March Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Note! The SCNP Exam is no longer available.

SCNP SCNP Strategic Infrastructure Security Questions and Answers

Questions 4

You have become the lead security professional for a mid-sized organization. You are currently studying DNS issues, and configuration options. You come across the concepts of DNS Spoofing, and investigate more. What is DNS Spoofing?

Options:

A.

DNS Spoofing is when the DNS client submits a false DNS request to the DNS server, and the DNS server responds with correct data.

B.

DNS Spoofing is the DNS client submits a DNS request to the DNS server using a bogus IP address, and the DNS server responds to the incorrect host.

C.

DNS Spoofing is when a DNS Server responds to an unauthorized DNS client, providing that client with name resolution.

D.

DNS Spoofing is when a DNS client is forced to make a DNS query to an imposter DNS server, which send the client to an imposter resource.

E.

DNS spoofing is when a DNS server provides name resolution to clients that are located in a different IP subnet than the server itself.

Buy Now
Questions 5

You work for a medium sized ISP and there have been several attacks of the DNS configuration recently. You are particularly concerned with DNS Spoofing attacks. You have a few older machines that define the storage of Resource Records (RR) based on the TTL of name mapping information. If an attacker sends fake mapping information to the DNS Server, with a high TTL, which type of DNS Spoofing is this?

Options:

A.

DNS Server Compromise

B.

DNS Cache Poisoning

C.

Spoofing the DNS Response

D.

DNS Source-Router Spoof

E.

IXFR Source-Spoof

Buy Now
Questions 6

You are using Samba on your SuSe Linux system to share files with a Windows network. What is the command to access the shared directory Finance on Windows machine Mktg_01 with user account User_01 from your Linux machine?

Options:

A.

net use //Mktg_01/Finance -U User_01

B.

net use -U User_01 //Mtkg_01/Finance

C.

smbclient \Mtkg_01\Finance -U User_01

D.

smbclient \\Mtkg_01\\Finance -U User_01

E.

smbclient //Mktg_01/Finance -U User_01

Buy Now
Questions 7

On your Linux computer you are examining the contents of various files to ensure they are secured and contain the designated information. Entries in the /etc/hosts file consist of which of the following?

Options:

A.

The IP address, the host-name and aliases (if any)

B.

The IP address, subnet mask, the host-name (if any)

C.

The IP address, subnet mask, the host-name and aliases (if any)

D.

The IP address, subnet mask, default gateway and the host-name

E.

The IP address, subnet mask, default gateway, the host-name and aliases (if any)

Buy Now
Questions 8

Which of the following pieces of information are found in the Inode, on a Linux system?

Options:

A.

Directory Location

B.

File ownership information

C.

File size in Bytes

D.

Filename

E.

File access time

Buy Now
Questions 9

You are examining the Authentication Logs on your Windows 2003 server. Specifically, you are looking for types of logon that were successful. Which of the following correctly match the Logon Type with its numerical value?

Options:

A.

Logon Type 0 - Interactive with Smart Card

B.

Logon Type 1 - Network with Smart Card

C.

Logon Type 2 - Interactive

D.

Logon Type 3 - Network

E.

Logon Type 7 - Unlock the Workstation

Buy Now
Questions 10

During a one week investigation into the security of your network you work on identifying the information that is leaked to the Internet, either directly or indirectly. One thing you decide to evaluate is the information stored in the Whois lookup of your organizational website. Of the following, what pieces of information can be identified via this method?

Options:

A.

Registrar

B.

Mailing Address

C.

Contact Name

D.

Record Update

E.

Network Addresses (Private)

Buy Now
Questions 11

You are creating the User Account section of your organizational security policy. From the following options, select the questions to use for the formation of this section?

Options:

A.

Are users allowed to make copies of any operating system files (including, but not limited to /etc/passwd or the SAM)?

B.

Who in the organization has the right to approve the request for new user accounts?

C.

Are users allowed to have multiple accounts on a computer?

D.

Are users allowed to share their user account with coworkers?

E.

Are users required to use password-protected screensavers?

F.

Are users allowed to modify files they do not own, but have write abilities?

Buy Now
Questions 12

In order to run some tests on your system, you have decided to use the netcat utility. You want to be able to access the command prompt on a Windows system from your Linux system. What is the proper command on the Windows system to allow for you to gain remote access?

Options:

A.

netcat -p 2020 -l cmd.exe

B.

netcat -p 2020 -cmd.exe

C.

nc -l -p 2020 -e cmd.exe

D.

nc -p 2020 -l run/cmd.exe

E.

netcat -p 2020 -l -run cmd.exe

Buy Now
Questions 13

Which of the following has the stages of Risk Analysis in order, from a to e?

a) Management

b) Threat Assessment

c) Control Evaluation

d) Inventory

e) Monitoring

Options:

A.

b, d, c, e, a

B.

a, b, d, c, e

C.

d, b, c, a, e

D.

a, b, c, d, e

E.

d, b, a, c, e

Buy Now
Questions 14

You work for a medium sized ISP and there have been several attacks of the DNS configuration recently.

You are particularly concerned with DNS Spoofing attacks. If an attacker is able to send out false data to a

DNS client before the response from the DNS server arrives, this is which type of DNS Spoofing?

Options:

A.

DNS Server Compromise

B.

DNS Cache Poisoning

C.

Spoofing the DNS Response

D.

DNS Source-Router Spoof

E.

IXFR Source-Spoof

Buy Now
Questions 15

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

SCNP Question 15

Options:

A.

Trojan Horse Scan

B.

Back Orifice Scan

C.

NetBus Scan

D.

Port Scan

E.

Ping Sweep

Buy Now
Questions 16

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

SCNP Question 16

Options:

A.

Nmap SYN/FIN Scan

B.

Nmap NULL Scan

C.

Nmap ACK Scan

D.

Nmap SYN Scan

E.

Nmap XMAS Scan

Buy Now
Questions 17

What type of cryptographic system is represented in this image?

SCNP Question 17

Options:

A.

Caesar

B.

Vingre

C.

Polybius

D.

Purple

E.

Enigma

Buy Now
Questions 18

Which of the following fields are found in a user account's line in the /etc/shadow file?

Options:

A.

The User Identifier assigned to the user account

B.

The home directory used by the user account

C.

The hashed version of the user account's password

D.

The number of days since the user account password was changed

E.

The number of days until the user account's password must change

Buy Now
Questions 19

You have recently hired an assistant to help you with managing the security of your network. You are currently running an all Windows environment, and are describing NTFS permission issues. You are using some demonstration files to help with your discussion. You have two NTFS partitions, C:\ and D:\ There is a test file, C:\DIR1\test.txt that is currently set so that only Administrators have Full Control. If you move this file to the C:\DIR2 folder, what will the permissions be for this file?

Options:

A.

The file will have the same permissions as D:\DIR2

B.

The file permissions will remain the same

C.

The file permissions will be lost

D.

The file permissions will convert to Everyone - Full Control

E.

The permissions will be set to whatever the CREATOR OWNER permissions are for the D:\ partition

Buy Now
Questions 20

What of the following user accounts are given the correct default User Identifier and Group Identifier, assuming the system is running Red Hat Linux?

Options:

A.

ftp: User Identifier 21, Group Identifier 21

B.

root: User Identifier 0, Group Identifier 0

C.

bin: User Identifier 1, Group Identifier 1

D.

adm: User Identifier 3, Group Identifier 3

E.

mail: User Identifier 25, Group Identifier 25

Buy Now
Questions 21

You are working on the configuration of the authentication systems used in your network, and are considering several different authentication methods for your computer systems. What do LM, NTLM, and NTLMv2 use as their Authentication method?

Options:

A.

Challenge/Response

B.

Public Key Cryptography

C.

Private Key Cryptography

D.

Private Certificates

E.

Public Certificates

Buy Now
Questions 22

You have a file on your Linux system, and you need to modify the file's permissions. The permissions you wish to apply are: Read, Write, and Execute for the User; Read for the Group: and Read for the Others.

What command will allow you to achieve this?

Options:

A.

chmod 744 test_file.tar.gz

B.

chmod 644 test_file.tar.gz

C.

chmod 700 test_file.tar.gz

D.

chmod 774 test_file.tar.gz

E.

chmod 600 test_file.tar.gz

Buy Now
Questions 23

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

SCNP Question 23

Options:

A.

Nmap XMAS Scan

B.

Nmap NULL Scan

C.

Nmap SYN Scan

D.

Nmap ACK Scan

E.

Nmap SYN/FIN Scan

Buy Now
Questions 24

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

SCNP Question 24

Options:

A.

Nmap Scan

B.

Port Scan

C.

Trojan Scan

D.

Ping Request

E.

Ping Sweep

Buy Now
Questions 25

What classic cipher is shown in this image?

Options:

A.

Feistel Cipher

B.

Caesar Cipher

C.

Vingre Cipher

D.

Polybius Cipher

E.

Enigma Cipher

Buy Now
Questions 26

You suspect that your root account has been compromised. What command can you run on your Linux system, in the /var/log directory to see you the recent login activity of the root account?

Options:

A.

root_access -R

B.

-R root

C.

last -U /acct:root

D.

last -a -d root

E.

last -R /acct:root

Buy Now
Questions 27

If you wanted to use Public Key cryptography to encrypt data transmissions, which of the following ciphers could you use?

Options:

A.

Triple-DES

B.

DES

C.

Blowfish

D.

IDEA

E.

RSA

Buy Now
Questions 28

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

SCNP Question 28

Options:

A.

Nmap SYN/FIN Scan

B.

Nmap ACK Scan

C.

Nmap NULL Scan

D.

Nmap XMAS Scan

E.

Nmap SYN Scan

Buy Now
Questions 29

You are creating the Remote Access section of your organizational security policy. From the following options, select the questions to use for the formation of this section?

Options:

A.

What methods of remote access are allowed (cable modem, DSL, and so on)?

B.

How are partner VPNs to be configured (to firewall or host)?

C.

Which users are authorized to install networking devices into computers?

D.

What is the process for becoming authorized for remote access?

E.

Is the entire network accessible remotely?

Buy Now
Questions 30

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

SCNP Question 30

Options:

A.

Windows 2000 Ping Request

B.

Windows NT 4.0 Ping Request

C.

Linux Ping Request

D.

Linux Ping Response

E.

Windows NT 4.0 Ping Response

Buy Now
Questions 31

You have recently installed a new Linux machine, running Apache as your web server. You are running Novell SuSe Linux, and are going to use YaST to disable some unneeded modules. In the left-hand options of YaST, which section would you choose in order to disable modules for your Apache web server?

Options:

A.

Network Services

B.

Software

C.

System

D.

Software Management

E.

Miscellaneous

Buy Now
Questions 32

To maintain the security of your network you routinely run several checks of the network and computers.

Often you use the built-in tools, such as netstat. If you run the following command: netstat –e which of the following will be the result?

Options:

A.

Displays all connections and listening ports

B.

Displays Ethernet statistics

C.

Displays addresses and port numbers in numerical form

D.

Shows connections for the protocol specified

E.

Displays per-protocol statistics

Buy Now
Questions 33

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

SCNP Question 33

Options:

A.

Nmap SYN/FIN Scan

B.

Nmap NULL Scan

C.

Nmap ACK Scan

D.

Nmap SYN Scan

E.

Nmap XMAS Scan

Buy Now
Questions 34

Logging is critical when you want to determine whether or not your server is being attacked. You must enable logging on your Web servers. To help prevent malicious users from deleting files to cover their tracks, you should make sure the ACLs on the IIS-generated log files (%systemroot%\system32\LogFiles) are set to Administrators (Full Control) and System (Full Control). The ACL for the Everyone group should not be greater than which of the following?

Options:

A.

Full Control

B.

Modify

C.

Read & Execute

D.

List Folder

E.

Read

Buy Now
Exam Code: SCNP
Exam Name: SCNP Strategic Infrastructure Security
Last Update: Nov 27, 2023
Questions: 233
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 29 Mar 2024