PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Similar documents
Exam : SCNS_EN. Title : SCNS SCNS Tactical Perimeter Defense. Version : Demo

Topexam. 一番権威的な IT 認定試験ウェブサイト 最も新たな国際 IT 認定試験問題集

Inspection of Router-Generated Traffic

Configuring IP Services

Configuring IP Services

CIT 380: Securing Computer Systems. Network Security Concepts

2. What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? A. NAT B.

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface

MTA_98-366_Vindicator930

Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list.

SCP SC Network Defense and Countermeasures (NDC) Exam.

CSE 565 Computer Security Fall 2018

CISCO SYSTEM ADMINISTRATION (41)

ICS 351: Networking Protocols

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

Client QoS Association Settings on the WAP371

SYSTEMS ADMINISTRATION USING CISCO (315)

7 Filtering and Firewalling

Computer Networks Security: intro. CS Computer Systems Security

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

Configuring Cache Services Using the Web Cache Communication Protocol

Exam Questions

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦

Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels

CS 458 Internet Engineering Spring First Exam

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

CSC Network Security

ACL Rule Configuration on the WAP371

Cisco Exam Cisco Interconnecting Cisco Networking Devices Part 1 (ICND) Version: 12.0 [ Total Questions: 202 ]

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco IP Routing (ROUTE v2.0) Version: Demo

ECE 158A: Lecture 7. Fall 2015

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Firewall Stateful Inspection of ICMP

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Date: June 4 th a t 1 4:00 1 7:00

n Describe sniffing concepts, including active and passive sniffing n Describe sniffing countermeasures n Describe signature analysis within Snort

Chapter 5 Network Layer

IP Access List Overview

1. Which network design consideration would be more important to a large corporation than to a small business?

Manual Key Configuration for Two SonicWALLs

Configuring TCP Header Compression

Chapter 2 Advanced TCP/IP

Access Control List Enhancements on the Cisco Series Router

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

Chapter 8 roadmap. Network Security

Quality of Service Setup Guide (NB14 Series)

ECE 461 Internetworking Fall Quiz 1

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)

EXAM Interconnecting Cisco Networking Devices Part 1 (ICND1) v3. For More Information:

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Configuring TCP Header Compression

CSC 474/574 Information Systems Security

Communication Systems DHCP

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Configuring IP Services

Firewall Policy. Edit Firewall Policy/ACL CHAPTER7. Configure a Firewall Before Using the Firewall Policy Feature

Foreword xxiii Preface xxvii IPv6 Rationale and Features

ipv6 hello-interval eigrp

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

CISCO EXAM QUESTIONS & ANSWERS

Object Groups for ACLs


Table of Contents. Cisco Configuring IP Access Lists

Access Control List Overview

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

20-CS Cyber Defense Overview Fall, Network Basics

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

CCNA Access List Questions

Your Name: Your student ID number:

Configuring Web Cache Services By Using WCCP

Configuring attack detection and prevention 1

Firepower Threat Defense Site-to-site VPNs

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Chapter 5 OSI Network Layer

Lab b Standard ACLs Instructor Version 2500

Using Access Point Communication Protocols

CompTIA Network+ Study Guide Table of Contents

Networks Homework # 2

IPv6 Commands: ipv6 h to ipv6 mi

V Commands. virtual ip, page 2 virtual ipv6, page 5 vrf, page 8. Cisco Nexus 7000 Series NX-OS Intelligent Traffic Director Command Reference 1

Cisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product.

1. Which OSI layers offers reliable, connection-oriented data communication services?

Implementing Traffic Filters for IPv6 Security

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

Syllabus: The syllabus is broadly structured as follows:

Firewalls, Tunnels, and Network Intrusion Detection

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Transcription:

PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year

Exam : SCNS Title : SCNS Tactical Perimeter Defense Vendors : EXIN Version : DEMO Get Latest & Valid SCNS Exam's Question and Answers from Pass4test.com. 1

1.The exhibit represents a simple routed network. Node 7 is a Windows 2000 Professional machine that establishes a TCP communication with Node 10, a Windows 2003 Server. The routers are Cisco 2500 series running IOS 11.2. While working at Node 10, you run a packet capture. Packets received by Node 10, and sent from Node 7 will reveal which of the following combination of source IP and source Physical addresses: A. Source IP address 10.0.10.115, Source Physical address for Node 7 B. Source IP address 50.0.50.1, Source Physical address for Node 7 C. Source IP address for Router D's Int E0, Source Physical address for Node 7 D. Source IP address 10.0.10.115, Source Physical address Router D's Int E0 E. Source IP addresses for both Nodes 7 and Router D's Int E0, Source Physical address for both Nodes 7 and Router D's Int E0. Answer: D 2.You have implemented an IPSec policy, using only AH. You are analyzing your network traffic in Network Monitor, which of the following statements are true about your network traffic.? A. You will not be able to view the data in the packets, as it is encrypted. B. You will not be able to identify the upper layer protocol. C. You will be able to view the unencrypted data in the packets. D. You will be able to identify the encryption algorithm in use. E. You will not be able to view the packet header. Answer: C 3.In order to perform promiscuous mode captures using the Wireshark capture tool on a Windows Server 2003 machine, what must first be installed? A. IPv4 stack B. IPv6 stack 2 / 10 Get Latest & Valid SCNS Exam's Question and Answers from Pass4test.com. 2

C. WinPcap D. Nothing, it will capture by default E. At least two network adapters Answer: C 4.You are configuring the rules on your firewall, and need to take into consideration that some clients in the network are using automatic addressing. What is the IP address range reserved for internal use for APIPA in Microsoft networks? A. 169.254.0.0 /4 B. 169.254.0.0 /16 C. 169.254.0.0 /8 D. 169.254.0.0 /0 E. 168.255.0.0 /16 5.If you capture an 802.11 frame, and the ToDS bit is set to zero and the FromDS bit is set to zero, what type of WLAN is this frame a part of? A. Mesh B. Broadcast C. Infrastructure D. Hierarchical E. Ad Hoc Answer: E 6.There are several options available to you for your new wireless networking technologies, and you are examining how different systems function. What transmission system uses short bursts combined together as a channel? A. Frequency Hopping Spread Spectrum (FHSS) B. Direct Sequence Spread Spectrum (DSSS) C. Lamar Anthell Transmission (LAT) D. Digital Band Hopping (DBH) E. Digital Channel Hopping (DCH) 7.You have just installed a new Intrusion Detection System in your network. You are concerned that there are functions this system will not be able to perform. What is a reason an IDS cannot manage hardware failures? A. The IDS can only manage RAID 5 failures. B. The IDS cannot be programmed to receive SNMP alert messages. C. The IDS cannot be programmed to receive SNMP trap messages. D. The IDS cannot be programmed to respond to hardware failures. E. The IDS can only inform you that an event happened. Answer: E 3 / 10 Get Latest & Valid SCNS Exam's Question and Answers from Pass4test.com. 3

8.For the new Snort rules you are building, it will be required to have Snort examine inside the content of the packet. Which keyword is used to tell Snort to ignore a defined number of bytes before looking inside the packet for a content match? A. Depth B. Offset C. Nocase D. Flow_Control E. Classtype 9.You have recently taken over the security of a mid-sized network. You are reviewing the current configuration of the IPTables firewall, and notice the following rule: ipchains -A input -p TCP -d 0.0.0.0/0 12345 -j DENY What is the function of this rule? A. This rule for the output chain states that all incoming packets from any host to port 12345 are to be denied. B. This rule for the input chain states that all incoming packets from any host to port 12345 are to be denied. C. This rule for the input chain states that any TCP traffic from any address destined for any IP address and to port 12345 is to be denied. D. This rule for the output chain states that any TCP traffic from any address destined for any IP address and to port 12345 is to be denied. E. This rule for the input chain states that all TCP packets inbound from any network destined to any network is to be denied for ports 1, 2, 3, 4, and 5. Answer: C 10.At a policy meeting you have been given the task of creating the firewall policy. What are the two basic positions you can take when creating the policy? A. To deny all traffic and permit only that which is required. B. To permit only IP traffic and filter TCP traffic C. To permit only TCP traffic and filter IP traffic D. To permit all traffic and deny that which is required. E. To include your internal IP address as blocked from incoming to prevent spoofing.,d 11.You are planning on implementing a token-based authentication system in your network. The network currently is spread out over four floors of your building. There are plans to add three branch offices. During your research you are analyzing the different types of systems. Which of the following are the two common systems token-based authentication uses? A. Challenge/Response B. Random-code C. Time-based D. Challenge/Handshake E. Password-Synch 4 / 10 Get Latest & Valid SCNS Exam's Question and Answers from Pass4test.com. 4

,C 12.During your review of the logs of your Cisco router, you see the following line. What is the meaning of this line? %SYS-5-CONFIG_I: Configured from console by vty1 (172.16.10.1) A. A normal, but noteworthy event B. An informative message C. A warning condition has occurred D. A debugging message E. An error condition has occurred 13.You are working on your companys IPTables Firewall; you wish to create a rule to address traffic using ports 1024 through 2048. Which of the following would you use during the creation of your rule? A. p:1024 P:2048 B. P:1024 p2048 C. p=1024-2048 D. 1024-2048 E. 1024:2048 Answer: E 14.You are monitoring the network traffic on your Frame-Relay Internet connection. You notice a large amount of unauthorized traffic on port 21. You examine the packets, and notice there are no files being transferred. Traffic on what other port must be examined to view any file contents? A. 20 B. 119 C. 23 D. 80 E. 2021 15.You are introducing a co-worker to the security systems in place in your organization. During the discussion you begin talking about the network, and how it is implemented. You mention something in RFC 791, and are asked what that is. What does RFC 791 specify the standards for? A. IP B. TCP C. UDP D. ICMP E. Ethernet 16.You have been given the task of building the new wireless networks for your office, and you need to verify that your equipment will not interfere with other wireless equipment frequencies. What wireless standard allows for up to 11 Mbps transmission rates and operates in the 2.4GHz range? 5 / 10 Get Latest & Valid SCNS Exam's Question and Answers from Pass4test.com. 5

A. 802.11b B. 802.11e C. 802.11a D. 802.11i E. 802.11g 17.When performing wireless network traffic analysis, what is the type and subtype for an 802.11 authentication packet? A. Type AA Subtype AAAA B. Type 00 Subtype 1011 C. Type 0A Subtype 0A0A D. Type 11 Subtype 0000 E. Type A0 Subtype A1A0 18.You are configuring your new IDS machine, where you have recently installed Snort. While you are working with this machine, you wish to create some basic rules to test the ability to log traffic as you desire. Which of the following Snort rules will log any tcp traffic from any host other than 172.16.40.50 using any port, to any host in the 10.0.10.0/24 network using any port? A. log udp! 172.16.40.50/32 any -> 10.0.10.0/24 any B. log tcp! 172.16.40.50/32 any -> 10.0.10.0/24 any C. log udp! 172.16.40.50/32 any <> 10.0.10.0/24 any D. log tcp! 172.16.40.50/32 any <> 10.0.10.0/24 any E. log tcp! 172.16.40.50/32 any <- 10.0.10.0/24 any 19.You are configuring a new IDS, running Snort, in your network. To better configure Snort, you are studying the configuration file. Which four of the following are the primary parts of the Snort configuration file? A. Postprocessors B. Variables C. Preprocessors D. Output Plug-ins E. Rulesets,C,D,E 20.If you wish to create a new rule in ISA Server 2006 so that all file attachments with an.exe extension that come through the firewall are dropped, what would you select in the Toolbox to create this rule? A. Content Type B. User Group C. Destination Set D. Protocol Set E. Extension Type 6 / 10 Get Latest & Valid SCNS Exam's Question and Answers from Pass4test.com. 6

21.Your network traffic has increased substantially over the last year, and you are looking into your caching options for frequently visited websites. What are the two types of caching that ISA Server 2006 supports? A. Reverse caching B. Forward caching C. Inverse caching D. Recursive caching E. Real-time caching,b 22.You are considering your options for a new firewall deployment. At which three layers of the OSI model does a stateful packet filtering firewall operate? A. Presentation B. Data Link C. Network D. Application E. Transport,C,E 23.As you increase the layers of security in your organization, you must watch the network behaviorclosely. How can a firewall have a negative impact on the performance of your network? A. It can authorize sensitive information from the wrong host B. It can block needed traffic C. It can decrypt secure communications that were supposed to get past the firewall encrypted D. It can restrict bandwidth based on QoS E. It can filter packets that contain virus signatures 24.You are configuring a Cisco Router, and are creating Access Control Lists as part of the security of the network. When creating Wildcard Masks, which of the following rules apply? A. If the wildcard mask bit is a 1, then do not check the corresponding bit of the IP address for a match. B. If the wildcard mask bit is a 0, then do not check the corresponding bit of the IP address for a match. C. If the wildcard mask bit is a 1, then do check the corresponding bit of the IP address for a match. D. If the wildcard mask bit is a 0, then do check the corresponding bit of the IP address for a match. E. To create a Wildcard Mask, always take the inverse of the Subnet Mask.,D 25.The CEO of your company has just issued a statement that the network must be more secure right away. You have discussed several options with the Chief Security Officer and the Chief Technology Officer. The results of your discussion are to implement IPSec. What are the two prime functions of IPSec that you can let the CEO know will be addressed with the implementation? 7 / 10 Get Latest & Valid SCNS Exam's Question and Answers from Pass4test.com. 7

A. Ensure data corruptibility B. Ensure data integrity C. Ensure data availability D. Ensure data security E. Ensure data deliverability,d 26.As per the specifications of RFC 1191: Path MTU Discovery, MTUs have been defined so that transmitted datagram will not unnecessarily become fragmented when traveling across different types of physical media. You are going to run several packet captures to be sure there are no out of spec packets on your network. According to these specifications what are the absolute minimum and maximum MTUs? A. 1492 Bytes and 1500 Bytes respectively B. 68 Bytes and 65535 Bytes respectively C. 512 Bytes and 1500 Bytes respectively D. 512 bits and 1500 bits respectively E. 512 bits per second and 1500 bits per second respectively 27.What step in the process of Intrusion Detection as shown in the exhibit would determine if given alerts were part of a bigger intrusion, or would help discover infrequent attacks? A. 5 B. 9 C. 12 D. 10 8 / 10 Get Latest & Valid SCNS Exam's Question and Answers from Pass4test.com. 8

E. 4 Answer: C 28.In the image, there are two nodes communicating directly, without an access point. In the packet on the right side of the image, the Address 1 field is blank. If this packet is going to the other computer, what is the value that must be filled in this blank address field? A. 2345 B. 1234 C. ABCD D. <null> E. ABCD-1234 29.During a training presentation, that you are delivering, you are asked how wireless networks function, compared to the OSI Model. What two layers of the OSI Model are addressed by the 802.11 standards? A. Physical B. Data Link C. Network D. Transport E. Session,B 30.You have configured Snort to run on your SuSe Linux machine, and you are currently making the configuration changes to your MySQL database. What is the result of running the following command at the mysql prompt? source /usr/share/doc/packages/snort/schemas/create_mysql; A. This command tells MySQL to connect to the /usr directory when source files are required for Snort rules. B. This command tells MySQL that the source files for Snort are located in the /usr directory. C. This command tells MySQL where to place the Snort capture files in the database. D. This command tells MySQL to populate the database using the fields provided by Snort. E. This command tells MySQL where to find the source data for connecting to Snort. 9 / 10 Get Latest & Valid SCNS Exam's Question and Answers from Pass4test.com. 9

Answer: D 10 / 10 Get Latest & Valid SCNS Exam's Question and Answers from Pass4test.com. 10