New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Download Full Version SCNP Exin Exam

Page: 2 / 9
Total 233 questions

SCNP Strategic Infrastructure Security Questions and Answers

Question 5

You are running Nessus in your organization to perform vulnerability assessments. If you wish to write your own plugin, to scan for a custom vulnerability, what will you use to write the plugin?

Options:

A.

Nessus Plugin Scripting (NPS)

B.

Nessus Custom Scripting (NCS)

C.

Nessus C++ Scripting (NC+S)

D.

Nessus Attack Scripting Language (NASL)

E.

Nessus Java Scripting Language (NJSL)

Question 6

To increase the security of your corporate website, you are running some basic checks on leaked information. You view the source code for a web page and see the following:

<title>Security Certifications for the IT Pro

From this code, which of the following would an attacker most likely assume is the operating system that was used to create this web site?

Options:

A.

OpenBSD

B.

FreeBSD

C.

Linux 5.0

D.

Linux 6.0

E.

Windows NT

Question 7

Recently you found out that there has been a flood of bogus network traffic hitting your Email server.

Because of this flood, authorized users have not been able to consistently send or receive email. What is happening to your Email server?

Options:

A.

A Denial of Service Attack

B.

A Virus Attack

C.

A Worm Attack

D.

A Macro Attack

E.

A Trojan Attack

Question 8

To maintain the security of your network you routinely run several checks of the network and computers.

Often you use the built-in tools, such as netstat. If you run the following command, netstat –s which of the following will be the result?

Options:

A.

Displays all connections and listening ports

B.

Displays Ethernet statistics.

C.

Displays addresses and port numbers in numerical form

D.

Shows connections for the protocol specified

E.

Displays per-protocol statistics

Page: 2 / 9
Total 233 questions