100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CPSA Comprehensive Exam Questions And Answers Already Passed. $9.99   Add to cart

Exam (elaborations)

CPSA Comprehensive Exam Questions And Answers Already Passed.

 6 views  0 purchase
  • Course
  • CREST CPSA
  • Institution
  • CREST CPSA

In active directory, what does FSMO (pronounced "Fizz-Mo") stand for? - Answer Fixed Single Master Operations Flexible Security Master Operations Flexible Single Master Operations Forest Single Master Operations Forest Security Master Operations Flexible Single Master Operations The active di...

[Show more]

Preview 3 out of 24  pages

  • August 8, 2024
  • 24
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CREST CPSA
  • CREST CPSA
avatar-seller
TestSolver9
CPSA Comprehensive Exam Questions
And Answers Already Passed.
In active directory, what does FSMO (pronounced "Fizz-Mo") stand for? - Answer Fixed Single Master
Operations Flexible Security Master Operations Flexible Single Master Operations Forest Single Master
Operations Forest Security Master Operations Flexible Single Master Operations



The active directory database file is: - Answer NTDS.DAT NTDS.MDB MSAD.DIT NTDS.DIT MDAD.MDB
NTDS.DIT



What command might you use to obtain a list of systems from a master browser, together with details
about the version and available services. - Answer amap nbtstat lservers nbtquery hping3 lservers



What is used for authentication in a Microsoft Active Directory domain? - Answer RADIUS TACACS +
TACACS + + Kerberos NIDS Kerberos



Which of the following Windows programs will list all the members of the Master Browser List? - Answer
whoami dompromo lservers nbtstat None of the above nbtstat



"What does the following command achieve? - Answer



Telnet <IP Address> <Port 80> - Answer



HEAD /HTTP/1.0 - Answer



<Return> - Answer



<Return>" - Answer This command returns the home page for the IP address specified This command
opens a backdoor Telnet session to the IP address specified This command returns the banner of the
website specified by the IP address This command allows a hacker to determine if the server has a SQL
database None of these This command returns the banner of the website specified by the IP address

,A system encrypts data prior to transmitting it over a network, and the system on the other end of the
transmission media decrypts it. If the systems are using a symmetric encryption algorithm for encryption
and decryption, which of the following statements is true? - Answer A symmetric encryption algorithm
uses the same key to encrypt and decrypt data at both ends of the transmission media A symmetric
encryption algorithm uses different keys to encrypt and decrypt data at both ends of the transmission
media A symmetric encryption algorithm does not use keys to encrypt and decrypt data at both ends of
the transmission media A symmetric encryption algorithm is an insecure method used to encrypt data
transmitted over transmission media None of these A symmetric encryption algorithm uses the same key
to encrypt and decrypt data at both ends of the transmission media



How many bits does SYSKEY use for encryption? - Answer 48 bits 56 bits 128 bits 256 bits None of
these 128 bits



How many secret bits in a 128-bit WEP key? - Answer 128 64 104 40 96 104



In an IPSEC VPN there are four main attribute classes. Which of the following is NOT one of those
classes? - Answer Encryption Algorithm Hash Algorithm Authentication Method Aggressive Mode
Diffie-Hellman group Aggressive Mode



Of the following choices, what can you use to encrypt e-mail? - Answer HMAC RIPEMD PII S/ MIME
None of these S/ MIME



Of the following choices, what is a benefit of IPsec? - Answer MAC filtering Flood guard Load balancing
Payload encryption Secures your IP Payload encryption



Sally encrypted a project file with her public key. Later, an administrator accidentally deleted her account
that had exclusive access to her private key. Can this project file be retrieved? - Answer No. If the
private key is lost, the data cannot be retrieved Yes. The public key can decrypt the file Yes, if a copy of
her public key is stored in escrow Yes, if the organization uses a recovery agent Yes, if she uses her
password Yes, if the organization uses a recovery agent



What are the four mandatory transform attributes for an IKE Phase-1 SA? - Answer Encryption
Algorithm, Hash Algorithm, Authentication Method, Diffie Hellman Group Encryption Algorithm, Key
Length, Authentication Method, SA Lifetime SA Lifetime, Key length, PRF, Field Size SA Lifetime, Hash

, Algorithm, Authentication Method, PRF Protocol ID, Transform ID, IPsec Mode, Authentication Algorithm
Encryption Algorithm, Hash Algorithm, Authentication Method, Diffie Hellman Group



What do programs, such as Tripwire, MD5sum, and Windows System File Protection, all rely on? -
Answer Digital certificates Hashing Digital signatures Steganography Encryption Hashing



What does "export" signify for an SSL cipher - Answer It is a weak cipher that was acceptable for export
under the old US cryptography export regulations It is the strongest cipher that is currently permitted to
be exported from the US It is a cipher with integrated key escrow, which allows the NSA to recover the
key It is a cipher that is suitable for encrypting information to be sent across national borders It is a
stronger version of a cipher, similar to export versions of European lagers It is a weak cipher that was
acceptable for export under the old US cryptography export regulations



What is IKE? - Answer Internet Key Exchange Initial Key Exchange IBM Key Exchange Internal Key
Exchange Integrated Key Exchange Internet Key Exchange



What is SSL used for? - Answer Encrypt data as it travels over a network Encrypt files located on a Web
server Encrypt passwords for storage in a database Encrypt specific elements of data for application-
specific purposes Encrypt digital certificates used to authenticate a Web site Encrypt data as it travels
over a network



What is the length of the IV for a WEP key? - Answer 128 bits 64 bits 40 bits 24 bits 56 bits 24 bits



Which of the following algorithms could be used to negotiate a shared encryption key? - Answer Triple-
DES SHA1 DES AES Diffie-Hellman Diffie-Hellman



Which of the following is the correct definition of WEP? - Answer Wireless Encrypted Password Wired
Equivalent Privacy Wireless Enabled Password Wireless Extended Privacy Wired Equivalent Password
Wired Equivalent Privacy



Which of the following key sizes is considered the minimum recommended for a new SSL certificate? -
Answer 768 bits 1024 bits 2048 bits 3072 bits 256 bits 2048 bits

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TestSolver9. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76667 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart