100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CREST CPSA EXAM 400 QUESTIONS AND CORRECT ANSWERS LATEST (VERIFIED ANSWERS) ALREADY GRADED A 2025 UPDATE

Rating
-
Sold
-
Pages
38
Grade
A+
Uploaded on
25-11-2024
Written in
2024/2025

CREST CPSA EXAM 400 QUESTIONS AND CORRECT ANSWERS LATEST (VERIFIED ANSWERS) ALREADY GRADED A 2025 UPDATE CREST CPSA EXAM 400 QUESTIONS AND CORRECT ANSWERS LATEST (VERIFIED ANSWERS) ALREADY GRADED A 2025 UPDATE

Institution
CREST CPSA
Course
CREST CPSA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CREST CPSA
Course
CREST CPSA

Document information

Uploaded on
November 25, 2024
Number of pages
38
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

1|Page



CREST CPSA EXAM 400 QUESTIONS AND
CORRECT ANSWERS LATEST (VERIFIED
ANSWERS) ALREADY GRADED A 2025 UPDATE
Squid Proxy - CORRECT ANSWER>>3128

Benefits of a Penetration Test - CORRECT ANSWER>>- Enhancement of the
management system
- Avoid fines
- Protection from financial damage
- Customer protection

Structure of a Penetration Test - CORRECT ANSWER>>Planning and Preparation
Reconnaissance
Discovery
Analyzing information and risks
Active intrusion attempts
Final analysis Report
Preparation

Another Structure of a Penetration Test - CORRECT ANSWER>>Reconnaissance
Vulnerability Scanning
Investigation
Exploitation

Infrastructure Testing - CORRECT ANSWER>>Includes all internal computer
systems, associated external devices, internet networking, cloud and virtualization
testing.

Types of Infrastructure Testing - CORRECT ANSWER>>- External Infrastructure
Penetration Testing
- Internal Infrastructure Penetration Testing

,2|Page


- Cloud and Virtualization Penetration Testing
- Wireless Security Penetration Testing

External Infrastructure Testing - CORRECT ANSWER>>Mapping flaws in the
external infrastructure

Benefits of External Infrastructure Testing - CORRECT ANSWER>>- Identifies flaws
within the firewall configuration that could be misused.
- Finds how information could be leaked out from the system
- Suggests how these issues could be fixed
- Prepares a comprehensive report highlighting the security risk of the networks
and suggests solutions
- Ensures overall efficiency and productivity of your business

Benefits of Internal Infrastructure Testing - CORRECT ANSWER>>- Identifies how
an internal attacker could take advantage of even a minor security flaw
- Identifies the potential business risk and damage that an internal attacker can
inflict
- Improves security systems of internal infrastructure
- Prepares a comprehensive report giving details of the security exposures of
internal networks along with the detailed action plan on how to deal with it

Benefits of Cloud and Virtualization Penetration Testing - CORRECT ANSWER>>-
Discover the real risks within the virtual environment and suggests the methods
and costs to fix the threats and flaws
- Provides guidelines and an action plan how to resolve the issues
- Improves the overall protection systems
- Prepares a comprehensive security system report of the cloud computing and
virtualization, outline the security flaws, causes and possible solutions

Benefits of Wireless Security Penetration Testing - CORRECT ANSWER>>- To find
the potential risk caused by your wireless device

,3|Page


- To provide guidelines and an action plan on how to protect from the external
threats
- For preparing a comprehensive security system report of the wireless
networking, to outline the security flaw, causes, and possible solutions

Black Box Testing - CORRECT ANSWER>>Black-box testing is a method in which
the tester is provided no information about the application being tested.

Advantages of Black Box Testing - CORRECT ANSWER>>- Test is generally
conducted with the perspective of a user, not the designer
- Verifies contradictions in the actual system and the specifications

Disadvantages of Black Box Penetration Testing - CORRECT ANSWER>>-
Particularly, these kinds of test cases are difficult to design
- Possibly, it is not worth, in case designer has already conducted a test case
- It does not conduct everything

White Box Penetration Testing - CORRECT ANSWER>>A tester is provided a whole
range of information about the systems and/or network such as schema, source
code, os details, ip address, etc.

Advantages of White Box Penetration Testing - CORRECT ANSWER>>- It ensures
that all independent paths of a module have been exercised
- It ensures that all logical decisions have been verified along with their true and
false value.
- It discovers the typographical errors and does syntax checking
- It finds the design errors that may have occurred because of the difference
between logical flow of the program and the actual execution.

Computer Misuse Act 1990 Highlights - CORRECT ANSWER>>Section 1:
Unauthorized access to computer material
Section 2: Unauthorized access with intent to commit or facilitate commission of
further offenses

, 4|Page


Section 3: Unauthorized acts with intent to impair, or with recklessness as to
impairing the operation of a computer

Human Rights Act 1998 Highlights - CORRECT ANSWER>>- The right to life
- The right to respect for private and family life
- The right to freedom of religion and belief
- Your right not to be mistreated or wrongly punished by the state

Consent Information for Penetration Test - CORRECT ANSWER>>- Name &
Position of the individual who is providing consent
- Authorized testing period - both the date range and hours that testing is
permitted
- Contact information for members of technical staff, who may provide assistance
during the test
- IP addresses or URL that are in scope of testing
- Exclusions to certain hosts, services or areas within application testing
- Credentials that may be required as part of authenticated application testing

Data Protection Act 1998 Highlights - CORRECT ANSWER>>- Personal data must
be processed fairly and lawfully
- be obtained only for lawful purposes and not processed in any manner
incompatible with those purposes
- be adequate, relevant and not excessive
- be accurate and current
- not be retained for longer than necessary
- be processed in accordance with the rights and freedoms of data subjects
- Be protected against unauthorized or unlawful processing and against accidental
loss, destruction or damage

Police and Justice Act 2006 Highlights - CORRECT ANSWER>>- Make amendments
to the computer misuse act 1990
- increased penalties of computer misuse act (makes unauthorized computer
access serious enough to fall under extradition)

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DOCJAMES Johns Hopkins University School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
28
Member since
2 year
Number of followers
16
Documents
913
Last sold
1 month ago
VERIFIED EXAM SHOP

EXCELLENT HOMEWORK HELP AND TUTORING,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A. Am an exepert on major courses especially pschology,Nursing,Human resource Managment and Mathematics assisting students with quality work is my first priority.I ensure scholarly standards in my documents and that's why i'm one of the best GOLD RATED TUTORS IN STUVIA.I assure a GOOD GRADE if you use my work.

3.7

7 reviews

5
4
4
0
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions