Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Pearson SCNS New Attempt

Page: 8 / 9
Total 232 questions

SCNS Tactical Perimeter Defense Questions and Answers

Question 29

As Intrusion Detection Systems become more sophisticated, the software manufacturers develop different methods of detection. If an IDS uses the process of matching known attacks against data collected in your network, what is this known as?

Options:

A.

Signature analysis

B.

Packet filter matching

C.

Statistical analysis

D.

Analysis engine engagement

E.

Packet match and alarming

Question 30

What step in the process of Intrusion Detection as shown in the exhibit would an e-mail be delivered to the security admin if an attack were presently taking place?

Options:

A.

3

B.

6

C.

7

D.

8

E.

11

Question 31

You are installing a new firewall and your CEO asks what the benefits will be to the organization. Which of the following are benefits to implementing a firewall?

Options:

A.

Increased bandwidth

B.

End node virus control

C.

Central network traffic auditing

D.

Increased ability to enforce policies

E.

Efficient IP Address allocation

Question 32

You have made some changes to the configuration of your ISA Server 2006 firewall. While analyzing the network traffic, you see that these changes have not yet taken affect. What must you do to get these new rules to take function?

Options:

A.

From the rules drop down menu, select enable state table.

B.

From the rules drop down menu, select enable rule set.

C.

From the state table drop down menu, select enable rule set.

D.

Disable and Enable the network interface that the rule is associated with.

E.

From the command prompt, type firewallpolicy /reload and press Enter.

Page: 8 / 9
Total 232 questions