answers Graded A+.



100 - correct answer. Continue

101 - correct answer. Switching Protocols

102 - correct answer. Processing

Internet Protocol Security (IPsec) - correct answer. a secure network protocol suite
that authenticates and encrypts the packets of data sent over an Internet Protocol
network

Internet Protocol Security (IPsec) - correct answer. used in virtual private networks
(VPNs)

number of possible TCP ports - correct answer. 65535

number of possible UDP ports - correct answer. 65535

RFC1918 24-bit block - correct answer. 10.0.0.0/8

RFC1918 20-bit block - correct answer. 172.16.0.0/12

RFC1918 16-bit block - correct answer. 192.168.0.0/16

Common Vulnerabilities and Exposures (CVE) - correct answer. provides a
reference-method for publicly known information-security vulnerabilities and exposures

Common Vulnerability Scoring System (CVSS) - correct answer. an open industry
standard for assessing the severity of computer system security vulnerabilities

DREAD - correct answer. part of a system for risk-assessing computer security
threats

Common Weakness Enumeration (CWE) - correct answer. a category system for
software weaknesses and vulnerabilities

,National Vulnerability Database (NVD) - correct answer. the U.S. government
repository of standards-based vulnerability management data represented using the
Security Content Automation Protocol (SCAP)

500 - correct answer. Internal Server Error

501 - correct answer. Not Implemented

502 - correct answer. Bad Gateway

503 - correct answer. Service Unavailable

504 - correct answer. Gateway Timeout

505 - correct answer. HTTP Version Not Supported

511 - correct answer. Network Authentication Required

CHANGE_ON_INSTALL - correct answer. SYS

MANAGER - correct answer. SYSTEM

TIGER - correct answer. SCOTT

WOOD - correct answer. ADAMS

STEEL - correct answer. JONES

CLOTH - correct answer. CLARK

PAPER - correct answer. BLAKE

TRACE - correct answer. TRACESVR

MANAGER - correct answer. OLAPSYS

CHANGE_ON_INSTALL - correct answer. XDB

400 - correct answer. Bad Request

401 - correct answer. Unauthorized

402 - correct answer. Payment Required

403 - correct answer. Forbidden

, 404 - correct answer. Not Found

405 - correct answer. Method Not Allowed

406 - correct answer. Not Acceptable

407 - correct answer. Proxy Authentication Required

408 - correct answer. Request Timeout

409 - correct answer. Conflict

410 - correct answer. Gone

411 - correct answer. Length Required

413 - correct answer. Payload Too Large

426 - correct answer. Upgrade Required

429 - correct answer. Too Many Requests

threat - correct answer. a source of potential disruption, which has the potential to
cause a risk

risk - correct answer. the combination of consequences of a threat occurring and the
likelihood of it doing so

inherent risk - correct answer. the risk that an event will occur which may negatively
affect the achievement of organisation's objectives, assuming there are no controls in
place

residual risk - correct answer. the risk which remains after taking controls in to
account

Session Initiation Protocol (SIP) - correct answer. a signaling protocol used for
initiating, maintaining, and terminating real-time sessions that include voice, video and
messaging applications

SIP requests - correct answer. REGISTER; INVITE; ACK; BYE; CANCEL; UPDATE;
REFER; PRACK; SUBSCRIBE; NOTIFY; PUBLISH; MESSAGE; INFO; OPTIONS

IPsec security architecture - correct answer. Authentication Headers (AH)
Encapsulating Security Payloads (ESP)
Security Associations (SA) - Internet Security Association and Key Management
Protocol (ISAKMP); Internet Key Exchange (IKE and IKEv2)

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller techgrades. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

84146 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart