New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

SCNP Questions Bank

Page: 4 / 9
Total 233 questions

SCNP Strategic Infrastructure Security Questions and Answers

Question 13

Which two of the following are factors that must be considered in determining the likelihood of occurrence during a risk analysis review?

Options:

A.

What are the methods available to attack this asset?

B.

What are the costs associated with protecting this asset?

C.

Does the threat have sufficient capability to exercise the attack?

D.

Does the threat have the motivation or incentive to exercise the attack?

E.

Are any of the assets worthy of an attack?

Question 14

From the following list, chose the primary reason for splitting a Security Policy into multiple smaller policies?

Options:

A.

Smaller policies are cheaper to produce

B.

Smaller policies are simpler to manage

C.

Smaller policies are simpler to produce

D.

Smaller policies are more legally binding

E.

Smaller policies provide better security control

Question 15

Most companies that do business via the Web offer a shopping cart so you can specify all the items you want before placing the order. Poor shopping cart design, however, can allow a different kind of hack. Take a look at the HTML code sample presented here and determine the line that presents the vulnerability:

<input type=hidden name="price" value="39.95">

<input type=hidden name="item_no" value="WIDGET9">

QUANTITY: <input type=text name="quantity" size=2 maxlength=2 value=1>

Options:

A.

The line specifying the Perl script orders.pl

B.

The line specifying input type for price

C.

The line specifying input type for item number

D.

The line specifying input type for quantity

E.

The line specifying input type for item number and quantity

Question 16

In your network, you have built a single domain of only Windows computers. There are 55 XP machines and 10 Windows Server 2003 machines. You are concerned about the security of your SAM files on the Servers. Windows Server 2003 is the only Operating System on the computers, and the hard drives are all formatted with NTFS. Which of the following are issues you must be sure to address when securing the

SAM file?

Options:

A.

You must be sure that no user while locally logged in to the Server can delete the SAM file.

B.

You must be sure that no user while logged in to the Server remotely can delete the SAM file.

C.

You must be sure that no user can boot to DOS and delete the SAM file from there.

D.

You must be sure that no user can install a parallel Operating System and delete the SAM file from there.

E.

You must be sure to encrypt the Operating System files using the built-in EFS, so that no user may delete the SAM file from anywhere.

Page: 4 / 9
Total 233 questions