Cpsa Q B
Cpsa Q B
Answer: 1 - C
Answer: 2 - D
Answer: 3 - B
Answer: 4 - C
Answer: 5 - C
6. Which protocol assigns dynamic IP addresses to hosts on a network?
A. DNS
B. DHCP
C. ICMP
D. FTP
Answer: 6 - B
Answer: 7 - C
Answer: 8 - B
Answer: 9 - C
Answer: 10 - B
🔹 B2: Network Architectures (10 Questions)
Answer: 11 - C
Answer: 12 - B
Answer: 13 - B
Answer: 14 - B
Answer: 15 - B
16. Which type of network topology is most resilient to a single point of
failure?
A. Star
B. Bus
C. Ring
D. Mesh
Answer: 16 - D
Answer: 17 - B
18. In a typical 3-tier architecture, what is the role of the application tier?
A. Handling data storage
B. Managing routing and switching
C. Processing business logic
D. Encrypting client data
Answer: 18 - C
Answer: 19 - C
Answer: 21 - C
22. Which tool is commonly used for network scanning and mapping?
A. Wireshark
B. Netcat
C. Nmap
D. Hydra
Answer: 22 - C
Answer: 23 - C
24. What type of scan can help identify live hosts without scanning ports?
A. TCP SYN Scan
B. Ping Sweep
C. NULL Scan
D. TCP FIN Scan
Answer: 24 - B
25. Which layer is primarily involved when identifying live systems using
ICMP echo requests?
A. Layer 3 – Network
B. Layer 2 – Data Link
C. Layer 5 – Session
D. Layer 7 – Application
Answer: 25 - A
26. Which port scanning method is least likely to be logged by the target
system?
A. TCP Connect Scan
B. TCP SYN Scan
C. UDP Scan
D. TCP FIN Scan
Answer: 26 - D
Answer: 27 - B
Answer: 28 - B
Answer: 29 - C
Answer: 31 - C
32. What does a TTL value of 128 in a ping reply often indicate about the
host OS?
A. Linux/Unix system
B. Windows-based system
C. Firewall blocking TTL
D. Router device
Answer: 32 - B
33. Which tool shows results like SYN_RECV and ESTABLISHED in its
output?
A. Wireshark
B. Traceroute
C. Netstat
D. Nikto
Answer: 33 - C
Answer: 34 - C
Answer: 35 - C
Answer: 36 - C
Answer: 37 - A
Answer: 38 - B
39. Which header manipulation can help evade basic IDS detection?
A. Increasing TTL value
B. Setting content-length to 0
C. Inserting whitespace or case variation in payloads
D. Removing host header
Answer: 39 - C
40. What does the Nmap -f flag do?
A. Enables full port scan
B. Forces service detection
C. Sends fragmented packets
D. Filters UDP ports
Answer: 40 - C
Answer: 41 - B
Answer: 42 - B
Answer: 43 - C
Answer: 44 - B
45. What does the acronym MITM stand for?
A. Manual Internet Threat Management
B. Managed Internal Traffic Mapper
C. Man-in-the-Middle
D. Mandatory Integrity Traffic Mechanism
Answer: 45 - C
46. What tool would you most likely use to capture credentials on a
network?
A. Nikto
B. Hydra
C. Wireshark
D. Burp Suite
Answer: 46 - C
Answer: 47 - C
Answer: 48 - C
Answer: 50 - C
Answer: 51 - C
Answer: 52 - C
Answer: 53 - C
Answer: 54 - C
Answer: 55 - C
Answer: 56 - B
Answer: 57 - C
58. You connect to port 8080 and receive an HTTP response. What does
this suggest?
A. SSH is running on 8080
B. HTTP service is hosted on an uncommon port
C. Port 8080 is closed
D. DNS is being served over TCP
Answer: 58 - B
59. Which Nmap flag helps with application version detection?
A. -O
B. -A
C. -sS
D. -sU
Answer: 59 - B
60. You find a non-standard port responding with a MySQL banner. What
should your next step be?
A. Run a port scan
B. Ignore it
C. Try brute forcing SSH
D. Investigate the service and look for known vulnerabilities in that MySQL
version
Answer: 60 - D
Answer: 61 - B
Answer: 62 - B
Answer: 63 - B
64. Which protocol is typically used in 802.1X for authentication?
A. SSH
B. RADIUS
C. DNS
D. DHCP
Answer: 64 - B
Answer: 65 - B
Answer: 66 - B
Answer: 67 - C
Answer: 68 - C
69. Which of the following is an example of symmetric encryption?
A. RSA
B. Diffie-Hellman
C. AES
D. ECC
Answer: 69 - C
Answer: 70 - B
Answer: 71 - B
Answer: 72 - C
Answer: 73 - C
74. Which protocol uses cryptography for secure web browsing?
A. FTP
B. HTTP
C. TLS
D. SMTP
Answer: 74 - C
Answer: 75 - B
Answer: 76 - C
Answer: 77 - C
79. Which cryptographic concept ensures that data has not been
changed?
A. Confidentiality
B. Availability
C. Integrity
D. Non-repudiation
Answer: 79 - C
Answer: 80 - C
81. Which permission allows a user to read the contents of a file in Linux?
A. Execute
B. Write
C. Read
D. Modify
Answer: 81 - C
Answer: 82 - B
Answer: 83 - C
84. What is the significance of the sticky bit on a directory in Linux?
A. Files can be modified by anyone
B. Only the file owner can delete their own files
C. It allows scheduling file execution
D. It blocks all users
Answer: 84 - B
85. Which of the following best describes the purpose of access control
lists (ACLs)?
A. Encrypt files
B. Provide granular permission settings beyond standard user/group/other
C. Only allow root user access
D. Disable firewall rules
Answer: 85 - B
Answer: 86 - C
Answer: 87 - C
Answer: 88 - B
89. In a Linux system, who owns a file by default when it's created?
A. root
B. The user who created it
C. The admin group
D. Nobody
Answer: 89 - B
Answer: 90 - C
Answer: 91 - B
Answer: 92 - D
Answer: 93 - B
94. What is the primary purpose of SIEM systems?
A. Encrypt files
B. Monitor and analyze security logs
C. Patch operating systems
D. Provide VPN services
Answer: 94 - B
Answer: 95 - C
Answer: 96 - C
Answer: 97 - B
Answer: 98 - C
99. Which standard is commonly referenced for audit logging controls?
A. ISO 27001
B. GDPR
C. TLS
D. WPA2
Answer: 99 - A
Answer: 100 - C