Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 2
Total 18 questions
Exam Code: CNSP                Update: Oct 15, 2025
Exam Name: Certified Network Security Practitioner (CNSP)

The SecOps Group Certified Network Security Practitioner (CNSP) CNSP Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

Which of the following services use TCP protocol?

A.

SNMP

B.

NTP

C.

HTTP

D.

IKE

Question # 2

How would you establish a null session to a Windows host from a Windows command prompt?

A.

net use \hostname\c$ "" /u:NULL

B.

net use \hostname\c$ "" /u:""

C.

net use \hostname\ipc$ "" /u:""

D.

net use \hostname\ipc$ "" /u:NULL

Question # 3

What ports can be queried to perform a DNS zone transfer?

A.

53/TCP

B.

53/UDP

C.

Both 1 and 2

D.

None of the above

Question # 4

Which of the following represents a valid Windows Registry key?

A.

HKEY_LOCAL_MACHINE

B.

HKEY_INTERNAL_CONFIG

C.

HKEY_ROOT_CLASSES

D.

HKEY_LOCAL_USER

Question # 5

What user account is required to create a Golden Ticket in Active Directory?

A.

Local User account

B.

Domain User account

C.

Service account

D.

KRBTGT account

Question # 6

What will be the subnet mask for 192.168.0.1/18?

A.

255.255.255.0

B.

255.225.225.0

C.

255.255.192.0

D.

255.225.192.0

Question # 7

If a hash begins with $2a$, what hashing algorithm has been used?

A.

Blowfish

B.

SHA256

C.

MD5

D.

SHA512

Question # 8

Which SMB (Server Message Block) network protocol version introduced support for encrypting SMB traffic?

A.

SMBv1

B.

SMBv2

C.

SMBv3

D.

None of the above

Question # 9

Which SMB (Server Message Block) network protocol versions are vulnerable to the EternalBlue (MS17-010) Windows exploit?

A.

SMBv1 only

B.

SMBv2 only

C.

SMBv3 only

D.

Both SMBv1 and SMBv2

Question # 10

Which of the following statements regarding Authorization and Authentication is true?

A.

Authorization is the process where requests to access a particular resource are granted or denied. Authentication is providing and validating the identity.

B.

Authentication is the process where requests to access a particular resource are granted or denied. Authorization is providing and validating identity.

C.

Authentication includes the execution rules that determine what functionality and data the user can access. Authentication and Authorization are both the same thing.

D.

Authentication controls which processes a person can use and which files they can access, read, or modify. Authentication and authorization typically do not operate together, thus making it impossible to determine who is accessing the information.

Page: 1 / 2
Total 18 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025