CREST CPSA EXAM AND PRACTICE EXAM NEWEST
ACTUAL EXAM COMPLETE 500+ QUESTIONS AND CORRECT
DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY
GRADED A+
Name all OSI layers - CORRECT ANSWER Application,
Presentation, Session, Transport, Network, Data Link,
Physical.
Name all TCP/IP layers - CORRECT ANSWER Application,
Transport, internet, Network Access.
Name Four TCP head flags - CORRECT ANSWER ACK, FIN, SYN,
URG, PSH, RST
Which layer does HTTP protocl reside in the OSI model. -
CORRECT ANSWER Layer 7, Application.
Which layer does Ethernet reside in the OSI model. - CORRECT
ANSWER Layer 2, Data link.
Which Layer does IPv4 & IPv6 reside in TCP/IP model. -
CORRECT ANSWER Layer 4, transport.
RFC 1918 addresses - CORRECT ANSWER 10.0.0.0 -
10.255.255.255 (10/8 prefix)
172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
,Name the well know, registered and dynamic port ranges. -
CORRECT ANSWER Well Known(0-1023), Registed(1024-49,151)
& Dynamic(49,152-65,535)
What is an ephemeral port? - CORRECT ANSWER An ephemeral
port is a short-lived transport protocol port for Internet
Protocol (IP) communications. Can be used by both TCP &
UDP.
What does IANA stand for? - CORRECT ANSWER Internet
Assigned Numbers Authority
Name 10 common ports and there protocols. - CORRECT
ANSWER FTP21, SSH22, DHCP67(C), DHCP68(S), NTP123,
MYSQL3306, RDP3389, HTTP80, HTTPS443, SMB445,
KERBEROS88, CHARGEN19(UDP), DNS53, TACAS49,
WHOIS43, MSSQL1433, HIDDEN MSSQL2433.
Name five network types. - CORRECT ANSWER LAN, WAN,
MAN, VLAN, WLAN, PAN.
Name five network topologies - CORRECT ANSWER Mesh, Ring,
star, Tree, Bus.
Name five common ethernet and FDDI cable types. - CORRECT
ANSWER 100Base5, 10Base2, 10BaseT, 100Base-FL,
1000Base-T.
What is WIFI the alias for? - CORRECT ANSWER IEEE 802.11
What does VLAN stand for? - CORRECT ANSWER Virtual Local
Area Network
,How does VLAN work? - CORRECT ANSWER Virtual Local Area
Networks (VLANs) separate an existing physical network
into multiple logical networks.
Thus, each VLAN creates its own broadcast domain.
Communication between two VLANs can only occur through
a router that is connected to both.
Name five common ICMP types. - CORRECT ANSWER 8-echo, 0-
echo reply, 30-trace route, 5-redirect, 3-destination
unreachable, 11, time execeed.
What does ICMP stand for? - CORRECT ANSWER Internet
Control Message Protocol
What does TTL stand for? - CORRECT ANSWER Time to Live
What is TTL? - CORRECT ANSWER TTL is a hop count system,
and each router decreases the TTL by 1. Upon reaching 0,
the packet is dropped. This way you don't have packets not
reaching their destination and clogging the network.
OS TLL numbers? - CORRECT ANSWER 128 Windows, 64 linux,
255 solaris(kapp)
What is Traceroute - CORRECT ANSWER Traceroute is when
you send a packet with a TTL value of 1 once it reaches the
first router it will die sending a ICMP message to sender, at
which point the sender can send another one with a value of
2 to see how far it will go. By doing this we can see how
many hops it will take to reach our target. (A good way of
enumeration of a network, when in a black box pen-test.)
, What is ping sweep? - CORRECT ANSWER Ping sweep is just a
technique that can be used to find out which hosts are alive
in a network or large number of IP addresses.
Name Five Namp Flags. - CORRECT ANSWER (TCP SYN scan, -
sS)
(Null Scan, -sN)
(Ping Scan, -sP)
(Ack Scan, -sA)
(OS dect, -O)
What are the three firewall states? - CORRECT ANSWER Open,
Filtered Dropped Blocked, Closed not listening.
What is TCP window size? - CORRECT ANSWER Window size a
method of controlling the flow of packets between two
computers or network hosts. Decieded in the tcp three way
handshake.
What is encoding? - CORRECT ANSWER Encoding transforms
data into another format using a scheme that is publicly
available so that it can easily be reversed.
What is encryption? - CORRECT ANSWER scrambles
information into an alternative form that requires a key or
password to decrypt the information back into its orginial
form.
What is hashing - CORRECT ANSWER Hashing serves the
purpose of ensuring integrity, i.e. making it so that if
something is changed you can know that it's changed.