0 likes | 0 Views
Prepare effectively for the CREST-CPSA certification exam with the latest PDF questions and verified answers. Boost your skills in security analysis and pass with confidence.<br><br>
E N D
CREST CREST-CPSA CREST Practitioner Security Analyst Questions & Answers PDF (Demo Version – Limited Content) For More Information – Visit link below: https://p2pexam.com/ Visit us at: https://p2pexam.com/crest-cpsa
Latest Version: 6.0 Question: 1 Why should verbose error messages be avoided in production web applications? A. They decrease search engine rankings B. They expose internal details such as file paths, technologies, or SQL queries C. They confuse legitimate users D. They affect server bandwidth Answer: B Question: 2 Which protocol is used to securely transmit HTTP traffic over an encrypted channel? A. FTP B. SSH C. HTTPS D. SMTP Answer: C Question: 3 Which command-line tool is used on Windows to enumerate users from the local system or domain? A. whoami B. net user /domain C. ipconfig D. netstat Answer: B Question: 4 What is the primary goal of application fingerprinting during a security assessment? Visit us at: https://p2pexam.com/crest-cpsa
A. To launch a brute force attack B. To identify open ports C. To determine application type and version D. To evade firewalls Answer: C Question: 5 Why is VoIP considered a high-value target during penetration tests? A. It is always unencrypted B. It operates only over TCP C. It often contains sensitive voice data and user credentials D. It uses proprietary, untestable protocols Answer: C Question: 6 Which tool is commonly used for capturing and analyzing network traffic in real time? A. Nikto B. Wireshark C. Nmap D. Metasploit Answer: B Question: 7 Which protocol is commonly used for remote client access in Microsoft Exchange? A. IMAP B. RDP C. MAPI over HTTP D. FTP Answer: C Visit us at: https://p2pexam.com/crest-cpsa
Question: 8 What is a potential security risk of embedding unvalidated user input inside HTML pages? A. HTTP header injection B. SQL Injection C. Cross-site scripting (XSS) D. DNS Rebinding Answer: C Question: 9 Which of the following configuration issues presents the highest risk on a network device? A. Hostname not matching internal naming policy B. Outdated banners C. Default administrative credentials D. Lack of NTP synchronization Answer: C Question: 10 A well-configured Checkpoint Firewall is running on your local network segment. Which of the following types of probe is it most likely to respond to? A. A ICMP Echo request B. An ARP 'who has' request C. It will not respond to any type of probe D. A TCP SYN packet to TCP port 264 E. An IKE probe to UDP port 500 Answer: B Visit us at: https://p2pexam.com/crest-cpsa
For More Information – Visit link below: https://p2pexam.com/ Thanks for Using Our Product Pass Your Certification With p2pexam Guarantee Use coupon code “20off” for 20USD discount Sales: sales@p2pexam.com Support: support@p2pexam.com Visit us at: https://p2pexam.com/crest-cpsa