100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CPSA Final Exam. 460 Questions And Answers

Rating
-
Sold
-
Pages
64
Grade
A+
Uploaded on
05-08-2025
Written in
2025/2026

CPSA Final Exam. 460 Questions And Answers CPSA Final Exam. 460 Questions And Answers CPSA Final Exam. 460 Questions And Answers

Institution
CPSA
Course
CPSA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CPSA
Course
CPSA

Document information

Uploaded on
August 5, 2025
Number of pages
64
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CPSA Final Exam
A1) Benefits of pentesting *** Manage risk. Increase business continuity. Minimise client-side attacks.
Protect clients, partners and third-parties. Comply with regulation.



A1) Pentest structure *** Reconnaissance (i.e. find live hosts, sweeping, find services, scanning, banner
matching, find vulnerabilities). Target prioritisation (e.g. assess servers rather than printers). Testing of
services and exploitation if applicable. Consult/Confirm with customer if ok to exploit. Inform customer
of any high risk issues that need addressing immediately.



A1) Project Lifecycle *** Data Gathering / Scoping / Briefing. Testing. Report Writing. Debriefing



A2) Computer Misuse Act 1990 *** The Act defines 3 specific offences: 1. Unauthorised access to
computer material (that is, a program or data). 6 months or Level 5 fine (£5000 currently). 2.
Unauthorised access to a computer system with intent to commit or facilitate the commission of a
serious crime. 5 years, max fine. 3. Unauthorised modification of computer material. 5 years, max fine.
In general: You must not test a system without prior authorisation (e.g. as agreed in written
scope/contract). You should never test without informing the client beforehand. Amended by Part 5 of
Police and Justice Act 2006.



A2) Police and Justice Act 2006 *** An amendment and update to the Computer Misuse Act 1990 in Part
5 of the Police and Justice Act 2006 are: Section 35. Unauthorised access to computer material. Section
36. Unauthorised acts with intent to impair operation of computer, etc. Section 37. Making, supplying or
obtaining articles for use in computer misuse offences. Section 38. Transitional and saving provision. In
general: Part V includes a few sections on Computer Misuse Act 1990. Provision for DoS as an offence.
Increased penalties. Making available tools to the Internet. Dual-use tools liable.



A2) Human Rights Act 1998 *** Lots of general human rights involved such as right to marry,
discrimination, privacy, slavery, guilty etc. Human Rights Act 1998 is relevant to Computer usage as:
"Protects the right of individuals against unreasonable disruption of and intrusion into their lives, while
balancing this individual right with those of others." In general: Article 8: Right to respect for private and
family life. Right to privacy. With Acceptable Usage Policy (AUP), you waive the right to privacy on
network.

,A2) Data Protection Act 1998 *** In general: Deals with PII (Personal Information ID). Data about
identifiable users should only be used for the purpose intended. Should not make a local copy (e.g. HR
Database)



A2) Handling Data (6 catergories) *** Data classification set by uk.gov. Important for CHECK member to
know the protective marking of test/report. 1. NPM — Non Protective Marking. 2. PROTECT — Not
sensitive enough to make classification. Sensitive but not high risk. 3. RESTRICTED — Pentests are
usually RESTRICTED as a minimum 4. CONFIDENTIAL — (Prejudical). 5. SECRET — (Serious Injuries). 6.
TOP SECRET (EGD).



A4) 5 Principles of Risk Management *** Assess risk and determine needs. Establish a central
management focus. Implement appropriate policies and related controls. Promote awareness. Monitor
and evaluate policy and control effectiveness.



A3) Sensible scoping questions (7) *** 1. What technologies are being used? 2. Can we get access to the
application (Web Application)? 3. How many users are there? 4. How many pages are there? Are they
dynamic or static? 5. What are you expecting us to find? 6. Will this be a white box or black box test? 7.
Will the testing be onsite or remote?



B1) OSI *** Open Standards Interconnection (OSI) developped by International Standards Organisation
(ISO)



B1) OSI Model. What and stages? *** Model is set of 7 layers that define the different stages that data
must go through to travel from one device to another over a network. {7} Application, {6} Presentation,
{5} Session, {4} Transport, {3} Network, {2} Data Link, {1} Physical. Higher layers more specific, lower
layers more generic. Please Do Not Tell Sales People Anything.



B1) Physical Layer *** Physical layer defines electrical and physical specifications for devices, i.e.
relationship between a device and a transmission medium (e.g. copper or fibre optical cable,
Shielded/unshielded twisted pair, 10Base-2, 10Base-T, 100Base-TX, 1000B-T, RJ45, Coaxial, Fibre-optical
cables, Copper cables)

,B1) Data Link Layer *** Data Link layer provides means to transfer data between network entities using
a common addressing format. Data Link layer has Logical Link Control (LLC) sublayer for multiplexing
several network protocols (e.g. IP, IPX, Decnet and Appletalk) to coexist in multipoint network. Data Link
layer has Media Access Control (MAC) sublayer for addressing and terminal/network nodes to
communicate within a multiple access network. MAC address, PPP, HDLC, ADCCP.



B1) Network Layer *** Network layer provides means of transferring data from a source host on one
network to a destination host on a different network. IP Address, ARP, IPv4, IPv6, ICMP, IPX, RIP, IKE.



B1) Transport Layer *** Transport layer provides transparent transfer of data using connection-oriented
data stream support, reliability, flow control, and multiplexing. Port Number, TCP, UDP, SCTP.



B1) Session Layer *** Session layer provides mechanism for opening, closing and managing a session
between end-user application processes, i.e., a semi-permanent dialogue. SOCKS, TLS-PSK, TLS-SRP.



B1) Presentation Layer *** Presentation layer is responsible for the delivery and formatting of
information to the application layer for further processing or display. MIME, Netware Core Protocol,
XML.



B1) Application Layer *** Application layer is outermost layer where user interact directly with the
software application. FTP, SSH, Telnet, SMTP, IMAP, POP, HTTP, HTTPS, RTP, BOOTP, SNMP, NTP.



B1) TCP/IP Model Layers *** TCP/IP model is basically a shorter version of the OSI model. Consists of
four instead of seven layers. Application, Transport, Network and Link. TCP Application layer is like
Application, Presentation and Session of OSI. TCP Transport aka 'Host-to-host transport' is Transport in
OSI. TCP Network aka 'Internet Layer' is Network OSI. TCP Link aka 'Network Access' is Data Link and
Physical OSI.



B1) TCP/IP Transport and Application Layer *** Transport Layer is a convenient application
programming interface to internet hosts. Application Layer contains all protocols and methods that fall
into the realm of process-to-process communications across an IP network.

, B1) IPv4 *** IPv4 uses a 32-bit address for its Internet addresses. That means it can provide support for
2^32 IP addresses in total â around 4.29 billion



B1) IPv6 Size and Advantages *** IPv6 utilizes 128-bit Internet addresses. No more NAT. No more
private address collisions. More efficient, many other benefits. Leading zeros can be omitted. The
double colon (::) can be used once in the text form of an address, to designate any number of 0 bits.



B1) TCP Characteristics (3) *** 1) Transmission Control Protocol/Internet Protocol. 2) It is specifically
designed as a model to offer highly reliable and end-to-end byte stream over an unreliable network. 3) A
TCP connection is established with the help of three-way handshake. It is a process of initiating and
acknowledging a connection. Once the connection is established, data transfer begins, and when the
transmission process is finished, the connection is terminated by the closing of an established virtual
circuit. The connection is full duplex, and both sides synchronize (SYN) and acknowledge (ACK) each
other. The exchange of these four flags is performed in three steps—SYN, SYN-ACK, and ACK



B1) UDP Characteristics *** 1) User Datagram Protocol (A datagram is a transfer unit associated with a
packet-switched network.) 2) Datagram oriented protocol. It is used for broadcast and multicast type of
network transmission. 3) The UDP protocol works almost similar to TCP, but it throws all the error-
checking stuff out, all the back-and-forth communication and deliverability. UDP uses a simple
transmission method without implied hand-shaking dialogues for ordering, reliability, or data integrity.



B1) TCP vs UDP (6) *** 1) TCP is a connection-oriented protocol, whereas UDP is a connectionless
protocol. 2) The speed for TCP is slower while the speed of UDP is faster. 3) TCP uses handshake
protocol like SYN, SYN-ACK, ACK while UDP uses no handshake protocols. 4) TCP does error checking and
also makes error recovery, on the other hand, UDP performs error checking, but it discards erroneous
packets. 5) TCP has acknowledgment segments, but UDP does not have any acknowledgment segment.
6) TCP is heavy-weight, and UDP is lightweight.



B1) ICMP *** 1) The Internet Control Message Protocol (ICMP) is a network layer protocol used by
network devices to diagnose network communication issues. 2) The primary purpose of ICMP is for error
reporting. ICMP is mainly used to determine whether or not data is reaching its intended destination in
a timely manner. 3) Unlike the Internet Protocol (IP), ICMP is not associated with a transport layer
protocol such as TCP or UDP. This makes ICMP a connectionless protocol: one device does not need to
open a connection with another device before sending an ICMP message. Normal IP traffic is sent using
TCP, which means any two devices that exchange data will first carry out a TCP handshake to ensure

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
lectjoseph Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
66
Member since
2 year
Number of followers
23
Documents
5506
Last sold
1 week ago

learning is hard ,but with me it will be easier. Timely ,detailed and organized study guides and notes that will save you a lot of study time. Reviews are highly appreciated. Wishing you the best

3.8

8 reviews

5
4
4
1
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions