New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Selected SCNP Exin certification Questions Answers

Page: 3 / 9
Total 233 questions

SCNP Strategic Infrastructure Security Questions and Answers

Question 9

You are examining a packet from an unknown host that was trying to ping one of your protected servers and notice that the packets it sent had an IPLen of 20 byes and DgmLen set to 60 bytes. What type of operating system should you believe this packet came from?

Options:

A.

Linux

B.

SCO

C.

Windows

D.

Mac OSX

E.

Netware

Question 10

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Nmap SYN/FIN Scan

B.

Nmap ACK Scan

C.

Nmap NULL Scan

D.

Nmap XMAS Scan

E.

Nmap SYN Scan

Question 11

In order for your newly written security policy to have any weight, it must be implemented. Which of the following are the three components of a successful Security Policy Implementation in an organization?

Options:

A.

Policy Monitoring

B.

Policy Design

C.

Policy Committee

D.

Policy Enforcement

E.

Policy Documentation

Question 12

Which of the following best describes the Repair Model?

Options:

A.

The model makes use of preventive measures and regular service as well as updates such as Service

Packs, maintenance updates, and patches. Preventive measures can also improve the chances of the repair model working better than if the system had no preventive measures ever taken.

B.

The repair model is the transference of risk to an insurance company that covers the costs of replacing the critical assets within your network. The drawbacks are increase in premiums after making a claim, high premiums anyway, down time while the insurance company is processing the claim, and claim may not pay what replacement costs are today.

C.

Assets will typically cost much more than the original capital outlay that it took to purchase it long ago.

Repair costs can be very high and a decision to exercise this model should not be made in haste. There are also depreciation issues to deal with as well. In any case, this model should be the last resort because of cost and may be the most time consuming.

D.

The repair model makes use of the acknowledged skills and abilities of the existing personnel. Knowing that assets have very specific dollar values assigned to them, the choice on how to manage the asset is based on the experience of the personnel.

E.

Before incurring the cost for repair of an inoperative asset, check for maintenance agreements that may include the cost of repair or the actual repair itself. Nevertheless, the repair model should focus on the restoration of the downed asset to its working status within the network infrastructure. Keep in mind that after hardware costs, costs for the reloading or replacement of software can be a large cost factor as well.

Page: 3 / 9
Total 233 questions