Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Note! The SCNS Exam is no longer available.

SCNS SCNS Tactical Perimeter Defense Questions and Answers

Questions 4

What tool used in wireless network analysis has the ability to output its findings to MapPoint?

Options:

A.

Netstumbler

B.

AirSnort

C.

Wireshark

D.

Network Monitor

E.

AirSniffer

Buy Now
Questions 5

You are installing a new firewall and your CEO asks what the benefits will be to the organization. Which of the following are benefits to implementing a firewall?

Options:

A.

Increased bandwidth

B.

End node virus control

C.

Central network traffic auditing

D.

Increased ability to enforce policies

E.

Efficient IP Address allocation

Buy Now
Questions 6

You are configuring your new Intrusion Detection System, and studying the true-false matrix. You read about the different types of alarms and events. Which of the following defines an event where an alarm is indicating an intrusion when there is no actual intrusion?

Options:

A.

True-negative

B.

False-positive

C.

True-positive

D.

False-negative

E.

Absolute-positive

Buy Now
Questions 7

You have recently taken over the security of a mid-sized network. You are reviewing the current configuration of the IPTables firewall, and notice the following rule:

ipchains -A output -p TCP -d 172.168.35.40 ! www

What is the function of this rule?

Options:

A.

This rule for the output chain states that all www traffic on 172.168.35.40 from any IP address is allowed.

B.

This rule for the input chain states that all TCP packets are allowed to the 172.168.35.40 IP address to any port other than 80.

C.

This rule for the input chain states that all TCP packets are able to get to the www service on any IP address except for 172.168.35.40.

D.

This rule for the output chain states that all TCP packets are able to get to the www service on any IP address except for 172.168.35.40.

E.

This rule for the output chain states that all TCP packets are allowed to the 172.168.35.40 IP address to any port other than 80.

Buy Now
Questions 8

You are training some of your team on the concepts of wireless technologies. What are the two types of infrared wireless transmissions?

Options:

A.

Bridged

B.

Line of sight

C.

Diffused

D.

Routed

E.

Integrated

Buy Now
Questions 9

Your company has created it's security policy and it's time to get the firewall in place. Your group is trying to decide whether to build a firewall or buy one. What are some of the downsides to deciding to build a firewall rather than purchase one?

Options:

A.

Weak (or no) management GUI.

B.

Weak (or no) logging and alerting.

C.

Weak rule configuration.

D.

The OS cannot be hardened before implementing the firewall on it.

E.

Weak (or no) real time monitoring.

Buy Now
Questions 10

Your network traffic has increased substantially over the last year, and you are looking into your caching options for frequently visited websites. What are the two types of caching that ISA Server 2006 supports?

Options:

A.

Reverse caching

B.

Forward caching

C.

Inverse caching

D.

Recursive caching

E.

Real-time caching

Buy Now
Questions 11

After you implemented your IPSec solution, you wish to run some tests to verify functionality. Which of the following provides confidentiality and authentication when implementing IPSec?

Options:

A.

Authentication Header

B.

Encapsulating Security Payload

C.

Security Associations

D.

Security Authentications

E.

Encapsulating Delimiters

Buy Now
Questions 12

The CEO of your company has just issued a statement that the network must be more secure right away.

You have discussed several options with the Chief Security Officer and the Chief Technology Officer. The results of your discussion are to implement IPSec. What are the two prime functions of IPSec that you can let the CEO know will be addressed with the implementation?

Options:

A.

Ensure data corruptibility

B.

Ensure data integrity

C.

Ensure data availability

D.

Ensure data security

E.

Ensure data deliverability

Buy Now
Questions 13

Network Monitor was run on a Windows Server 2003. The exhibit shows the actual contents of a Network

Monitor capture file.

SCNS Question 13

What are the IP addresses of the source and destination hosts involved in this communication? To help you determine the two hosts, they have been outlined within the captured content.

Options:

A.

10.18.10.211 & 10.18.71.12

B.

10.28.33.131 & 10.28.64.20

C.

172.16.30.1 & 172.16.30.2

D.

17.26.30.1 & 19.26.30.2

E.

212.168.15.1 & 192.168.15.2

Buy Now
Questions 14

You are configuring your new Cisco router. During your configuration you wish to eliminate any security risks you can, as based on your organizational security policy. The policy states that the Cisco Discovery

Protocol is not to be used on any interface on any of the routers. What is the command to turn off CDP for the entire router?

Options:

A.

no cdp broadcast

B.

cdp disable

C.

no cdp enable

D.

no cdp run

E.

no cdp neighbors

Buy Now
Questions 15

The exhibit represents a simple routed network. Node 7 is a Windows 2000 Professional machine that establishes a TCP communication with Node 10, a Windows 2003 Server. The routers are Cisco 2500 series running IOS 11.2.

While working at Node 10, you run a packet capture. Packets received by Node 10, and sent from Node 7 will reveal which of the following combination of source IP and source Physical addresses:

SCNS Question 15

Options:

A.

Source IP address 10.0.10.115, Source Physical address for Node 7

B.

Source IP address 50.0.50.1, Source Physical address for Node 7

C.

Source IP address for Router D's Int E0, Source Physical address for Node 7

D.

Source IP address 10.0.10.115, Source Physical address Router D's Int E0

E.

Source IP addresses for both Nodes 7 and Router D's Int E0, Source Physical address for both Nodes 7 and Router D's Int E0.

Buy Now
Questions 16

The exhibit shows a router with three interfaces E0, E1 and S0. Interfaces E0 and E1 are connected to internal networks 192.168.10.0 and 192.168.20.0 respectively and interface S0 is connected to the Internet.

The objective is to allow only network 192.168.20.0 to access e-commerce Web sites on the Internet, while allowing all internal hosts to access resources within the internal network. From the following, select all the access list statements that are required to make this possible.

SCNS Question 16

Options:

A.

access-list 113 permit tcp 192.168.20.0 0.0.0.255 any eq 80

B.

access-list 113 permit tcp 192.168.20.0 0.0.0.255 any eq 53

C.

access-list 113 permit tcp 192.168.20.0 0.0.0.255 any eq 443

D.

access-list 113 permit tcp 192.168.20.0 0.0.0.255 any lt 1023

E.

int S0, ip access-group 113 in

F.

int E1, ip access-group 113 in

G.

int S0, ip access-group 113 out

Buy Now
Questions 17

You have been given the task of building the new wireless networks for your office, and you need to verify that your equipment will not interfere with other wireless equipment frequencies. What wireless standard allows for up to 11 Mbps transmission rates and operates in the 2.4GHz range?

Options:

A.

802.11b

B.

802.11e

C.

802.11a

D.

802.11i

E.

802.11g

Buy Now
Questions 18

During your investigation into wireless security options, you are reading about the 820.11 standards.

What wireless standard is designed to address the security issues of 802.11 networks?

Options:

A.

802.11a

B.

802.11i

C.

802.11b

D.

802.11e

E.

802.11g

Buy Now
Questions 19

You are configuring your new IDS machine, where you have recently installed Snort. While you are working with this machine, you wish to create some basic rules to test the ability to log traffic as you desire.

Which of the following Snort rules will log any telnet traffic from any IP address to port 23 of the 10.0.10.0/24 network?

Options:

A.

log udp any any -> 10.0.10.0/24 23

B.

log any any -> 10.0.10.0/24 telnet

C.

log udp telnet any -> 10.0.10.0/255.255.255.0

D.

log tcp telnet any -> 10.0.10.0/255.255.255.0

E.

log tcp any any -> 10.0.10.0/24 23

Buy Now
Questions 20

When installing a firewall, what is the process by which you remove un-needed services and features from a machine to reduce the risk of vulnerabilities to the underlying OS called?

Options:

A.

Tightening

B.

Cascading

C.

Streamlining

D.

Cleansing

E.

Hardening

Buy Now
Questions 21

You have configured Snort, running on your Windows Server 2003, to connect to a MySQL database.

You are now creating the Snort database in MySQL. At the MySQL prompt, what is the correct command to create a database named: snortdb1?

Options:

A.

create database snortdb1;

B.

build database snortdb1;

C.

enable database snortdb1;

D.

create snortdb1 database;

E.

build snortdb1 database;

F.

enable snortdb1 database;

Buy Now
Questions 22

The main reason you have been hired at a company is to bring the network security of the organization up to current standards. A high priority is to have a full security audit of the network as soon as possible. You have chosen an Operational Audit and are describing it to your coworkers. Which of the following best describes an Operational audit?

Options:

A.

This type of audit is typically done by a contracted external team of security experts who check for policy compliance.

B.

This type of audit is usually done by internal resources to examine the current daily and on-going activities within a network system for compliance with an established security policy.

C.

This type of audit is typically done by an internal team who ensures the security measures are up to international standards.

D.

This type of audit is usually done by the current network administrators who ensure the security measures are up to international standards.

E.

This type of audit is usually conducted by external resources and may be a review or audit of detailed audit logs.

Buy Now
Questions 23

As per the specifications of RFC 1191: Path MTU Discovery, MTUs have been defined so that transmitted datagram will not unnecessarily become fragmented when traveling across different types of physical media. You are going to run several packet captures to be sure there are no out of spec packets on

your network. According to these specifications what are the absolute minimum and maximum MTUs?

Options:

A.

1492 Bytes and 1500 Bytes respectively

B.

68 Bytes and 65535 Bytes respectively

C.

512 Bytes and 1500 Bytes respectively

D.

512 bits and 1500 bits respectively

E.

512 bits per second and 1500 bits per second respectively

Buy Now
Questions 24

In your organization a decision has been made to implement a multicasting application. You are configuring your firewall to allow this application to flow through in both directions. What address range are you going to address on the firewall?

Options:

A.

10.0.0.0/8

B.

172.16.0.0/12

C.

Multicast addresses use APIPA's 169.254.0.0/16

D.

224.0.0.0/4

E.

Addresses are negotiated at the time of the multicast. The nearest router assigns a public IP address assigned by ARIN.

Buy Now
Questions 25

During a network analysis session, you capture several TCP/IP sessions. You focus your analysis on the

IP Headers. In an IP Header, what is the function of the first four bits?

Options:

A.

To define the type

B.

To define the source port number

C.

To define the destination port number

D.

To define the IP Version

E.

To define the upper layer protocol

Buy Now
Questions 26

The three-way handshake utilizes three steps, identified as: Step 1, 2 and 3, that take place between a client and a server in order to establish a TCP connection.

In Step 2 of a normal three-way handshake, the server is said to be performing:

Options:

A.

An Active Open

B.

A Passive Open

C.

Both Active and Passive Open

D.

A Passive Open, while simultaneously closing the Client's Active Open

E.

An Active Open, while simultaneously closing the Client's Passive Open

Buy Now
Questions 27

You are going to migrate the Cisco routers in your network from RIPv1 to RIPv2. What is a security advantage that RIPv2 provides over RIPv1?

Options:

A.

RIPv2 encrypts all of the router updates

B.

RIPv2 encrypts all the payloads in router updates

C.

RIPv2 provides for authentication using Smart Cards and Kerberos

D.

RIPv2 provides for authentication using NTLMv2

E.

RIPv2 allows for authentication of updates

Buy Now
Questions 28

When you took over the security responsibilities at your office, you noticed there were no warning banners on any of the equipment. You have decided to create a warning login banner on your Cisco router.

Which of the following shows the correct syntax for the banner creation?

Options:

A.

banner login C Restricted access. Only authorized users allowed to access this device. C

B.

login banner C Restricted access. Only authorized users allowed to access this device. C

C.

banner login Restricted access. Only authorized users allowed to access this device.

D.

login banner Restricted access. Only authorized users allowed to access this device.

E.

banner logging C Restricted access. Only authorized users allowed to access this device. C

Buy Now
Questions 29

You are configuring your new IDS machine, and are creating new rules. You enter the following rule:

Alert tcp any any -> 10.0.10.0/24 any (msg: "SYN-FIN scan detected"; flags: SF;)

What is the effect of this rule?

Options:

A.

This is an alert rule, designed to notify you of SYN-FIN scans of the network in one direction.

B.

This is an alert rule, designed to notify you of SYN-FIN scans of the network in either direction.

C.

This is a logging rule, designed to capture SYN-FIN scans.

D.

This is a logging rule, designed to notify you of SYN-FIN scans.

E.

This is an alert rule, designed to notify you of SYN-FIN scans originating from the 10.0.10.0/24 network.

Buy Now
Questions 30

You need to add a line to your IPTables Firewall input chain that will stop any attempts to use the default install of Back Orifice against hosts on your network (the 10.10.10.0 network). Which of the following would be the correct command to use?

Options:

A.

ipchains -A input TCP -d 0.0.0.0/0 -s 10.10.10.0/24 31337 -J DENY

B.

ipchains -A input UDP -s 0.0.0.0/0 -d 10.10.10.0/24 p:31337 -j DENY

C.

ipchains -A input -s 0.0.0.0/0 -d 10.10.10.0/24 -p 31337 -j DENY

D.

ipchains -A input TCP -s 0.0.0.0/0 -d 10.10.10.0/24 31337 -j DENY

E.

ipchains -A input -s 0.0.0.0/0 -d 10.10.10.0/24 31337 -j deny

Buy Now
Questions 31

There are several options for you to choose from when building your wireless security solution. Wireless

Transport Layer Security is based on which fundamental security technology?

Options:

A.

DES

B.

Triple-DES

C.

SSL

D.

WEP

E.

WAP

Buy Now
Questions 32

You are going to configure your SuSe Linux computer to run Snort as your IDS. Prior to running Snort, you wish to configure Apache and PHP, so you may use Snort monitoring tools in the browser. You need to verify that Apache and PHP are running properly. What line needs to be entered in the info.php file to test PHP on your Apache server?

Options:

A.

B.

http://localhost/info.php

C.

D.

E.

Buy Now
Questions 33

You are configuring your new IDS machine, and are creating new rules. You enter the following rule:

Alert tcp any any -> 10.0.10.0/24 any (msg: "NULL scan detected"; flags: 0;)

What is the effect of this rule?

Options:

A.

This is a logging rule, designed to capture NULL scans originating from the 10.0.10.0/24 network.

B.

This is a logging rule, designed to capture NULL scans.

C.

This is an alert rule, designed to notify you of NULL scans of the network in either direction.

D.

This is an alert rule, designed to notify you of NULL scans of the network in one direction.

E.

This is a logging rule, designed to notify you of NULL scans.

Buy Now
Exam Code: SCNS
Exam Name: SCNS Tactical Perimeter Defense
Last Update: Nov 27, 2023
Questions: 232
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 06 May 2024