100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CPSA LATEST 2026 TEST PAPER QUESTIONS AND ANSWERS GUARANTEE A+

Puntuación
-
Vendido
-
Páginas
16
Grado
A+
Subido en
07-01-2026
Escrito en
2025/2026

CPSA LATEST 2026 TEST PAPER QUESTIONS AND ANSWERS GUARANTEE A+

Institución
CPSA
Grado
CPSA










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CPSA
Grado
CPSA

Información del documento

Subido en
7 de enero de 2026
Número de páginas
16
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CPSA LATEST 2026 TEST PAPER QUESTIONS AND
ANSWERS GUARANTEE A+
✔✔SSH - ✔✔SSH is an implementation of a secure channel at the application layer. It
provides the same security services as TLS and IPSEC, but it is of course application-
specific. It is widely used for remote access by login and can now also provide a mini-
VPN. The protocol assumes that there is a reliable channel provided by IP. A secure
channel aims to provide origin authentication, confidentiality and integrity but NOT non-
repudiation and security services after receipt of data.

✔✔PGP - ✔✔PGP is a rival to S/MIME and achieves the exact same thing. It is a little
more complicated to use because it is not part of the mail client software like S/MIME: it
is available as a plug-in that you can download and install from the Internet. It is less
flexible than S/MIME as it only allows one type of security processing. And, signatures
are computed on unencrypted data. PGP-processed data is base64 encoded and
carried inside an RFC822 message body.

PGP supports DES, 3DES, AES and others for bulk data encryption with symmetric
algorithms. It uses RSA and ElGamal for public key encryption of session keys, and
SHA-1, MD5, and others for hashing. Signature algorithms are RSA, DSS, Elliptic Curve
Digital Signature Algorithms, and others.

✔✔WPA (Wi-Fi Protected Access) - ✔✔WPA is the successor of WEP. The first version
still relied on the classic encryption algorithms in WEP, but they were implemented
differently (to be able to update without having to replace hardware). The successor
used AES. There are several keys:
· Mutual key authentication
· Session keys from master key
o Encryption key
o MAC key
o Data encryption key
o Data MAC key
There are two ways of generating dynamic keys: CCMP and TKIP (Temporal Key
Integrity Protocol). CCMP is a CBC MAC protocol used from AES and available for
WPA2. TKIP basically works by generating a sequence of WEP keys based on a master
key, and re-keying periodically before enough volume of info. could be captured to allow
recovery of the WEP key. TKIP changes the Key every 10,000 packets, which is quick
enough to combat statistical methods to analyze the cipher.

✔✔File system permissions
UNIX - ✔✔No permission
---
Execute permission
--x
Write permission
-w-

,Execute and write permission: 1 (execute) + 2 (write) = 3
-wx
Read permission
r--
Read and execute permission: 4 (read) + 1 (execute) = 5
r-x
Read and write permission: 4 (read) + 2 (write) = 6
rw-
All permissions: 4 (read) + 2 (write) + 1 (execute) = 7
rwx

✔✔t = sticky bit - ✔✔A sticky bit is a permission bit that is set on a directory that allows
only the owner of the file within that directory, the owner of the directory or the root user
to delete or rename the file. No other user has the needed privileges to delete the file
created by some other user.
This is a security measure to avoid deletion of critical folders and their content (sub-
directories and files), though other users have full permissions.
drwsr-sr-x 2 root root 4096 Jun 19 06:45 dirname
When you execute a program that has the SUID bit enabled, you inherit the permissions
of that program's owner. Programs that do not have the SUID bit set are run with the
permissions of the user who started the program.

✔✔Analyzing ACLs in the registry - ✔✔Grab existing ACL: $ acl = Get-Acl
HKLM:\SOFTWARE\powertoe

✔✔netstat - ✔✔-a lists all the computer's connections and listening ports
-n displays addresses and port numbers in numerical format
-o outputs the process ID (PID) responsible for the connection
-b outputs the EXE and its associated DLLs

✔✔DNS Zone Transfer - ✔✔Replicate DNS databases across a group of DNS servers
DNS services are primarily accessed through UDP port 53 when serving answers to
DNS requests. Authoritative name servers also listen on TCP port 53 to serve DNS
zone transfers and other high-volume queries.
A DNS zone file contains all the naming information stored by the name server
regarding a specific DNS domain. A DNS zone transfer can often be launched to
retrieve details of nonpublic internal networks and other useful information that can help
build an accurate map of the target infrastructure.
The most effective method to issue a DNS zone transfer request against a specific DNS
server is to use DiG.

✔✔A (Address) Record - ✔✔DNS records are used to control the location of a resource
on the Internet. A Records are the most basic type of DNS record and are used to point
a domain or subdomain to an IP address. The 'A' stands for 'address'. For example, if
you query the A records of google.com, it currently returns an IP address of

, 172.217.3.174. 172.217.3.174 is the IP address of the hosting server for Google's
website.
$ORIGIN example.com.
@ 3600 IN A 223.89.20.79
* 3600 IN A 223.89.20.79
ftp 86400 IN A 201.52.12.36

✔✔CNAME (Canonical Name) Record - ✔✔CNAME record (Canonical Name Record)
is another commonly used type of DNS entry and is used to maps an alias name to a
true or canonical domain name. When a DNS resolver encounters a CNAME record, the
DNS lookup will continue by retrying the lookup with true or canonical domain name.
One thing that CNAME records are commonly used for is to direct a part of your website
to a site set up elsewhere, such as an eCommerce shop or something similar. CNAME
records also allow you to point multiple systems to one IP without specifically assigning
an A record to each hostname. If that IP were ever to change, you would only have to
update one A record.
$ORIGIN example.com.
shop 3600 IN CNAME myshop.com.
clientarea 86400 IN CNAME clientinterface.com.

✔✔HINFO (Host Information) Record - ✔✔HINFO records allow you to define the
hardware type and Operating System (OS) in use at a host. This information can be
used by application protocols such as FTP, which uses special procedures when
communicating with computers of a known CPU and OS type. For security reasons,
these records are rarely used on public servers.
$ORIGIN example.com.
testhinfo 90 IN HINFO "INTEL-386" "Windows"
MX (Mail Exchanger) Record
Mail Exchanger (MX) records tell the world which mail servers accept incoming mail for
your domain and where emails sent to your domain should be routed to. You can send
emails without the MX record configured for your domain name, but if the MX record is
not set up correctly, you will not receive email.
$ORIGIN example.com.
@ 3600 IN MX 10 mx1.dynu.com.
@ 3600 IN MX 20 mx2.dynu.com.

✔✔NS (Name Server) Record - ✔✔An NS record or name server record identify which
name servers are authoritative for a zone. DNS resolvers will query the servers listed in
the NS records of a domain name for specific DNS records such as A, AAAA, MX, TXT.
A DNS zone must contain at least one NS record but you can have as many NS records
as you would like for your domain name. The benefit of having multiple NS records is
the redundancy of your DNS service. In order to have a valid DNS configuration, the NS
records configured in the DNS zone must be exactly the same as these configured as
name servers at your domain name provider.
$ORIGIN example.com.
@ 3600 IN NS ns1.dynu.com.
$12.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
BOARDWALK Havard School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
186
Miembro desde
1 año
Número de seguidores
7
Documentos
25069
Última venta
2 horas hace
BOARDWALK ACADEMY

Ace Your Exams With Top Quality study Notes And Paper✅✅ ALL ACADEMIC MATERIALS AVAILABLE WITH US✅✅ LEAVE A REVIEW SO THAT WE CAN LOOK AND IMPROVE OUR MATERIALS.✅✅ WE ARE ALWAYS ONLINE AND AVAILABLE DONT HESITATE TO CONTACT US FOR SYUDY GUIDES!!✅✅ EVERYTHING IS GRADED A+✅✅ COLOUR YOUR GRADES WITH US , WE ARE HERE TO HELP YOU DONT BE RELACTANT TO REACH US

3.7

33 reseñas

5
14
4
6
3
7
2
0
1
6

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes