CREST Practitioner Security Analyst (CPSA) Practice

Disable ads (and more) with a membership for a one time $2.99 payment

Master the CREST Practitioner Security Analyst Exam. Prepare with quizzes and comprehensive study guides that include tips and explanations. Excel in your certification journey!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What method is utilized in passive OS fingerprinting?

  1. Sending crafted packets

  2. Observing network behavior and packets

  3. Scanning open ports

  4. Accessing user credentials

The correct answer is: Observing network behavior and packets

Passive OS fingerprinting involves analyzing network traffic without actively probing the target system, thereby minimizing the risk of detection and potential disruption. This method relies on observing the characteristics of the packets that are already being sent to and from the network, such as the timing, sizes, and flags set within the packets. By gathering this data, security analysts can infer the operating system and its version based on known signatures and behaviors associated with various OS implementations. This technique is particularly useful in environments where stealth is necessary, as it does not introduce any additional traffic that would alert the target system. Therefore, passive OS fingerprinting is a non-intrusive approach that allows analysts to collect valuable information while remaining under the radar.