Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Selected SCNS Exin certification Questions Answers

Page: 4 / 9
Total 232 questions

SCNS Tactical Perimeter Defense Questions and Answers

Question 13

You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.

Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 80

Router(config)#access-list 171 deny tcp 0.0.0.0 255.255.255.255 10.10.0.0 0.0.255.255 eq 80

Router(config)#access-list 171 deny tcp any any eq 23

Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 20

Router(config)# access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 21

Based on this configuration, and using the exhibit, select the answers that identify how the router will deal with network traffic.

Options:

A.

Permit WWW traffic to the Internet

B.

Deny WWW traffic to the internal networks

C.

Deny all Telnet traffic

D.

Permit FTP traffic to the Internet

E.

Permit FTP traffic to the internal networks

Question 14

You are a host in a network segment that has IP addresses in the range of 10.0.16.1~10.0.31.254. You need to create an access control list that will filter your segment of addresses. Which of the following is the wildcard mask that will be used to filter your network segment?

Options:

A.

0.0.15.255

B.

0.0.16.254

C.

255.240.0.0

D.

0.0.240.0

E.

10.0.16.1/20

Question 15

In your organization a decision has been made to implement a multicasting application. You are configuring your firewall to allow this application to flow through in both directions. What address range are you going to address on the firewall?

Options:

A.

10.0.0.0/8

B.

172.16.0.0/12

C.

Multicast addresses use APIPA's 169.254.0.0/16

D.

224.0.0.0/4

E.

Addresses are negotiated at the time of the multicast. The nearest router assigns a public IP address assigned by ARIN.

Question 16

To verify that your PPTP implementation is working as you intended, you sniff the network after the implementation has been completed. You are looking for specific values in the captures that will indicate to you the type of packets received. You analyze the packets, including headers and payload. PPTP works at which layer of the OSI model?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

E.

Layer 5

Page: 4 / 9
Total 232 questions