Limited Time Discount Offer 30% Off - Ends in 02:00:00

×

Exin SCNP Exam - SCNP Strategic Infrastructure Security

Questions & Answers for Exin SCNP

Showing 1-15 of 233 Questions

Question #1 - Topic 1

Recently, you have seen an increase in intrusion attempts and in network traffic. You
decide to use Snort to run a packet capture and analyze the traffic that is present. Looking
at the example, what type of traffic did Snort capture in this log file?

A. Nmap SYN/FIN Scan

B. Nmap NULL Scan

C. Nmap ACK Scan

D. Nmap SYN Scan

E. Nmap XMAS Scan

Question #2 - Topic 1

Recently, you have seen an increase in intrusion attempts and in network traffic. You
decide to use
Snort to run a packet capture and analyze the traffic that is present. Looking at the
example, what type of traffic did Snort capture in this log file?

A. Windows 2000 Ping Request

B. Windows NT 4.0 Ping Request

C. Linux Ping Request

D. Linux Ping Response

E. Windows NT 4.0 Ping Response

Question #3 - Topic 1

You are forming the security policy for your organization. You have identified those in the
organization who will participate in the creation of the policy. Several of the people you
have contacted wish to know what will be on the agenda during the first meeting. During
the very first policy design meeting, which of the following issues will you tell those in the
policy committee to discuss?

A. Identification of the critical business resources

B. Identification of the infrastructure architecture

C. Determination of the type of policy to create

D. Identification of the critical business policies

E. Determination of the critical policies of key connected business partners

Question #4 - Topic 1

You are studying the current attack methods and find that one of your servers is vulnerable
to a Buffer
Overflow attack. Which of the following do Buffer Overflows exploit?

A. Ramdrives

B. A program that does not do bounds checking

C. Memory leaks in the hardware

D. A program allowing itself to be copied

E. Paging of memory to a disk

Question #5 - Topic 1

What type of cipher is used by an algorithm that encrypts data one bit at a time?

A. 64-bit encryption Cipher

B. Block Cipher

C. Stream Cipher

D. Diffuse Cipher

E. Split Cipher

Question #6 - Topic 1

Which of the following is the name of the Active X authentication system Microsoft has
included to prevent Active X controls from being altered or corrupted by attackers wanting
to perform unwarranted operations?

A. Driver Signing

B. Authenticode

C. Certificate services

D. NTLM

E. Kerberos

Question #7 - Topic 1

In your network, you have built a single domain of only Windows computers. There are 55
XP machines and 10 Windows Server 2003 machines. You are concerned about the
security of your SAM files on the Servers. Windows Server 2003 is the only Operating
System on the computers, and the hard drives are all formatted with NTFS. Which of the
following are issues you must be sure to address when securing the
SAM file?

A. You must be sure that no user while locally logged in to the Server can delete the SAM file.

B. You must be sure that no user while logged in to the Server remotely can delete the SAM file.

C. You must be sure that no user can boot to DOS and delete the SAM file from there.

D. You must be sure that no user can install a parallel Operating System and delete the SAM file from there.

E. You must be sure to encrypt the Operating System files using the built-in EFS, so that no user may delete the SAM file from anywhere.

Question #8 - Topic 1

Recently, you have seen an increase in intrusion attempts and in network traffic. You
decide to use Snort to run a packet capture and analyze the traffic that is present. Looking
at the example, what type of traffic did Snort capture in this log file?

A. Port Scan

B. Trojan Scan

C. Back Orifice Scan

D. NetBus Scan

E. Ping Sweep

Question #9 - Topic 1

You are creating the Remote Access section of your organizational security policy. From
the following options, select the questions to use for the formation of this section?

A. What methods of remote access are allowed (cable modem, DSL, and so on)?

B. How are partner VPNs to be configured (to firewall or host)?

C. Which users are authorized to install networking devices into computers?

D. What is the process for becoming authorized for remote access?

E. Is the entire network accessible remotely?

Question #10 - Topic 1

In the process of public key cryptography, which of the following is true?

A. Only the public key is used to encrypt and decrypt

B. Only the private key can encrypt and only the public key can decrypt

C. Only the public key can encrypt and only the private key can decrypt

D. The private key is used to encrypt and decrypt

E. If the public key encrypts, then only the private key can decrypt

Question #11 - Topic 1

In order to run some tests on your system, you have decided to use the netcat utility. You
want to be able to access the command prompt on a Windows system from your Linux
system. What is the proper command on the Windows system to allow for you to gain
remote access?

A. netcat -p 2020 -l cmd.exe

B. netcat -p 2020 -cmd.exe

C. nc -l -p 2020 -e cmd.exe

D. nc -p 2020 -l run/cmd.exe

E. netcat -p 2020 -l -run cmd.exe

Question #12 - Topic 1

During the review of the security logs you notice some unusual traffic. It seems that a user
has connected to your Web site ten times in the last week, and each time has visited every
single page on the site. You are concerned this may be leading up to some sort of attack.
What is this user most likely getting ready to do?

A. Mirror the entire web site.

B. Download entire DNS entries.

C. Scan all ports on a web server.

D. Perform a Distributed Denial of Service attack through the Web server.

E. Allow users to log on to the Internet without an ISP.

Question #13 - Topic 1

In the past it was, at times, difficult to locate current information on security vulnerabilities.
What is the name of the security communitys effort to create a comprehensive database of
multiple vulnerabilities and security tools?

A. Common Vulnerabilities and Exploits

B. Cataloged Venerations and Exposures

C. Common Vulnerabilities and Exposures

D. Cataloged Vulnerabilities and Exposures

E. Cataloged Vulnerabilities and Exploits

Question #14 - Topic 1

Recently, you have seen an increase in intrusion attempts and in network traffic. You
decide to use Snort to run a packet capture and analyze the traffic that is present. Looking
at the example, what type of traffic did Snort capture in this log file?

A. Nmap XMAS Scan

B. Nmap NULL Scan

C. Nmap SYN Scan

D. Nmap ACK Scan

E. Nmap SYN/FIN Scan

Question #15 - Topic 1

What type of an attack would someone be using if they sent a packet to their target with
identical source and destination IP address and port (which is the address of the target
machine) which can cause a system to go into an infinite loop trying to complete a
connection?

A. SYN loop

B. WinNuke

C. SYN flood

D. Ping of death

E. Land attack

You Need Avanset VCE Player in Order to Open VCE Files

AUTUMN SALE: 30% DISCOUNT
This is ONE TIME OFFER

You save
30%

Enter Your Email Address to Receive Your 30% Discount Code

AUTUMN SALE: 30% DISCOUNT

You save
30%

Use Discount Code:

A confirmation link was sent to your e-mail.

Please check your mailbox for a message from support@exam-labs.com and follow the directions.