100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CPSA Github Questions and Answers Fully Solved Latest Version

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
03-09-2025
Written in
2025/2026

CPSA Github Questions and Answers Fully Solved Latest Version Why can remote access VPNs not use Main Mode for IKE Phase-1 if the authentication method is pre-shared key? - Answers Pre-shared key authentication with Main Mode requires that the peer's IP is known before the connection is established. What is the blocksize of the DES encryption cipher? - Answers 64 bits What is this: 16:23:57.094021 IP 192.168.124.204.137 192.168.124.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service broadcast Which is the least secure encryption cipher of those listed below? - Answers DES Which file in a user's home directory controls the trust relationships for Berkeley R services? - Answers .rhosts Why can remote access servers not use aggressive mode for IKE Phase-1 if the authentication method is pre-shared key? - Answers Because pre-shared key authentication with aggressive mode does not provide identity protection. What is the key length of the AES encryption cipher? - Answers 128 bits What is this: 16:23:57.094021 IP 192.168.124.204.137 192.168.124.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service broadcast Which is the most secure encryption cipher of those listed below? - Answers AES Which file in a user's home directory controls the trust relationships for SSH? - Answers .ssh/authorized_keys Why can remote access VPNs not use aggressive mode for IKE Phase-1 if the authentication method is pre-shared key? - Answers Because pre-shared key authentication with aggressive mode does not provide identity protection. What is the key length of the Triple-DES encryption cipher? - Answers 168 bits What is this: 16:23:57.094021 IP 192.168.124.204.137 192.168.124.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service broadcast Which is the most secure encryption cipher of those listed below? - Answers AES Which file in a user's home directory controls the trust relationships for FTP? - Answers .netrc Why can remote access servers not use Main Mode for IKE Phase-1 if the authentication method is pre-shared key? - Answers Because pre-shared key authentication with Main Mode requires that the peer's IP is known before the connection is established. What is the key length of the IDEA encryption cipher? - Answers 128 bits What is this: 16:23:57.094021 IP 192.168.124.204.137 192.168.124.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service broadcast Which is the least secure encryption cipher of those listed below? - Answers DES Which file in a user's home directory controls the trust relationships for NFS? - Answers .rhos

Show more Read less
Institution
CPSA Github
Course
CPSA Github

Content preview

CPSA Github Questions and Answers Fully Solved Latest Version 2025-2026

Why can remote access VPNs not use Main Mode for IKE Phase-1 if the authentication method
is pre-shared key? - Answers Pre-shared key authentication with Main Mode requires that the
peer's IP is known before the connection is established.

What is the blocksize of the DES encryption cipher? - Answers 64 bits

What is this: 16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service
broadcast

Which is the least secure encryption cipher of those listed below? - Answers DES

Which file in a user's home directory controls the trust relationships for Berkeley R services? -
Answers .rhosts

Why can remote access servers not use aggressive mode for IKE Phase-1 if the authentication
method is pre-shared key? - Answers Because pre-shared key authentication with aggressive
mode does not provide identity protection.

What is the key length of the AES encryption cipher? - Answers 128 bits

What is this: 16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service
broadcast

Which is the most secure encryption cipher of those listed below? - Answers AES

Which file in a user's home directory controls the trust relationships for SSH? - Answers
.ssh/authorized_keys

Why can remote access VPNs not use aggressive mode for IKE Phase-1 if the authentication
method is pre-shared key? - Answers Because pre-shared key authentication with aggressive
mode does not provide identity protection.

What is the key length of the Triple-DES encryption cipher? - Answers 168 bits

What is this: 16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service
broadcast

Which is the most secure encryption cipher of those listed below? - Answers AES

Which file in a user's home directory controls the trust relationships for FTP? - Answers .netrc

Why can remote access servers not use Main Mode for IKE Phase-1 if the authentication

,method is pre-shared key? - Answers Because pre-shared key authentication with Main Mode
requires that the peer's IP is known before the connection is established.

What is the key length of the IDEA encryption cipher? - Answers 128 bits

What is this: 16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP
PACKET(137): QUERY; REQUEST; BROADCAST - Answers A NetBIOS over TCP/IP name service
broadcast

Which is the least secure encryption cipher of those listed below? - Answers DES

Which file in a user's home directory controls the trust relationships for NFS? - Answers .rhosts

Which operating system is most likely to be vulnerable to the TTYPROMPT vulnerability in the
telnet service? - Answers Solaris 8

What algorithm can be used to negotiate a shared encryption key? - Answers Diffie-Hellman

Which protocols are associated with PPTP? - Answers TCP port 1723 and IP protocol 47

Where are the encrypted passwords stored on a Solaris system? - Answers /etc/shadow

What is the purpose of the rwho protocol? - Answers To send regular broadcasts and listen to
broadcasts from other systems.

How do rwho clients query the rwho daemon? - Answers Using UDP port 513.

How do rwho clients query the rwho daemon using ONC/RPC? - Answers They can't.

How do you establish a null session to a Windows host from a Windows command shell? -
Answers NET USE \\hostname\ipc$ "" /u:""

What is the purpose of the NET USE command in establishing a null session? - Answers To
connect to a shared resource on a remote host.

What is the purpose of the \\hostname\ipc$ argument in the NET USE command? - Answers To
specify the IPC$ share on the remote host.

What is the purpose of the /u:"" argument in the NET USE command? - Answers To specify a null
username.

What is the purpose of the account lockout threshold? - Answers To determine the number of
incorrect password attempts before an account is locked out.

How many incorrect password attempts will cause the built-in administrator account to be
locked out on a Windows 2003 system? - Answers The built-in administrator account will never
be locked out.

, What is the purpose of the account lockout duration setting? - Answers To determine the
duration of an account lockout.

What is the purpose of the NET USE command in establishing a null session? - Answers To
connect to a shared resource on a remote host.

What is the purpose of the \\hostname\c$ argument in the NET USE command? - Answers To
specify the C$ share on the remote host.

What is the purpose of the /u:NULL argument in the NET USE command? - Answers There is no
such argument in the NET USE command.

What is the purpose of the /u:"" argument in the NET USE command? - Answers To specify a null
username.

What is the purpose of the account lockout threshold? - Answers To determine the number of
incorrect password attempts before an account is locked out.

How many incorrect password attempts will cause the built-in administrator account to be
locked out on a Windows 2003 system? - Answers The built-in administrator account will never
be locked out.

What is the purpose of the account lockout duration setting? - Answers To determine the
duration of an account lockout.

What effect would an octal umask of 0027 have on the permissions of new files? - Answers
Remove group write access, and remove all permissions for others.

What is the name given to the field concerned with the security implications of electronic
eminations from communications equipment? - Answers TEMPEST

Which of these is not a valid IPv6 address? - Answers 2001:0db8:1428:57ab

You discover an Internet accessible anonymous FTP server on a client's internal network, which
is vulnerable to the FTP bounce attack. What is the impact of this vulnerability? - Answers
Attackers could exploit the vulnerability to port scan other systems on the client's internal
network.

What is the purpose of an octal umask? - Answers To set default permissions for newly created
files.

What are the three basic permissions in Unix-like systems? - Answers Read, write, and execute.

What is the octal representation of the permission 'rwxr-xr--'? - Answers 754

What is the octal representation of the permission 'rw-rw-r--'? - Answers 664

Written for

Institution
CPSA Github
Course
CPSA Github

Document information

Uploaded on
September 3, 2025
Number of pages
26
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
400
Member since
1 year
Number of followers
17
Documents
30833
Last sold
1 day ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.4

66 reviews

5
23
4
15
3
12
2
0
1
16

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions