New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Note! Exin has retired the SCNP Exam Contact us through Live Chat or email us for more information.

SCNP SCNP Strategic Infrastructure Security Questions and Answers

Questions 4

The image shows an example of what algorithm?

Options:

A.

DES

B.

Triple-DES

C.

Blowfish

D.

DH

E.

IDEA

Buy Now
Questions 5

You are concerned that email messages sent to your Outlook clients could contain customized and dangerous scripting. What can you do to minimize the threat that this specific type of email presents?

Options:

A.

Install and Update Anti-Virus software

B.

Update the Security Settings for the clients at the SMTP Server

C.

Disable the Preview Pane

D.

Be sure that all forms of scripting are disabled on all clients

E.

Minimize the number of contacts allowed in an address book

Buy Now
Questions 6

You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS 6.0.

You are concerned about the overall security of your servers, and are checking with Microsoft for any patches or updates that you might need to apply to your systems. Which of the following would you apply if you need to implement an update to fix a specific problem that addresses a critical, non-security-related bug?

Options:

A.

Critical Update

B.

Security Update

C.

Feature Pack

D.

Update Rollup

E.

MSB Update

Buy Now
Questions 7

Often times attackers will run scans against the network to identify different network and operating systems, and resources that are available. If an attacker runs scans on the network, and you are logging the connections, which of the following represent the legitimate combination of packets that will be sent between the attacker and target?

Options:

A.

Attacker PSH-FIN Scan, Target RST-FIN Response

B.

Attacker ACK Scan, Target NULL Response

C.

Attacker NULL Scan, Target RST Response

D.

Attacker SYN Scan, Target NULL Response

E.

Attacker FIN Scan, Target RST Response

Buy Now
Questions 8

You are creating the Remote Access section of your organizational security policy. From the following options, select the questions to use for the formation of this section?

Options:

A.

What methods of remote access are allowed (cable modem, DSL, and so on)?

B.

How are partner VPNs to be configured (to firewall or host)?

C.

Which users are authorized to install networking devices into computers?

D.

What is the process for becoming authorized for remote access?

E.

Is the entire network accessible remotely?

Buy Now
Questions 9

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Linux Ping Response

B.

Linux Ping Request

C.

Windows 2000 Ping Request

D.

Windows 2000 Ping Response

E.

Windows NT 4.0 Ping Request

Buy Now
Questions 10

It has come to your attention that some machine has tried to send a packet to your DNS server containing both a DNS query and an answer that is false. What type of attack was used against your network?

Options:

A.

DNS overflow

B.

DNS poisoning through sequence prediction

C.

Statd overflow

D.

DNS cache poisoning

E.

DNS parse corruption

Buy Now
Questions 11

Recently you found out that there has been a flood of bogus network traffic hitting your Email server.

Because of this flood, authorized users have not been able to consistently send or receive email. What is happening to your Email server?

Options:

A.

A Denial of Service Attack

B.

A Virus Attack

C.

A Worm Attack

D.

A Macro Attack

E.

A Trojan Attack

Buy Now
Questions 12

In your organization, the majority of employees use Microsoft Outlook Express as their email client. You are configuring these systems so that applications on the employee systems cannot send email, posing as the user of the system. Under the Security tab, which option will you select to achieve this goal?

Options:

A.

Do not allow other applications to send mail as me.

B.

Disable application mail delivery.

C.

Prompt me prior to application mail delivery.

D.

Warn me when other applications try to send mail as me.

E.

Do not allow applications that could potentially transmit a virus to send mail as me.

Buy Now
Questions 13

After a security meeting, IT leaders decided that the organization will perform a completely new risk analysis, as the previous one was done over five years ago. The methods that will be used is FRAP. Which of the following best describes the FRAP method of risk analysis?

Options:

A.

FRAP involves assigning team members to identify specific vulnerabilities. Once the vulnerabilities have been identified, a level of risk is assigned, as a factor of times per year this vulnerability may be exploited.

Finally, a dollar value in lost revenue is assigned to each asset that can be compromised by this vulnerability.

B.

FRAP is a team method. Individuals from different aspects of an organization form a committee. Once together, they discuss the areas of risk, the likelihood of a threat, the impact of the threat, and the methods that should be used to minimize the threat.

C.

FRAP involves assigning dollar values to assets, and calculating how often a threat to the asset will occur. Once determined an approximate dollar value to each asset and threat combination is calculated.

D.

FRAP is the process of determining the likelihood of a threat as medium, high, or low. Once the likelihood is determined the cost is identified, again as medium, high, or low. Finally, based on cost, a response to the threat is determined.

E.

FRAP is the process of determining the likelihood of a threat as medium, high, or low. Once the likelihood is determined, the level of damage is identified, again as high, medium, or low. Finally, the response to the threat is determined.

Buy Now
Questions 14

Which of the following has the stages of Risk Analysis in order, from a to e?

a) Management

b) Threat Assessment

c) Control Evaluation

d) Inventory

e) Monitoring

Options:

A.

b, d, c, e, a

B.

a, b, d, c, e

C.

d, b, c, a, e

D.

a, b, c, d, e

E.

d, b, a, c, e

Buy Now
Questions 15

Microsoft has developed several security tools to help you with the security and configuration of the systems in your network. One of these tools is the Microsoft Security Baseline Analyzer (MBSA). In the command line options of the MBSA is the HFNetChk tool. What is the function of the HFNetChk tool, available with MBSA?

Options:

A.

To check for the current Hotfixes that are available from Microsoft

B.

It is an upgrade to the Windows Update tool for checking on all updates

C.

It is the tool that must be run prior to installing IIS 6.0

D.

It is the tool that checks the network configuration of all web servers

E.

To record what Hotfixes and service packs are running on the Windows machine

Buy Now
Questions 16

You work for a medium sized ISP and there have been several attacks of the DNS configuration recently.

You are particularly concerned with DNS Spoofing attacks. If an attacker is able to send out false data to a

DNS client before the response from the DNS server arrives, this is which type of DNS Spoofing?

Options:

A.

DNS Server Compromise

B.

DNS Cache Poisoning

C.

Spoofing the DNS Response

D.

DNS Source-Router Spoof

E.

IXFR Source-Spoof

Buy Now
Questions 17

You are running some tests in your network, to see if you can remotely identify the operating system of nodes in the network. Using the nmap tool, which of the following commands will identify the operating system of the computer using IP address 192.168.10.1?

Options:

A.

nmap -ident 192.168.10.1 -sS

B.

nmap -sS 192.168.10.1 -O

C.

nmap -Id 192.168.10.1 -sS

D.

nmap -a -u -x -Id 192.168.10.1

E.

nmap -Id 192.168.10.1 -aux -sS

Buy Now
Questions 18

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Nmap SYN/FIN Scan

B.

Nmap ACK Scan

C.

Nmap NULL Scan

D.

Nmap XMAS Scan

E.

Nmap SYN Scan

Buy Now
Questions 19

In order for your newly written security policy to have any weight, it must be implemented. Which of the following are the three components of a successful Security Policy Implementation in an organization?

Options:

A.

Policy Monitoring

B.

Policy Design

C.

Policy Committee

D.

Policy Enforcement

E.

Policy Documentation

Buy Now
Questions 20

During a one week investigation into the security of your network you work on identifying the information that is leaked to the Internet, either directly or indirectly. One thing you decide to evaluate is the information stored in the Whois lookup of your organizational website. Of the following, what pieces of information can be identified via this method?

Options:

A.

Registrar

B.

Mailing Address

C.

Contact Name

D.

Record Update

E.

Network Addresses (Private)

Buy Now
Questions 21

You are discussing the design and infrastructure of the Internet with several colleagues when a disagreement begins over the actual function of the NAP in the Internets design. What is the function of a

NAP in the physical structure of the Internet?

Options:

A.

The NAP provides for a layered connection system of ISPs connecting to the backbone.

B.

The NAP provides the actual connection point between a local user and the Internet.

C.

The NAP provides the physical network with communication channels for the Internet and voice/data applications.

D.

The NAP provides a national interconnection of systems, called peering centers, to the NSPs.

E.

The NAP provides for a connection point between an ISP and the backbone of the Internet.

Buy Now
Questions 22

What classic cipher is shown in this image?

Options:

A.

Feistel Cipher

B.

Caesar Cipher

C.

Vingre Cipher

D.

Polybius Cipher

E.

Enigma Cipher

Buy Now
Questions 23

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Linux Ping Response

B.

Linux Ping Request

C.

Windows 2000 Ping Request

D.

Windows 2000 Ping Response

E.

Windows NT 4.0 Ping Request

Buy Now
Questions 24

You are reviewing the lines used in the configuration of TCP Wrappers on your Linux system. When placed in the denial file, what is the function of the following line?

in.telnetd: 192.168.23.: spawn (/bin/echo %c >> /var/log/telnet.log)

Options:

A.

This line will initiate a Telnet connection to the 192.168.23.0/24 network.

B.

This line will write a log line to the /bin/echo directory when a host tries to use Telnet to connect to the 192.168.23.0/24 network.

C.

This line will initiate an ICMP echo request when a host from the 192.168.23.0/24 network uses Telnet.

D.

This line will write a log line that contains client information when a host from the QUESTION NO: 192

68.23.0/24 network attempts to use Telnet.

E.

This line will write a log line to the /var/log directory when a host tries to use Telnet to connect to the 192.168.23.0/24 network.

Buy Now
Questions 25

Which of the following are asymmetric encryption algorithms?

Options:

A.

MD5

B.

RSA

C.

Diffie-Hellman

D.

3DES

E.

AES

Buy Now
Questions 26

At the root@linuxbox$ prompt on a Linux machine you type ls -l b.doc and the output reads:

-rw-rw-r--1 simonusers31337Oct 5 11:21 b.doc

According to this output, which of the following is true?

Options:

A.

b.doc is a word document

B.

Nobody but the owner can execute this file

C.

This file is infected by the simon trojan

D.

Nobody can read this file

E.

Everyone can read this file

Buy Now
Questions 27

On your Linux computer you are examining the contents of various files to ensure they are secured and contain the designated information. Entries in the /etc/hosts file consist of which of the following?

Options:

A.

The IP address, the host-name and aliases (if any)

B.

The IP address, subnet mask, the host-name (if any)

C.

The IP address, subnet mask, the host-name and aliases (if any)

D.

The IP address, subnet mask, default gateway and the host-name

E.

The IP address, subnet mask, default gateway, the host-name and aliases (if any)

Buy Now
Questions 28

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Trojan Horse Scan

B.

Back Orifice Scan

C.

NetBus Scan

D.

Port Scan

E.

Ping Sweep

Buy Now
Questions 29

In Windows 2003, there are four methods of implementing IPSec. They are:

1 - Require Security

2 - Request Security

3 - Respond Only

4 - No IPSec Policy

Your network hosts many servers, and different security policies are in place in different locations in the network. The Clients and Servers in your network are configured as follows:

-You have servers numbered 1-9, which have a policy stating they require no network traffic security.

-You have servers numbered 10-19, which have a policy stating they are not required to be secure, but will encrypt network traffic if the client is able to receive it.

-You have servers numbered 20-29, which have a policy stating they are required to be secure and all network traffic they deliver must be secured.

-You have clients numbered 60-79 that are required to access secure servers 20-29.

-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are required to access servers 1-9 and 10-19.

Based on the Client and Server configuration provided above, which of the following computers must implement IPSec method 3?

Options:

A.

Computers numbered 1-9

B.

Computers numbered 10-19

C.

Computers numbered 20-29

D.

Computers numbered 60-79

E.

Computers numbered 80-90

Buy Now
Questions 30

When a new user account is created in Linux, what values are assigned to the user account?

Options:

A.

Shell_GID

B.

SetGID

C.

SetUID

D.

UID

E.

GID

Buy Now
Questions 31

Which of the following answers is the word SECURITY after having been encrypted using the following Polybius Cipher shown in the figure?

Options:

A.

280

B.

34 51 31 54 24 42 44 45

C.

7 6 8 9 6 6 8 9

D.

43 15 13 45 42 24 44 54

E.

4315 4224 1345 4454

Buy Now
Questions 32

You are configuring a complex set of policies in your Windows 2003 Active Directory network. You have parent and child GPOs. If you do not want the child GPO to inherit policy from the parent GPO, you would do which of the following?

Options:

A.

Check the Block Policy Inheritance checkbox.

B.

Uncheck the Disallow Inheritable Permissions to Traverse from Parent to Child Object box.

C.

Uncheck the Reset Permissions on All Child Objects and Enable Propagation of Inheritable Permissions.

D.

Check the Disallow Inheritable Permissions to Traverse from Parent to Child Object box.

E.

You cannot block policy inheritance from parent to child GPOs.

Buy Now
Questions 33

You fear an unauthorized program has taken control of your CPU in your Linux system. What command will you run to see the CPU percentage per application in real-time?

Options:

A.

top

B.

netmon

C.

ps

D.

cpu_id

E.

ps aux

Buy Now
Questions 34

One of your assistants has configured a Windows 2003 Server to use EFS. This server is only accessed from internal network clients over a 100BaseT infrastructure. You tell your assistant that the security offered by EFS in this situation will not increase the security of the data transferred. Why is your statement correct?

Options:

A.

Each user would have to log in directly to the server to decrypt their files.

B.

There is no way to securely share the key that the server will use to perform the encryption.

C.

The files cannot be encrypted remotely by users at client computers.

D.

The files will be decrypted remotely, and then sent to the clients in clear text.

E.

The network cannot be configured to receive encrypted data without modifying the switches for such traffic.

Buy Now
Exam Code: SCNP
Exam Name: SCNP Strategic Infrastructure Security
Last Update: Dec 22, 2024
Questions: 233