100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CREST CPSA EXAM 300 QUESTIONS AND CORRECT ANSWERS LATEST 2025/2026(VERIFIED ANSWERS)

Puntuación
-
Vendido
-
Páginas
63
Grado
A+
Subido en
19-11-2025
Escrito en
2025/2026

CREST CPSA EXAM 300 QUESTIONS AND CORRECT ANSWERS LATEST 2025/2026(VERIFIED ANSWERS)

Institución
CREST CPSA
Grado
CREST CPSA











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CREST CPSA
Grado
CREST CPSA

Información del documento

Subido en
19 de noviembre de 2025
Número de páginas
63
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CREST CPSA EXAM 300 QUESTIONS AND
CORRECT ANSWERS LATEST 2025/2026(VERIFIED
ANSWERS)




What are the disadvantages of black box penetration testing? - ---
ANSWER>>>- Particularly, these kinds of test cases are difficult to
design
- Possibly, it is not worth, in-case designer has already conducted a test
case
- It does not conduct everything
What is white box penetration testing ? - ---ANSWER>>>A tester is
provided a whole range of information about the systems and/or
network such as schema, source code, os details, ip address, etc.


What are the advantages of white box penetration testing? - ---
ANSWER>>>- It ensures that all independent paths of a module have
been exercised
- It ensures that all logical decisions have been verified along with their
true and false value.
- It discovers the typographical errors and does syntax checking - It finds
the design errors that may have occurred because of the difference
between logical flow of the program and the actual execution.

, 3

What are the important highlights of the computer misuse act
1990? - ---ANSWER>>>Section 1: Unauthorized access to
computer material
Section 2: Unauthorized access with intent to commit or facilitate
commission of further offenses
Section 3: Unauthorized acts with intent to impair, or with recklessness
as to impairing the operation of a computer


Unauthorized modification of computer material

What are the important highlights of the human rights act 1998? -
---ANSWER>>>- The right to life
- The right to respect for private and family life
- The right to freedom of religion and belief
- Your right not to be mistreated or wrongly punished by the state


when capturing the scope of a penetration test, what information
requires consent to meet the UK laws? - ---ANSWER>>>-Name &
Position of the individual who is providing consent
-Authorized testing period - both the date range and hours that testing
is permitted
- Contact information for members of technical staff, who may provide
assistance during the test
- IP addresses or URL that are in scope of testing
- Exclusions to certain hosts, services or areas within application testing
Credentials that may be required as part of authenticated application
testing


What are the important highlights of the data protection act 1998? - ---
ANSWER>>>- Personal data must be processed fairly and lawfully

, 4

- be obtained only for lawful purposes and not processed in
any manner incompatible with those purposes
- be adequate, relevant and not excessive
- be accurate and current
- not be retained for longer than neccessary
- be processed in accordance with the rights and freedoms of data
subjects
- Be protected against unauthorized or unlawful processing and against
accidental loss, destruction or damage

What are the important highlights of the police and justice act
2006? - ---ANSWER>>>- Make amendments to the computer
misuse act 1990
- increased penalties of computer misuse act (makes
unauthorized computer access serious enough to fall under
extradition)
- Made it illegal to perform DOS attacks
- Made it illegal to supply and own hacking tools.
- Be careful about how you release information about exploits.


What issues may arise between a tester and his client? - ---
ANSWER>>>- The tester is unknown to his client - so, on what
grounds, he should be given access of sensitive data -Who will take
the guarantee of security of lost data?
- The client may blame for the loss of data or confidentiality to
tester.


How can you prevent legal issues when doing a penetration test? - ---
ANSWER>>>A statement of intent should be duly signed by both
parties

, 5

- The tester has the permission in writing, with clearly defined
parameters
- the company has the details of its pen tester and an
assurance that he would not leak any confidential data


What does scoping a penetration test involve? ----- ANSWER>>>- All
relevant risk owners
- Technical staff knowledgeable about the target system
- A representative of the penetration test team


- Risk owners should outline any areas of special concern - Technical
staff should outline technical boundaries of the organizations IT estate
- The penetration test team should identify what testing they believe
will give a full picture of the vulnerability status of the estate


What is a IP protocol? - ---ANSWER>>>The IP (Internet Protocol) is the
network layer communications protocol in the Internet protocol suite
used for relaying datagrams across network boundaries


What is the TCP protocol? - ---ANSWER>>>TCP (transmisson control
protocol) a main protocol from the Internet protocol suite.

What is the Task of TCP? - ---ANSWER>>>To create a
connection between the client and server before data can be sent.
What will applications that do not require a reliable data stream
use? - ---ANSWER>>>User datagram protocol


What is the task of the Internet Protocol? ----- ANSWER>>>to deliver
packets from the source host to the destination host based on the IP
addresses in the packet headers.
$12.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
ProfJosephAdams

Conoce al vendedor

Seller avatar
ProfJosephAdams Chamberlain College Of Nursing
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
Nuevo en Stuvia
Miembro desde
1 mes
Número de seguidores
0
Documentos
187
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes