Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Note! Exin has retired the SCNS Exam Contact us through Live Chat or email us for more information.

SCNS SCNS Tactical Perimeter Defense Questions and Answers

Questions 4

Your network is a mixed environment of Windows, Linux, and UNIX, computers. The routers are primarily

Cisco and the network uses a T-1 to connect to the Internet. You are experimenting with setting up a mail server in a production environment for internal use only. You do not want this mail server to receive any requests from anywhere but the internal network. Therefore you have decided to block incoming SMTP traffic at the Firewall. Which port will you block at the Firewall?

Options:

A.

23

B.

25

C.

53

D.

80

E.

110

Buy Now
Questions 5

The main reason you have been hired at a company is to bring the network security of the organization up to current standards. A high priority is to have a full security audit of the network as soon as possible. You have chosen an Independent Audit and are describing it to your coworkers. Which of the following best describes an Independent Audit?

Options:

A.

An independent audit is usually conducted by external or outside resources and may be a review or audit of detailed audit logs.

B.

The independent audit is usually done by the current network administrators who ensure the security measures are up to international standards.

C.

The independent audit is typically done by an internal team who ensures the security measures are up to international standards.

D.

The independent audit is usually done by internal resources to examine the current daily and on-going activities within a network system for compliance with an established security policy.

E.

The independent audit is typically done by a contracted outside team of security experts who check for policy compliance.

Buy Now
Questions 6

The exhibit represents a simple routed network. Node 7 is a Windows 2000 Professional machine that establishes a TCP communication with Node 10, a Windows 2003 Server. The routers are Cisco 2500 series running IOS 11.2.

While working at Node 10, you run a packet capture. Packets received by Node 10, and sent from Node 7 will reveal which of the following combination of source IP and source Physical addresses:

Options:

A.

Source IP address 10.0.10.115, Source Physical address for Node 7

B.

Source IP address 50.0.50.1, Source Physical address for Node 7

C.

Source IP address for Router D's Int E0, Source Physical address for Node 7

D.

Source IP address 10.0.10.115, Source Physical address Router D's Int E0

E.

Source IP addresses for both Nodes 7 and Router D's Int E0, Source Physical address for both Nodes 7 and Router D's Int E0.

Buy Now
Questions 7

You were recently hired as the security administrator of a small business. You are reviewing the current state of security in the network and find that the current logging system must be immediately modified. As the system is currently configured, auditing has no practical value. Which of the following are the reasons that the current auditing has little value?

Options:

A.

The logs go unchecked.

B.

The logs are automatically deleted after three months.

C.

The logs are deleted using FIFO and capped at 500Kb.

D.

The only auditing is successful file access events.

E.

The logs are deleted using FIFO and capped at 5000Kb.

Buy Now
Questions 8

In your current organization, you have been given the task of implementing the IPSec solution. All your servers are running Windows Server 2003, so you wish to use the built in policies. What are the three default IPSec policies in Windows Server 2003?

Options:

A.

Server (Require Security)

B.

Server (Request Security)

C.

Client (Respond Only)

D.

Client (Request Security)

E.

Server (Respond Only)

Buy Now
Questions 9

During a network capture in Network Monitor, you capture some UDP traffic. In a UDP Header, what is the function of the first sixteen bits?

Options:

A.

To define the upper layer protocol

B.

To define the source port number

C.

To define the destination port number

D.

To define the IP Version

E.

To define the type

Buy Now
Questions 10

You wish to configure a new Cisco router, which will take advantage of the AutoSecure feature. The AutoSecure security features are divided into which two planes?

Options:

A.

Critical Plane

B.

Management Plane

C.

Recursive Plane

D.

Non-Critical Plane

E.

Forwarding Plane

F.

Responsive Plane

Buy Now
Questions 11

If you wish to implement IPSec between two branch offices of your organization, and wish for this to include the encryption of the full packet, which implementation would meet your needs?

Options:

A.

ESP in Transport Mode

B.

AH in Transport Mode

C.

ESP in Tunnel Mode

D.

AH in Tunnel Mode

E.

Combination of both AH and ESP in Transport Mode

Buy Now
Questions 12

Your network is going to implement a new network security solution, and as part of this you are configuring IPSec on a Windows Server 2003 machine. Which of the following is the description of the Client (Respond Only) default IPSec Policy?

Options:

A.

This policy is used for normal communications, and any system with this policy enabled will have the ability to communicate using IPSec if required, or requested.

B.

This policy is used when all IP network traffic is to be secured. Any system with this policy enabled will always enforce secure communications using IPSec.

C.

This policy is used when IP traffic is to be secured, and to allow unsecured communication with clients that do not respond to the request.

D.

This policy is used when clients are the only machines on the network that need IP traffic to be secured.

Any client with this policy enabled will initialize secure communications with other clients running this policy.

E.

This policy is used when clients must respond to IPSec servers. If the client does not use IPSec, network communications will fail.

Buy Now
Questions 13

During your review of the logs of your Cisco router, you see the following line. What is the meaning of this line?

%SYS-5-CONFIG_I: Configured from console by vty1 (172.16.10.1)

Options:

A.

A normal, but noteworthy event

B.

An informative message

C.

A warning condition has occurred

D.

A debugging message

E.

An error condition has occurred

Buy Now
Questions 14

As you increase the layers of security in your organization you watch the network behavior closely. What kind of problems can be introduced by adding file encryption to the computers in your network?

Options:

A.

Network traffic will increase, due to larger packet size

B.

Routers processors will have more work to perform

C.

Routers will require reconfiguring to address encrypted packets

D.

Intrusion Detection system will generate more false-positives

E.

Computers processors will have more work to perform

Buy Now
Questions 15

You are configuring a new IDS, running Snort, in your network. To better configure Snort, you are studying the configuration file. Which four of the following are the primary parts of the Snort configuration file?

Options:

A.

Postprocessors

B.

Variables

C.

Preprocessors

D.

Output Plug-ins

E.

Rulesets

Buy Now
Questions 16

As per the specifications of RFC 1191: Path MTU Discovery, MTUs have been defined so that transmitted datagram will not unnecessarily become fragmented when traveling across different types of physical media. You are going to run several packet captures to be sure there are no out of spec packets on

your network. According to these specifications what are the absolute minimum and maximum MTUs?

Options:

A.

1492 Bytes and 1500 Bytes respectively

B.

68 Bytes and 65535 Bytes respectively

C.

512 Bytes and 1500 Bytes respectively

D.

512 bits and 1500 bits respectively

E.

512 bits per second and 1500 bits per second respectively

Buy Now
Questions 17

During a network analysis session, you capture several TCP/IP sessions. You focus your analysis on the

IP Headers. In an IP Header, what is the function of the first four bits?

Options:

A.

To define the type

B.

To define the source port number

C.

To define the destination port number

D.

To define the IP Version

E.

To define the upper layer protocol

Buy Now
Questions 18

You are configuring your new IDS machine, and are creating new rules. You enter the following rule:

Alert tcp any any -> any 23 (msg: "Telnet Connection Attempt";)

What is the effect of this rule?

Options:

A.

This is a logging rule, designed to capture any telnet attempts

B.

This is an alert rule, designed to notify you of the use of telnet in either direction

C.

This is an alert rule, designed to notify you of the use of telnet in one direction

D.

This is a logging rule, designed to notify you of telnet connection attempts

E.

This is an alert rule, designed to notify you of attempts to connect from any IP address on port 23 to any IP address and any port on a remote host.

Buy Now
Questions 19

You are in the process of configuring your network firewall policy. As you begin building the content of the policy you start to organize the document into sections. Which of the following are sections found in the firewall policy?

Options:

A.

The Acceptable Use Statement

B.

The Firewall Administrator Statement

C.

The Network Connection Statement

D.

The Incident Handling Statement

E.

The Escalation Procedures Statement

Buy Now
Questions 20

You have successfully implemented a new Intrusion Detection System in your network. You have verified that the system is active and did detect the tests you have run against it thus far. You are now in the stage of identifying the type of analysis you wish to use with the system. You meet with the rest of the IT staff and are asked to describe the different options for analysis. Which of the following best describes Interval Analysis?

Options:

A.

This method of analysis uses the internal operating system (or other host-based) audit logs to capture the events, and the IDS at given intervals analyzes the data in the logs for signatures of intrusion.

B.

The basic concept of Interval analysis is to find a deviation from a known pattern of behavior. Using this method, an IDS would create profiles of user behavior.

C.

Interval analysis runs continuously, collecting, analyzing, reporting, and responding (if programmed to do so). An event cannot be countered the exact moment it happens. However, the concept behind Interval analysis is such that an attack should be dealt with as it is happening, and if the system knows the signature, stop the attack before it can complete and compromise a host.

D.

Interval analysis is a method in which the IDS gathers data from both the internal IDS logs and host-based logs, such as Event Viewer files. Using the collected data, the IDS reports on found anomalies and/or intrusions.

E.

Interval analysis is the process of matching known attacks, at intervals, against the data collected in the network. If there is a match, then that is a trigger for an intrusion, and an alarm may be the result.

Buy Now
Questions 21

The main reason you have been hired at a company is to bring the network security of the organization up to current standards. A high priority is to have a full security audit of the network as soon as possible. You have chosen an Independent Audit and are describing it to your coworkers. Which of the following best describes an Independent audit?

Options:

A.

An independent audit is usually conducted by external or outside resources and may be a review or audit of detailed audit logs.

B.

The independent audit is usually done by the current network administrators who ensure the security measures are up to international standards.

C.

The independent audit is typically done by an internal team who ensures the security measures are up to international standards.

D.

The independent audit is usually done by internal resources to examine the current daily and on-going activities within a network system for compliance with an established security policy.

E.

The independent audit is typically done by a contracted outside team of security experts who check for policy compliance.

Buy Now
Questions 22

After installing Snort on your windows machine that is destined to be your IDS, you need to edit the configuration files entry of "HOME_NET" to define which of the following?

Options:

A.

The name of the Domain (or domains) you are parts of

B.

The host name of the machine you are installing Snort on

C.

The name of the network segment you are using Snort to monitor

D.

The IP address of the machine you are installing Snort on

E.

The IP subnet address of the network segment you are using Snort to monitor

Buy Now
Questions 23

You need to diagram wireless security options for your team during a planning meeting. What wireless security process is shown in this image?

Options:

A.

WPA

B.

WEP

C.

WTLS

D.

WPKI

E.

W3DES

Buy Now
Questions 24

You have made some changes to the configuration of your ISA Server 2006 firewall. While analyzing the network traffic, you see that these changes have not yet taken affect. What must you do to get these new rules to take function?

Options:

A.

From the rules drop down menu, select enable state table.

B.

From the rules drop down menu, select enable rule set.

C.

From the state table drop down menu, select enable rule set.

D.

Disable and Enable the network interface that the rule is associated with.

E.

From the command prompt, type firewallpolicy /reload and press Enter.

Buy Now
Questions 25

You are reviewing your companys IPTables Firewall and see the command (minus the quotes) " ! 10.10.216" as part of a rule, what does this mean?

Options:

A.

Traffic destined for host 10.10.10.216 is exempt from filtering

B.

Traffic originating from host 10.10.10.216 is exempt from filtering

C.

Any host except 10.10.10.216

D.

Only host 10.10.10.216

E.

Traffic destined for 10.10.10.216 gets sent to the input filter.

F.

Traffic originating from 10.10.10.216 gets sent to the input filter

Buy Now
Questions 26

As Intrusion Detection Systems become more sophisticated, the software manufacturers develop different methods of detection. If an IDS uses the process of finding a deviation from a well know pattern of user behavior, what is this known as?

Options:

A.

Signature analysis

B.

Packet filter matching

C.

Statistical analysis

D.

Analysis engine engagement

E.

Packet match and alarming

Buy Now
Questions 27

You are going to add another computer to the pool that you use for detecting intrusions. This time you are making a customized Snort machine running on Windows 2000 Professional. Prior to running Snort you must install which of the following programs?

Options:

A.

Network Monitor

B.

Network Monitor Tools and Agent

C.

Libpcap

D.

WinPcap

E.

TCP/IP

Buy Now
Questions 28

For the new Snort rules you are building, it will be required to have Snort examine inside the content of the packet. Which keyword is used to tell Snort how far inside the packet it should look for the pattern, or defined content match?

Options:

A.

Depth

B.

Offset

C.

Nocase

D.

Flow_Control

E.

Classtype

Buy Now
Questions 29

You are reconfiguring your networks firewall to create a DMZ using three network interfaces. After configuring the addresses on the interfaces, you are making the required changes in ISA Server 2006. You are going to use Network Template during this configuration change. What Network Template is designed for this firewall topology?

Options:

A.

DMZ-Mode

B.

Multi-NIC

C.

3-Node Firewall

D.

3-Leg Perimeter

E.

DMZ-Mode, then select three as the number of NICs to configure

Buy Now
Questions 30

In order to properly manage the network traffic in your organization, you need a complete understanding of protocols and networking models. In regards to the 7-layer OSI model, what is the function of the Network Layer?

Options:

A.

The Network layer allows two applications on different computers to establish, use, and end a session.

This layer establishes dialog control between the two computers in a session, regulating which side transmits, plus when and how long it transmits.

B.

The Network layer manages logical addresses. It also determines the route from the source to the destination computer and manages traffic problems, such as routing, and controlling the congestion of data packets.

C.

The Network layer packages raw bits from the Physical (Layer 1) layer into frames (structured packets for data). Physical addressing (as opposed to network or logical addressing) defines how devices are addressed at the data link layer. This layer is responsible for transferring frames from one computer to another, without errors. After sending a frame, it waits for an acknowledgment from the receiving computer.

D.

The Network layer transmits bits from one computer to another and regulates the transmission of a stream of bits over a physical medium. For example, this layer defines how the cable is attached to the network adapter and what transmission technique is used to send data over the cable.

E.

The Network layer handles error recognition and recovery. It also repackages long messages, when necessary, into small packets for transmission and, at the receiving end, rebuilds packets into the original message. The corresponding Network layer at the receiving end also sends receipt acknowledgments.

Buy Now
Questions 31

Your company has many different services that go through your ISA Server 2006, and you need to prioritize the network traffic. What does ISA Server 2006 use to prioritize packets?

Options:

A.

Differentiated Services (DiffServ) protocol

B.

Quality of Service (QoS) protocol

C.

Packet Prioritization (PaPro) protocol

D.

HTTP Prioritization (HPro) protocol

E.

Bandwidth Prioritization (BaPro) protocol

Buy Now
Questions 32

You are using Network Monitor to capture some traffic for later analysis. When you do begin to look at your captured data, you examine the TCP traffic you captured. In a TCP Header, what is the function of the first sixteen bits?

Options:

A.

To define the type

B.

To define the IP Version

C.

To define the destination port number

D.

To define the upper layer protocol

E.

To define the source port number

Buy Now
Questions 33

In the image, there are two nodes communicating via an access point. In the packet on the right side of the image, the Address 1 field is blank. If this packet is destined for the other computer, what is the value that must be filled in this blank address field?

Options:

A.

ABCD

B.

C.

1234

D.

2345

E.

ABCD-1234

Buy Now
Questions 34

In 802.1x, what allows for the multiple methods of user authentication?

Options:

A.

EAP

B.

WEP

C.

WTLS

D.

PHY

E.

MAC

Buy Now
Exam Code: SCNS
Exam Name: SCNS Tactical Perimeter Defense
Last Update: Nov 23, 2024
Questions: 232