CREST CPSA 4, CPSA 5 Questions And
Answers Graded A+.
100 - correct answer. Continue
101 - correct answer. Switching Protocols
102 - correct answer. Processing
Internet Protocol Security (IPsec) - correct answer. a secure network protocol suite
that authenticates and encrypts the packets of data sent over an Internet Protocol
network
Internet Protocol Security (IPsec) - correct answer. used in virtual private networks
(VPNs)
number of possible TCP ports - correct answer. 65535
number of possible UDP ports - correct answer. 65535
Common Vulnerabilities and Exposures (CVE) - correct answer. provides a
reference-method for publicly known information-security vulnerabilities and exposures
Common Vulnerability Scoring System (CVSS) - correct answer. an open industry
standard for assessing the severity of computer system security vulnerabilities
DREAD - correct answer. part of a system for risk-assessing computer security
threats
Common Weakness Enumeration (CWE) - correct answer. a category system for
software weaknesses and vulnerabilities
,National Vulnerability Database (NVD) - correct answer. the U.S. government
repository of standards-based vulnerability management data represented using the
Security Content Automation Protocol (SCAP)
threat - correct answer. a source of potential disruption, which has the potential to
cause a risk
risk - correct answer. the combination of consequences of a threat occurring and the
likelihood of it doing so
inherent risk - correct answer. the risk that an event will occur which may negatively
affect the achievement of organisation's objectives, assuming there are no controls in
place
residual risk - correct answer. the risk which remains after taking controls in to
account
Session Initiation Protocol (SIP) - correct answer. a signaling protocol used for
initiating, maintaining, and terminating real-time sessions that include voice, video and
messaging applications
IPsec security architecture - correct answer. Authentication Headers (AH)
Encapsulating Security Payloads (ESP)
Security Associations (SA) - Internet Security Association and Key Management
Protocol (ISAKMP); Internet Key Exchange (IKE and IKEv2)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller techgrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.