Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Exin SCNS Dumps Questions Answers

Page: 1 / 9
Total 232 questions

SCNS Tactical Perimeter Defense Questions and Answers

Question 1

If you are looking for plain-text ASCII characters in the payload of a packet you capture using Network

Monitor, which Pane will provide you this information?

Options:

A.

Summary Pane

B.

Packet Pane

C.

Collection Pane

D.

Hex Pane

E.

Detail Pane

Buy Now
Question 2

To increase the security of the network, you have decided to implement a solution using authentication tokens. You are explaining this to a coworker who is not familiar with tokens. What are Authentication Tokens?

Options:

A.

An authentication token is a software program that is installed on each user computer. Upon execution of the program, each user will be authenticated into the network.

B.

An authentication token is a hardware device that is to be installed, either via a parallel or serial port. Once the user has installed the token, he or she will be able to access the resources on the network that they have been granted access.

C.

An authentication token is a portable device, such as a handheld computer, that stores an authenticating sequence, that the user will enter after logging into the system to gain access to network resources.

D.

An authentication token is a software program that is installed on the main server of the network. As the user is logging in, the server will instruct the user for username and password.

E.

An authentication token is a portable device used for authenticating a user, thereby allowing authorized access into a network system.

Question 3

You are the firewall administrator at your company and the network administrators have decided to implement a PPTP VPN solution, which of these ports would you need to allow through the firewall to allow these VPN sessions into your network?

Options:

A.

1723

B.

2397

C.

5273

D.

4378

E.

7135

Question 4

In the image, there are two nodes communicating directly, without an access point. In the packet on the right side of the image, the Address 1 field is blank. If this packet is going to the other computer, what is the value that must be filled in this blank address field?

Options:

A.

2345

B.

1234

C.

ABCD

D.

E.

ABCD-1234

Question 5

You are configuring a new custom IPSec policy on your Windows Server 2003 machine. On the rules tab, you find the three default options under the IP Filter List. What are these three default options?

Options:

A.

All TCP Traffic

B.

All UDP Traffic

C.

All IP Traffic

D.

All ICMP Traffic

E.

Question 6

As per the specifications of RFC 1191: Path MTU Discovery, MTUs have been defined so that transmitted datagram will not unnecessarily become fragmented when traveling across different types of physical media. You are going to run several packet captures to be sure there are no out of spec packets on

your network. According to these specifications what are the absolute minimum and maximum MTUs?

Options:

A.

1492 Bytes and 1500 Bytes respectively

B.

68 Bytes and 65535 Bytes respectively

C.

512 Bytes and 1500 Bytes respectively

D.

512 bits and 1500 bits respectively

E.

512 bits per second and 1500 bits per second respectively

Question 7

During a network capture in Wireshark, you capture some IP traffic. In the IP Datagram, what is the function of the Protocol field?

Options:

A.

This field is used to tell the upper layer protocols that IP is being used.

B.

This field is used to tell the lower layer protocols that IP is being used.

C.

This field is used to define the lower layer protocol to IP.

D.

This field is used to define the upper layer protocol to IP.

E.

This field is used to identify the version of the IP Protocol in use.

Question 8

During your review of the logs of your Cisco router, you see the following line. What is the meaning of this line?

%SYS-5-CONFIG_I: Configured from console by vty1 (172.16.10.1)

Options:

A.

A normal, but noteworthy event

B.

An informative message

C.

A warning condition has occurred

D.

A debugging message

E.

An error condition has occurred

Question 9

When a wireless client performs the initial process of communicating with an access point, what is this process called?

Options:

A.

Association

B.

Identification

C.

Authentication

D.

Authorization

E.

Detection

Question 10

There are several options available to you for your new wireless networking technologies, and you are examining how different systems function. What transmission system uses short bursts combined together as a channel?

Options:

A.

Frequency Hopping Spread Spectrum (FHSS)

B.

Direct Sequence Spread Spectrum (DSSS)

C.

Lamar Anthell Transmission (LAT)

D.

Digital Band Hopping (DBH)

E.

Digital Channel Hopping (DCH)

Question 11

You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.

Router(config)#access-list 13 deny 10.10.10.0 0.0.0.255

Router(config)#access-list 13 permit 10.10.11.0 0.0.0.255

Router(config)#access-list 15 deny 10.10.12.0 0.0.0.255

Router(config)#access-list 15 permit 10.10.11.0 0.0.0.255

Router(config)#interface Ethernet 0

Router(config-if)#ip access-group 15 out

Router(config-if)#interface Ethernet 2

Router(config-if)#ip access-group 15 out

Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.

Options:

A.

Deny network 10.10.10.0 from accessing network 10.10.11.0

B.

Deny network 10.10.12.0 from accessing network 10.10.10.0

C.

Permit network 10.10.10.0 access to all other networks

D.

Deny network 10.10.12.0 from accessing network 10.10.11.0

E.

Permit network 10.10.11.0 access to all other networks

Question 12

When logging in to a system that uses Challenge/Response authentication what is the order of steps a user must follow to complete the login process?

Options:

A.

Smart Card ID entered into PC

B.

Response number from Smart Card entered into PC

C.

Challenge number issues to client

D.

Number entered into Smart Card

E.

a, b, c, d

F.

a, d, c, b

G.

a, c, d, b

Question 13

You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.

Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 80

Router(config)#access-list 171 deny tcp 0.0.0.0 255.255.255.255 10.10.0.0 0.0.255.255 eq 80

Router(config)#access-list 171 deny tcp any any eq 23

Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 20

Router(config)# access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 21

Based on this configuration, and using the exhibit, select the answers that identify how the router will deal with network traffic.

Options:

A.

Permit WWW traffic to the Internet

B.

Deny WWW traffic to the internal networks

C.

Deny all Telnet traffic

D.

Permit FTP traffic to the Internet

E.

Permit FTP traffic to the internal networks

Question 14

You are a host in a network segment that has IP addresses in the range of 10.0.16.1~10.0.31.254. You need to create an access control list that will filter your segment of addresses. Which of the following is the wildcard mask that will be used to filter your network segment?

Options:

A.

0.0.15.255

B.

0.0.16.254

C.

255.240.0.0

D.

0.0.240.0

E.

10.0.16.1/20

Question 15

In your organization a decision has been made to implement a multicasting application. You are configuring your firewall to allow this application to flow through in both directions. What address range are you going to address on the firewall?

Options:

A.

10.0.0.0/8

B.

172.16.0.0/12

C.

Multicast addresses use APIPA's 169.254.0.0/16

D.

224.0.0.0/4

E.

Addresses are negotiated at the time of the multicast. The nearest router assigns a public IP address assigned by ARIN.

Question 16

To verify that your PPTP implementation is working as you intended, you sniff the network after the implementation has been completed. You are looking for specific values in the captures that will indicate to you the type of packets received. You analyze the packets, including headers and payload. PPTP works at which layer of the OSI model?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

E.

Layer 5

Question 17

You are configuring a Cisco Router, and are creating Access Control Lists as part of the security of the network. When creating Wildcard Masks, which of the following rules apply?

Options:

A.

If the wildcard mask bit is a 1, then do not check the corresponding bit of the IP address for a match.

B.

If the wildcard mask bit is a 0, then do not check the corresponding bit of the IP address for a match.

C.

If the wildcard mask bit is a 1, then do check the corresponding bit of the IP address for a match.

D.

If the wildcard mask bit is a 0, then do check the corresponding bit of the IP address for a match.

E.

To create a Wildcard Mask, always take the inverse of the Subnet Mask.

Question 18

If you configure an access-list to block the following networks, what are you trying to protect against?

Network 127.0.0.0/8, Network 0.0.0.0\0, Network 10.0.0.0\8, Network 172.16.0.0\16, and Network 168.0.0\16.

Options:

A.

You are trying to protect against hijacking

B.

You are trying to protect against spoofing

C.

You are trying to protect against sniffing

D.

You are trying to protect against splicing

E.

You are trying to protect against capturing

Question 19

You are reconfiguring your networks firewall to create a DMZ using three network interfaces. After configuring the addresses on the interfaces, you are making the required changes in ISA Server 2006. You are going to use Network Template during this configuration change. What Network Template is designed for this firewall topology?

Options:

A.

DMZ-Mode

B.

Multi-NIC

C.

3-Node Firewall

D.

3-Leg Perimeter

E.

DMZ-Mode, then select three as the number of NICs to configure

Question 20

In the command ipchains -N chain , what will the -N accomplish in the chain?

Options:

A.

Calls up the next sequential chain

B.

Create a new chain named "chain"

C.

Calls up the chain named "chain"

D.

Negate the current chain

E.

Commit the new changes in the present chain

Question 21

After installing Snort on your windows machine that is destined to be your IDS, you need to edit the configuration files entry of "HOME_NET" to define which of the following?

Options:

A.

The name of the Domain (or domains) you are parts of

B.

The host name of the machine you are installing Snort on

C.

The name of the network segment you are using Snort to monitor

D.

The IP address of the machine you are installing Snort on

E.

The IP subnet address of the network segment you are using Snort to monitor

Question 22

If you are configuring your WLAN for security, and you configure the access points with a security feature that the clients do not support, what can you add to the clients to have them participate in the WLAN?

Options:

A.

Protocol Analyzers

B.

WLAN Support

C.

The correct SSID

D.

New access points

E.

Supplicants

Question 23

You are configuring your new IDS machine, and are creating new rules. You enter the following rule:

Alert tcp any any -> any 23 (msg: "Telnet Connection Attempt";)

What is the effect of this rule?

Options:

A.

This is a logging rule, designed to capture any telnet attempts

B.

This is an alert rule, designed to notify you of the use of telnet in either direction

C.

This is an alert rule, designed to notify you of the use of telnet in one direction

D.

This is a logging rule, designed to notify you of telnet connection attempts

E.

This is an alert rule, designed to notify you of attempts to connect from any IP address on port 23 to any IP address and any port on a remote host.

Question 24

In the image, there are two nodes communicating via two access points that are bridging together two segments. In the middle packet, under the left access point, the Address 4: field is blank. If this packet is destined for the computer on the right side of the image, what must be the value of Address field 4 in this middle packet?

Options:

A.

ABCD

B.

6789

C.

2345

D.

1234

E.

CDEF

Question 25

In an ICMP Message, what is the function of the first eight bits?

Options:

A.

To define the source port number

B.

To define the type

C.

To define the destination port number

D.

To define the IP Version

E.

To define the upper layer protocol

Question 26

You are in the process of configuring your network firewall policy. As you begin building the content of the policy you start to organize the document into sections. Which of the following are sections found in the firewall policy?

Options:

A.

The Acceptable Use Statement

B.

The Firewall Administrator Statement

C.

The Network Connection Statement

D.

The Incident Handling Statement

E.

The Escalation Procedures Statement

Question 27

You are configuring your new Intrusion Detection System, and studying the true-false matrix. You read about the different types of alarms and events. Which of the following defines an event where an alarm is indicating an intrusion when there is no actual intrusion?

Options:

A.

True-negative

B.

False-positive

C.

True-positive

D.

False-negative

E.

Absolute-positive

Question 28

You have recently taken over the security of a mid-sized network. You are reviewing the current configuration of the IPTables firewall, and notice the following rule:

ipchains -A output -p TCP -d 172.168.35.40 ! www

What is the function of this rule?

Options:

A.

This rule for the output chain states that all www traffic on 172.168.35.40 from any IP address is allowed.

B.

This rule for the input chain states that all TCP packets are allowed to the 172.168.35.40 IP address to any port other than 80.

C.

This rule for the input chain states that all TCP packets are able to get to the www service on any IP address except for 172.168.35.40.

D.

This rule for the output chain states that all TCP packets are able to get to the www service on any IP address except for 172.168.35.40.

E.

This rule for the output chain states that all TCP packets are allowed to the 172.168.35.40 IP address to any port other than 80.

Question 29

As Intrusion Detection Systems become more sophisticated, the software manufacturers develop different methods of detection. If an IDS uses the process of matching known attacks against data collected in your network, what is this known as?

Options:

A.

Signature analysis

B.

Packet filter matching

C.

Statistical analysis

D.

Analysis engine engagement

E.

Packet match and alarming

Question 30

What step in the process of Intrusion Detection as shown in the exhibit would an e-mail be delivered to the security admin if an attack were presently taking place?

Options:

A.

3

B.

6

C.

7

D.

8

E.

11

Question 31

You are installing a new firewall and your CEO asks what the benefits will be to the organization. Which of the following are benefits to implementing a firewall?

Options:

A.

Increased bandwidth

B.

End node virus control

C.

Central network traffic auditing

D.

Increased ability to enforce policies

E.

Efficient IP Address allocation

Question 32

You have made some changes to the configuration of your ISA Server 2006 firewall. While analyzing the network traffic, you see that these changes have not yet taken affect. What must you do to get these new rules to take function?

Options:

A.

From the rules drop down menu, select enable state table.

B.

From the rules drop down menu, select enable rule set.

C.

From the state table drop down menu, select enable rule set.

D.

Disable and Enable the network interface that the rule is associated with.

E.

From the command prompt, type firewallpolicy /reload and press Enter.

Question 33

You have recently been contracted to implement a new firewall solution at a client site. What are the two basic forms of firewall implementations?

Options:

A.

Chaining

B.

Stateful

C.

DMZ

D.

Stateless

E.

KMZ

Question 34

ISA Server 2006 features extensive rule matching abilities. Which of the following lists has the proper order for how ISA Server 2006 checks rule elements that make up an Access rule?

Options:

A.

Protocol, Source Address and Port, Schedule, Destination Address, User Set, and Content Groups

B.

Source Address and Port, Protocol, Schedule, Destination Address, User Set, and Content Groups

C.

Source Address and Port, Destination Address, Schedule, Protocol, User Set, and Content Groups

D.

Source Address and Port, Destination Address, Protocol, Schedule, User Set, and Content Groups

E.

Protocol, Source Address and Port, Destination Address, User Set, Content Groups, and Schedule

Page: 1 / 9
Total 232 questions