Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free The SecOps Group CNSP Practice Exam with Questions & Answers

Questions 1

How many usable TCP/UDP ports are there?

Options:
A.

65536

B.

65535

C.

63535

D.

65335

The SecOps Group CNSP Premium Access
Questions 2

Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?

Options:
A.

DNS tunneling

B.

VLAN hopping

C.

Covert channels

D.

All of the above

Questions 3

Where are the password hashes stored in a Microsoft Windows 64-bit system?

Options:
A.

C:\Windows\System64\config\SAM

B.

C:\Windows\System32\config\SAM

C.

C:\System64\config\SAM

D.

C:\Windows\config\System32\SAM

Questions 4

Which of the aforementioned SSL/TLS protocols are considered to be unsafe?

Options:
A.

SSLv2 and SSLv3

B.

TLSv1.0 and TLSv1.1

C.

Both A and B

D.

SSLv2, SSLv3, TLSv1.0, TLSv1.1, TLSv1.2, and TLSv1.3

Questions 5

Which of the following services use TCP protocol?

Options:
A.

SNMP

B.

NTP

C.

HTTP

D.

IKE

Questions 6

On a Microsoft Windows Operating System, what does the following command do?

net localgroup administrators

Options:
A.

List domain admin users for the current domain

B.

Displays the local administrators group on the computer

Questions 7

In a Linux-based architecture, what does the /mnt directory contain?

Options:
A.

Temporary-mounted filesystems

B.

System configuration files and initialization scripts

C.

Loadable driver modules needed to boot the system

D.

System files which represent the current state of the kernel

Questions 8

Which of the following represents a valid Windows Registry key?

Options:
A.

HKEY_LOCAL_MACHINE

B.

HKEY_INTERNAL_CONFIG

C.

HKEY_ROOT_CLASSES

D.

HKEY_LOCAL_USER

Questions 9

In the context of the SSH (Secure Shell) public-private key authentication mechanism, which key is uploaded to the server and which key is used by the end-user for authentication?

Options:
A.

The public key is uploaded to the server and the private key is used by the end user for authentication.

B.

The private key is uploaded to the server and the public key is used by the end user for authentication.

Questions 10

Which of the following attacks are associated with an ICMP protocol?

Options:
A.

Ping of death

B.

Smurf attack

C.

ICMP flooding

D.

All of the following

Exam Code: CNSP
Certification Provider: The SecOps Group
Exam Name: Certified Network Security Practitioner (CNSP)
Last Update: Jul 11, 2025
Questions: 60
PDF + Testing Engine
$164.99
$66
Testing Engine
$124.99
$50
PDF (Q&A)
$104.99
$42

The SecOps Group Related Exams

The SecOps Group Free Exams

The SecOps Group Free Exams