In the context of a Unix-based system, where does a daemon process execute in the memory?
Answer : B
In Unix-based systems, memory is divided into two primary regions: kernel space and user space, each serving distinct purposes for process execution and system stability.
Why B is correct: Daemon processes are background services (e.g., sshd, cron) that run with elevated privileges but operate in user space. User space is the memory area allocated for user applications and processes, isolated from kernel space to prevent direct hardware access or system crashes. CNSP highlights that daemons run in user space to maintain system integrity, interacting with the kernel via system calls.
Why other option is incorrect:
A . Kernel space: Kernel space is reserved for the operating system kernel and device drivers, which have unrestricted access to hardware. Running daemons in kernel space would pose significant security and stability risks, and it is not the standard practice in Unix systems.
What is the response from an open UDP port which is not behind a firewall?
Answer : B
UDP's connectionless nature means it lacks inherent acknowledgment mechanisms, affecting its port response behavior.
Why B is correct: An open UDP port does not respond unless an application explicitly sends a reply. Without a firewall or application response, the sender receives no feedback, per CNSP scanning guidelines.
Why other options are incorrect:
A: ICMP Port Unreachable indicates a closed port, not an open one.
C: SYN packets are TCP-specific, not UDP.
D: FIN packets are also TCP-specific.
Which one of the following is a phishing email?
Answer : B
What is the response from a closed UDP port which is not behind a firewall?
Answer : A
UDP is a connectionless protocol, and its behavior when a packet reaches a port depends on whether the port is open or closed. Without a firewall altering the response, the standard protocol applies.
Why A is correct: When a UDP packet is sent to a closed port, the host typically responds with an ICMP Type 3 (Destination Unreachable), Code 3 (Port Unreachable) message, indicating no service is listening. CNSP notes this as a key indicator in port scanning.
Why other options are incorrect:
B: RST packets are TCP-specific, not used in UDP.
C: No response occurs for open UDP ports unless an application replies, not closed ports.
D: A is correct, so 'none of the above' is invalid.
What is the response from a closed TCP port which is not behind a firewall?
Answer : C
TCP uses a structured handshake, and its response to a connection attempt on a closed port follows a specific protocol when unobstructed by a firewall.
Why C is correct: A closed TCP port responds with a RST (Reset) and ACK (Acknowledgment) packet to terminate the connection attempt immediately. CNSP highlights this as a key scanning indicator.
Why other options are incorrect:
A: ICMP Port Unreachable is for UDP, not TCP.
B: FIN/ACK is for closing active connections, not rejecting new ones.
D: SYN/ACK indicates an open port during the TCP handshake.
Which one of the following services is not a UDP-based protocol?
Answer : D
Protocols are defined by their transport layer usage (TCP or UDP), impacting their security and performance characteristics.
Why D is correct: SSH (Secure Shell) uses TCP (port 22) for reliable, connection-oriented communication, unlike the UDP-based options. CNSP contrasts TCP and UDP protocol security.
Why other options are incorrect:
A: SNMP uses UDP (ports 161, 162) for lightweight network management.
B: NTP uses UDP (port 123) for time synchronization.
C: IKE (IPsec key exchange) uses UDP (ports 500, 4500).
What kind of files are "Dotfiles" in a Linux-based architecture?
Answer : D
In Linux, file visibility is determined by naming conventions, impacting how files are listed or accessed in the file system.
Why D is correct: 'Dotfiles' are files or directories with names starting with a dot (e.g., .bashrc), making them hidden by default in directory listings (e.g., ls requires -a to show them). They are commonly used for user configuration, as per CNSP's Linux security overview.
Why other options are incorrect:
A: Library files (e.g., in /lib) aren't inherently hidden.
B: Driver files (e.g., kernel modules in /lib/modules) aren't dotfiles by convention.
C: System files may or may not be hidden; 'dotfiles' specifically denotes hidden status.