Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Exin SCNP SCNP Strategic Infrastructure Security Exam Practice Test

Demo: 34 questions
Total 233 questions

SCNP Strategic Infrastructure Security Questions and Answers

Question 1

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Trojan Horse Scan

B.

Back Orifice Scan

C.

NetBus Scan

D.

Port Scan

E.

Ping Sweep

Question 2

If you wanted to use Public Key cryptography to encrypt data transmissions, which of the following ciphers could you use?

Options:

A.

Triple-DES

B.

DES

C.

Blowfish

D.

IDEA

E.

RSA

Question 3

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Nmap SYN/FIN Scan

B.

Nmap ACK Scan

C.

Nmap NULL Scan

D.

Nmap XMAS Scan

E.

Nmap SYN Scan

Question 4

What type of cryptographic system is represented in this image?

Options:

A.

Caesar

B.

Vingre

C.

Polybius

D.

Purple

E.

Enigma

Question 5

In Windows 2003, there are four methods of implementing IPSec. They are:

1 - Require Security

2 - Request Security

3 - Respond Only

4 - No IPSec Policy

Your network hosts many servers, and different security policies are in place in different locations in the network. The Clients and Servers in your network are configured as follows:

-You have servers numbered 1-9, which have a policy stating they require no network traffic security.

-You have servers numbered 10-19, which have a policy stating they are not required to be secure, but will encrypt network traffic if the client is able to receive it.

-You have servers numbered 20-29, which have a policy stating they are required to be secure and all network traffic they deliver must be secured.

-You have clients numbered 60-79 that are required to access secure servers 20-29.

-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are required to access servers 1-9 and 10-19.

Based on the Client and Server configuration provided above, which of the following computers must implement IPSec method 3?

Options:

A.

Computers numbered 1-9

B.

Computers numbered 10-19

C.

Computers numbered 20-29

D.

Computers numbered 60-79

E.

Computers numbered 80-90

Question 6

You are setting the permissions on a new file in Linux. What will be the level of permission given to the user if you assign an Octal value of 6?

Options:

A.

rwx

B.

rw-

C.

r--

D.

r-x

E.

---

Question 7

When a cryptanalyst is using linguistic patterns to decrypt ciphertext, what is the analyst doing?

Options:

A.

Analyzing the frequency of letters

B.

Analyzing the degree of the letters

C.

Analyzing the Caesar Shift

D.

Analyzing the Transposition Cipher

E.

Analyzing the Substitution Cipher

Question 8

You wish to add a new user to your Linux system. The user account is called Lnx_1,the password is QW3RTY, and the group is Users. What is the correct command to add this user account?

Options:

A.

useradd -g Users Lnx_1

B.

useradd Lnx_1 +grp Users

C.

useradd Lnx_1 +g Users

D.

adduser g/Users u/Lnx_1

E.

adduser g/Users -act Lnx_1

Question 9

What type of cryptographic system is represented in this image?

Options:

A.

Caesar

B.

Vingre

C.

Polybius

D.

Purple

E.

Enigma

Question 10

You wish to install a new Windows 2003 Server in your network, and are deciding which of the server roles will best suit your environment. From the following answers, select the option that is not a Windows 2003 Server Role.

Options:

A.

SQL Server

B.

DNS Server

C.

DHCP Server

D.

Print Server

E.

SharePoint Services Server

Question 11

Which one of the following is an incorrect mod equation?

Options:

A.

9 mod 3 = 0

B.

40 mod 10 = 0

C.

40 mod 9 = 4

D.

(6-1) mod 3 = 0

E.

(2+4) mod 5 = 1

Question 12

When using the 3DES encryption ( C = EK1[DK2[EK1[P]]] ) , what is the function of D?

Options:

A.

D is the text before encryption

B.

D is the first encryption key

C.

D is the second encryption key

D.

D is the decryption key

E.

D is the text after encryption

Question 13

You are running a Linux Server for your organization. You realize after a security scan that the Telnet service is accepting connections, which you do not want. In order to disable the computers ability to accept incoming Telnet sessions, the easiest method for you to choose is which of the following?

Options:

A.

Remove the Telnet service from the server

B.

Comment out the Telnet line in inetd.conf

C.

Stop the Telnet service on the server

D.

Pause the Telnet service on the server

E.

Configure the firewall to block Telnet requests

Question 14

After installing a new application on your SuSe Linux server, you need to read through the log files.

When you open the files, you notice they are very long, and you only wish to check the newest entries to the file. What command do you use to perform this action?

Options:

A.

currentlog

B.

newest

C.

/var/last

D.

lastlog

E.

trail

Question 15

On your Linux computer you are examining the contents of various files to ensure they are secured and contain the designated information. Entries in the /etc/hosts file consist of which of the following?

Options:

A.

The IP address, the host-name and aliases (if any)

B.

The IP address, subnet mask, the host-name (if any)

C.

The IP address, subnet mask, the host-name and aliases (if any)

D.

The IP address, subnet mask, default gateway and the host-name

E.

The IP address, subnet mask, default gateway, the host-name and aliases (if any)

Question 16

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Nmap SYN/FIN Scan

B.

Nmap NULL Scan

C.

Nmap ACK Scan

D.

Nmap SYN Scan

E.

Nmap XMAS Scan

Question 17

In Windows Server 2003, there are four methods of implementing IPSec. They are:

1 - Require Security

2 - Request Security

3 - Respond Only

4 - No IPSec Policy

Your network hosts many servers, and different security policies are in place in different locations in the network. The Clients and Servers in your network are configured as follows:

-You have servers numbered 1-9, which have a policy stating they require no network traffic security.

-You have servers numbered 10-19, which have a policy stating they are not required to be secure, but will encrypt network traffic if the client is able to receive it.

-You have servers numbered 20-29, which have a policy stating they are required to be secure and all network traffic they deliver must be secured.

-You have clients numbered 60-79 that are required to access secure servers 20-29.

-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are required to access servers 1-9 and 10-19.

Based on the Client and Server configuration provided above, which of the following computers will implement IPSec method 4?

Options:

A.

Computers numbered 1-9

B.

Computers numbered 10-19

C.

Computers numbered 20-29

D.

Computers numbered 60-79

E.

Computers numbered 80-99

Question 18

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

NetBus Scan

B.

Trojan Scan

C.

Ping Sweep

D.

Port Scan

E.

Ping Sweep

Question 19

One of your users calls to state that their computer is acting unusual. You go to investigate and find there is an unauthorized program installed on this computer. You examine the network and find that this program is now on other machines in the network. It seems to be unable to move through the network on its own, and is getting sent as an email attachment. What type of program is in the network?

Options:

A.

The program is a Worm.

B.

The program is a Virus.

C.

The program is a Port scanner.

D.

The program is a Trojan Horse.

E.

The program is a Macro.

Question 20

You are forming the security policy for your organization. You have identified those in the organization who will participate in the creation of the policy. Several of the people you have contacted wish to know what will be on the agenda during the first meeting. During the very first policy design meeting, which of the following issues will you tell those in the policy committee to discuss?

Options:

A.

Identification of the critical business resources

B.

Identification of the infrastructure architecture

C.

Determination of the type of policy to create

D.

Identification of the critical business policies

E.

Determination of the critical policies of key connected business partners

Question 21

To increase the security of your corporate website, you are running some basic checks on leaked information. You view the source code for a web page and see the following:

Security Certifications for the IT Pro

From this code, which of the following would an attacker most likely assume is the operating system that was used to create this web site?

Options:

A.

OpenBSD

B.

FreeBSD

C.

Linux 5.0

D.

Linux 6.0

E.

Windows NT

Question 22

You have been hired to work in the security division of a global Tier One ISP. You have been given a staff of 25 people all new to network security. You wish to bring them all up to speed on the components of the Internet and how they interact. Which one of the following is not a major component of the Internet?

Options:

A.

The Backbone

B.

NAPs (Network Access Points)

C.

ISPs (Internet Service Providers)

D.

NICs (Network Information Centers)

E.

DNS (Domain Name Service)

Question 23

Which of the following is the name of the Active X authentication system Microsoft has included to prevent Active X controls from being altered or corrupted by attackers wanting to perform unwarranted operations?

Options:

A.

Driver Signing

B.

Authenticode

C.

Certificate services

D.

NTLM

E.

Kerberos

Question 24

If an attacker uses a program that sends thousands of email messages to every user of the network, some of them with over 50MB attachments. What are the possible consequences to the email server in the network?

Options:

A.

Server hard disk can fill to capacity

B.

Client hard disks can fill to capacity

C.

Server can completely crash

D.

Network bandwidth can be used up

E.

Clients cannot receive new email messages

Question 25

You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS 6.0.

You are concerned about the overall security of your servers, and are checking with Microsoft for any patches or updates that you might need to apply to your systems. Which of the following would you apply if you need to implement an update based on a critical Microsoft Security Bulletin?

Options:

A.

Critical Update

B.

Security Update

C.

Feature Pack

D.

Update Rollup

E.

MSB Update

Question 26

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Windows 2000 Ping Request

B.

Windows NT 4.0 Ping Request

C.

Linux Ping Request

D.

Linux Ping Response

E.

Windows NT 4.0 Ping Response

Question 27

To increase the security of your network and systems, it has been decided that EFS will be implemented in the appropriate situations. Two users are working on a common file, and often email this file back and forth between each other. Is this a situation where the use of EFS will create effective security, and why (or why not)?

Options:

A.

No, the security will remain the same since both users will share the same key for encryption.

B.

Yes, since the file will be using two keys for encryption the security will increase.

C.

No, the security will remain the same since both users will share the same key for decryption.

D.

Yes, since the file will be using two keys for decryption the security will increase.

E.

No, EFS cannot be used for files that are shared between users.

Question 28

Often times attackers will run scans against the network to identify different network and operating systems, and resources that are available. If an attacker runs scans on the network, and you are logging the connections, which of the following represent the legitimate combination of packets that will be sent between the attacker and target?

Options:

A.

Attacker PSH-FIN Scan, Target RST-FIN Response

B.

Attacker ACK Scan, Target NULL Response

C.

Attacker NULL Scan, Target RST Response

D.

Attacker SYN Scan, Target NULL Response

E.

Attacker FIN Scan, Target RST Response

Question 29

You work for a medium sized ISP and there have been several attacks of the DNS configuration recently.

You are particularly concerned with DNS Spoofing attacks. If an attacker is able to send out false data to a

DNS client before the response from the DNS server arrives, this is which type of DNS Spoofing?

Options:

A.

DNS Server Compromise

B.

DNS Cache Poisoning

C.

Spoofing the DNS Response

D.

DNS Source-Router Spoof

E.

IXFR Source-Spoof

Question 30

You have just recently finished a complete Risk Analysis of your organization. During your presentation you present the controls you feel must be implemented. Which is considered to be the major factor in determining a specific control system to implement?

Options:

A.

Control system documentation

B.

Return on investment

C.

Current system availability

D.

Familiarity with the system

E.

Staffs previous use of system

Question 31

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Nmap SYN/FIN Scan

B.

Nmap ACK Scan

C.

Nmap NULL Scan

D.

Nmap XMAS Scan

E.

Nmap SYN Scan

Question 32

You are discussing the design and infrastructure of the Internet with several colleagues when a disagreement begins over the actual function of the Tier System in the Internets design. What is the function of the Tier System in the physical structure of the Internet?

Options:

A.

The Tier System provides the physical network with communication channels for the Internet and voice/data applications.

B.

The Tier System provides a national interconnection of systems, called peering centers, to the NAPs.

C.

The Tier System provides for a layered/hierarchical connection system of ISPs connecting to the backbone.

D.

The Tier System provides for a connection point between an ISP and the backbone of the Internet.

E.

The Tier System provides the actual connection point between a local user and the Internet.

Question 33

Recently at your organization you have been requested to lead the team in performing a new Risk Analysis of the organization. During the first team meeting you identify to your team the three areas of Risk Analysis. What are those three areas?

Options:

A.

Verifying Risk, Minimizing Risk, Removing Risk

B.

Qualifying Risk, Mitigating Risk, Removing Risk

C.

Predicating Risk, Qualifying Risk, Minimizing Risk

D.

Predicting Risk, Quantifying Risk, Mitigating Risk

E.

Quantifying Risk, Mitigating Risk, Removing Risk

Question 34

Which two of the following are factors that must be considered in determining the likelihood of occurrence during a risk analysis review?

Options:

A.

What are the methods available to attack this asset?

B.

What are the costs associated with protecting this asset?

C.

Does the threat have sufficient capability to exercise the attack?

D.

Does the threat have the motivation or incentive to exercise the attack?

E.

Are any of the assets worthy of an attack?

Demo: 34 questions
Total 233 questions