Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Note! Following SCNS Exam is Retired now. Please select the alternative replacement for your Exam Certification.

Verified By IT Certified Experts

CertsTopics.com Certified Safe Files

Up-To-Date Exam Study Material

99.5% High Success Pass Rate

100% Accurate Answers

Instant Downloads

Exam Questions And Answers PDF

Try Demo Before You Buy

Certification Exams with Helpful Questions And Answers

SCNS Tactical Perimeter Defense Questions and Answers

Question 1

You are configuring your new IDS machine, and are creating new rules. You enter the following rule:

Alert tcp any any -> any 23 (msg: "Telnet Connection Attempt";)

What is the effect of this rule?

Options:

A.

This is a logging rule, designed to capture any telnet attempts

B.

This is an alert rule, designed to notify you of the use of telnet in either direction

C.

This is an alert rule, designed to notify you of the use of telnet in one direction

D.

This is a logging rule, designed to notify you of telnet connection attempts

E.

This is an alert rule, designed to notify you of attempts to connect from any IP address on port 23 to any IP address and any port on a remote host.

Buy Now
Question 2

You are installing a new firewall and your CEO asks what the benefits will be to the organization. Which of the following are benefits to implementing a firewall?

Options:

A.

Increased bandwidth

B.

End node virus control

C.

Central network traffic auditing

D.

Increased ability to enforce policies

E.

Efficient IP Address allocation

Question 3

To increase the security of the network, you have decided to implement a solution using authentication tokens. You are explaining this to a coworker who is not familiar with tokens. What are Authentication Tokens?

Options:

A.

An authentication token is a software program that is installed on each user computer. Upon execution of the program, each user will be authenticated into the network.

B.

An authentication token is a hardware device that is to be installed, either via a parallel or serial port. Once the user has installed the token, he or she will be able to access the resources on the network that they have been granted access.

C.

An authentication token is a portable device, such as a handheld computer, that stores an authenticating sequence, that the user will enter after logging into the system to gain access to network resources.

D.

An authentication token is a software program that is installed on the main server of the network. As the user is logging in, the server will instruct the user for username and password.

E.

An authentication token is a portable device used for authenticating a user, thereby allowing authorized access into a network system.