100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CPSA LATEST 2026 EXAM QUESTIONS AND ANSWERS GUARANTEE A+

Puntuación
-
Vendido
-
Páginas
21
Grado
A+
Subido en
07-01-2026
Escrito en
2025/2026

CPSA LATEST 2026 EXAM QUESTIONS AND ANSWERS GUARANTEE A+

Institución
CPSA
Grado
CPSA










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CPSA
Grado
CPSA

Información del documento

Subido en
7 de enero de 2026
Número de páginas
21
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CPSA LATEST 2026 EXAM QUESTIONS AND ANSWERS
GUARANTEE A+
✔✔Network Sweeping Techniques to prioritise a target list and potential for false
positive - ✔✔Ping sweep $ nmap -sn [ip] / (previously) $nmap -sP [ip]
TCP Port Scan $ nmap -sT [ip]
UDP Port Scan $ nmap -sU [ip]
Top 10 ports $ nmap --top-ports 10 [ip]
Service Scan $ nmap -sV [ip]
No Ping Scan $ nmap -Pn [ip]
Scan All Ports $ nmap -p1-65535 [ip] / $ nmap -p- [ip]
Script Scan $ nmap --script=... [ip]

✔✔Egress Filtering - ✔✔Egress filtering is the control of traffic leaving the network.
Egress filtering prevents from sending unwanted traffic out of the internet. This could
include leaking out private network address space or stopping compromised system
attempting to communicate with remote hosts. Egress filtering can help in preventing
information leaks due to misconfiguration.

✔✔Port consider blocking - ✔✔MSRPC - TCP / UDP 135
NetBIOS - TCP / UDP 137 - 139
SMB / IP - TCP 445
TFTP - UDP 69
Syslog - UDP 514
SNMP - UDP
SMTP - TCP 25

✔✔Ingress Filtering - ✔✔Ingress filtering is a method of verifying inbound packet
arriving at a network from the source computer.
Ingress filtering is one method to reduce DDOS attacks which uses forged IP address to
be propagated. While ingress traffic reduces the possibility of source address spoofing.
It does not include preclude an attacker using a forged source address of another hosts
within the permitted prefix filter range. It however ensures that when an attack occurs a
network administrator will know where the originating prefixes that are being advertised.

✔✔Active Operating System Fingerprinting - ✔✔Active Fingerprinting is the process of
transmitting of packets to a remote hosts and analysing the corresponding replies.
Nmap
OS Detection $ nmap -O [ip]
Aggressive Scan (equiv. -O -sV -sC --traceroute) $ nmap -A [ip]

✔✔Active Operating System Fingerprinting - ✔✔Passive fingerprinting is the process of
analysing packets from a host on a network. In this case a finger printer act as a sniffer
and doesn't put any traffic on the network.
Tools:

,· NetworkMiner
· P0F
· Satori

✔✔Check of NMAP for services using aggressive scanning - ✔✔# nmap -sV -T4 -F
insecure.org

Starting Nmap ( http://nmap.org )
Nmap scan report for insecure.org (74.207.254.18)
Host is up (0.016s latency).
rDNS record for 74.207.254.18: web.insecure.org
Not shown: 95 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
25/tcp open smtp Postfix smtpd
80/tcp open http Apache httpd 2.2.3 ((CentOS))
113/tcp closed auth
443/tcp open ssl/http Apache httpd 2.2.3 ((CentOS))
Service Info: Host: web.insecure.org

Nmap done: 1 IP address (1 host up) scanned in 14.82 seconds

✔✔Check for UDP applications - ✔✔$ sudo nmap -sU -p 3478 192.168.1.25
Starting Nmap 6.00 ( http://nmap.org ) at 2012-06-13 20:43 EDT
Nmap scan report for example.com (192.168.1.25)
Host is up (0.096s latency).
PORT STATE SERVICE
3478/udp open|filtered unknown
Nmap done: 1 IP address (1 host up) scanned in 1.17 seconds

✔✔Check for UDP connection through Netcat - ✔✔$ nc -vz -u 10.1.0.100 53
Connection to 10.1.0.100 53 port [udp/domain] succeeded!
-z Specifies that nc should just scan for listening daemons, without
sending any data to them. It is an error to use this option in
conjunction with the -l option.

✔✔ACL - ✔✔Access Control List

✔✔Network Access Control Analysis - ✔✔An access control list (ACL), with respect to a
computer file system, is a list of permissions attached to an object. An ACL specifies
which users or system processes are granted access to objects, as well as what
operations are allowed on given objects.[1] Each entry in a typical ACL specifies a
subject and an operation. For instance, if a file object has an ACL that contains (Alice:
read,write; Bob: read), this would give Alice permission to read and write the file and
Bob to only read it.

, #Set "Default Deny" Policy
Iptables -P INPUT DROP
Iptables -P OUTPUT DROP
Iptables -P FORWARD DROP

✔✔Cisco Deny FTP Traffic - ✔✔hostname R1
!
interface ethernet0
ip access-group 102 in
!
access-list 102 deny tcp any any eq ftp
access-list 102 deny tcp any any eq ftp-data
access-list 102 permit ip any any

✔✔Encoding - ✔✔The purpose of encoding is to transform data so that it can be
properly consumed by a different type of system, eg. Binary data being sent over email.
The goal is not to keep information secret. But rather to ensure that it is properly
consumed.
Encoding transform data into another format using scheme that is publicly available so
that it can be easily reverse.
It does not require a key as the only thing required to decode it is the algorithm that was
used to encode.
Examples: ASCII, Unicode, URL encoding, Base64

✔✔Encryption - ✔✔The purpose of encryption is to transform data in order to keep it
secret from others. Eg. Sending someone a letter that only they should be only able to
read.
Encryption transform data into another format in such a way that only specific individual
can reverse the transformation. As such the ciphertext, algorithm and key are all
required to return to the plaintext.
Example: AES, Blowfish, RSA

✔✔Hashing - ✔✔Hashing serves as the purpose of ensuring integrity. Making it so that
if something is changed. You can know it is changed. Technically hashing take arbitrary
input and produce fixed length string that has the following attributes:
· The same input will always produce the same output
· Multiple disparate inputs should produce the same output
· It should not be possible to go from output to input
· Any modification of a given input should result in drastic change to the hash
Hashing is used in conjunction with authentication to produce strong evidence given
that a message has not been modified.

✔✔Symmetric Encryption - ✔✔Symmetric-key algorithms are algorithms for
cryptography that use the same cryptographic keys for both encryption of plaintext and
decryption of ciphertext. The keys may be identical or there may be a simple
transformation to go between the two keys.
$12.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
BOARDWALK Havard School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
186
Miembro desde
1 año
Número de seguidores
7
Documentos
25069
Última venta
2 horas hace
BOARDWALK ACADEMY

Ace Your Exams With Top Quality study Notes And Paper✅✅ ALL ACADEMIC MATERIALS AVAILABLE WITH US✅✅ LEAVE A REVIEW SO THAT WE CAN LOOK AND IMPROVE OUR MATERIALS.✅✅ WE ARE ALWAYS ONLINE AND AVAILABLE DONT HESITATE TO CONTACT US FOR SYUDY GUIDES!!✅✅ EVERYTHING IS GRADED A+✅✅ COLOUR YOUR GRADES WITH US , WE ARE HERE TO HELP YOU DONT BE RELACTANT TO REACH US

3.7

33 reseñas

5
14
4
6
3
7
2
0
1
6

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes