Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

SCNP Questions and Answers

Note! Following SCNP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

SCNP Questions and Answers

Question # 6

DES is often defined as no longer "secure enough" to handle high security requirements. Why is this?

A.

DES is more vulnerable to dictionary attacks than other algorithms

B.

DES is more vulnerable to brute-force attacks than other algorithms

C.

DES uses a 32-bit key length, which can be cracked easily

D.

DES uses a 64-bit key, which can be cracked easily

E.

The DES key can be cracked in a short time

Full Access
Question # 7

You are working on the configuration of the authentication systems used in your network, and are considering several different authentication methods for your computer systems. What do LM, NTLM, and NTLMv2 use as their Authentication method?

A.

Challenge/Response

B.

Public Key Cryptography

C.

Private Key Cryptography

D.

Private Certificates

E.

Public Certificates

Full Access
Question # 8

It has been decided that the network you manage will implement new Windows 2003 Servers, using Active Directory. You are configuring several of the Active Directory objects in your Windows 2003 network.

What is used as the default security for these objects?

A.

Public Keys

B.

EFS

C.

NTFS

D.

ACLs

E.

Private Keys

Full Access
Question # 9

You are showing a colleague some of the commands available in Linux, and you type telinit 6 what is the result of typing this command?

A.

This runs the telnet service with a priority level of 6.

B.

This configures the system to use single-user mode.

C.

This halts the system.

D.

This restarts the system.

E.

This interrupts the telnet service on socket 6.

Full Access
Question # 10

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

A.

Linux Ping Reply

B.

Windows 2000 Ping Reply

C.

Windows NT 4.0 Ping Request

D.

Linux Ping Request

E.

Windows 2000 Ping Request

Full Access
Question # 11

During a test of your SuSe Linux machine, you have noticed a specific process that is no longer working as desired. What is the proper command to restart a process?

A.

kill -restart

B.

kill -HUP

C.

kill -reset

D.

kill -HUP

E.

term-HUP

Full Access
Question # 12

While configuring TCP Wrappers on your Linux system, you desire to create a line that will effect every local computer's access to the ftp service. Which of the following lines will achieve this desired result?

A.

NETWORK(LOCAL): in.ftpd

B.

in.ftpd: LOCAL

C.

in.ftpd: NETWORK

D.

in.ftpd: NETWORK(LOCAL)

E.

LOCAL_NET: in.ftpd

Full Access
Question # 13

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log

A.

NetBus Scan

B.

Trojan Scan

C.

Ping Sweep

D.

Port Scan

E.

Ping Sweep

Full Access
Question # 14

Which of the following is a block cipher?

A.

DES

B.

3DES

C.

AES

D.

RC4

E.

GLOC

Full Access
Question # 15

You have just become the senior security professional in your office. After you have taken a complete inventory of the network and resources, you begin to work on planning for a successful security implementation in the network. You are aware of the many tools provided for securing Windows 2003 machines in your network. What is the function of The Security Configuration and Analysis snap-in?

A.

This tool is used to manage the NTFS security permissions on objects in the domain.

B.

This tool is used to create an initial security database for the domain.

C.

This tool is used to analyze a large number of computers in a domain-based infrastructure.

D.

This tool provides an analysis of the local system security configuration.

E.

This tool provides a single point of management where security options can be applied to a local computer or can be imported to a GPO.

Full Access
Question # 16

You have just finished installing new servers and clients in your office network. All the new client machines are running Windows 2000 Professional, and the servers are running Windows Server 2003. You are now working on securing all user authentication related areas of the systems. Where is user account information stored, both for the Domain and the local machine?

A.

Domain user account information is stored in the Active Directory.

B.

Local user account information is stored in the SAM.

C.

Local user account information is stored in the Active Directory.

D.

Domain user account information is stored in the SAM.

E.

Domain user account information is stored in the Metabase

Full Access
Question # 17

Which of the following fields are found in a user account's line in the /etc/shadow file?

A.

The User Identifier assigned to the user account

B.

The home directory used by the user account

C.

The hashed version of the user account's password

D.

The number of days since the user account password was changed

E.

The number of days until the user account's password must change

Full Access
Question # 18

You wish to add a new group to your Linux system. The group is called SCNP_Admins, and is to be given a Group Identifier of 1024. What is the correct command to add this new group?

A.

addgroup SCNP_Admins -id 1024

B.

groupadd -g 1024 SCNP_Admins

C.

addgroup SCNP_Admins id/1024

D.

groupadd id/1024 g/SCNP_Admins

E.

groupadd g/1024 SCNP_Admins

Full Access
Question # 19

What can be used to remove any of the frequency and statistical relationship between unencrypted and encrypted text? (Choose two)

A.

Exponentialism

B.

Differentialism

C.

Supposition

D.

Confusion

E.

Diffusion

Full Access
Question # 20

After you have configured your new Linux file server, a colleague wishes to check the permission settings on some files. You run the command to view the permissions, and the onscreen result is:

-rwx-rw-rw- 1 ps_admin root 2345 10:23 file1

Which of the following are true based on this output?

A.

The owner has read, write, and execute permissions

B.

The group has read, write, and execute permissions

C.

The others have read, write, and execute permissions

D.

ps_admin is the owner

E.

root is the group

Full Access
Question # 21

You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS 6.0.

You are concerned about the overall security of your servers, and are checking with Microsoft for any patches or updates that you might need to apply to your systems. Which of the following would you apply if you need to implement an update to fix a specific problem that addresses a critical, non-security-related bug?

A.

Critical Update

B.

Security Update

C.

Feature Pack

D.

Update Rollup

E.

MSB Update

Full Access
Question # 22

In the process of public key cryptography, which of the following is true?

A.

Only the public key is used to encrypt and decrypt

B.

Only the private key can encrypt and only the public key can decrypt

C.

Only the public key can encrypt and only the private key can decrypt

D.

The private key is used to encrypt and decrypt

E.

If the public key encrypts, then only the private key can decrypt

Full Access
Question # 23

You have recently started using Nessus to perform vulnerability scans on the systems in your network.

You now wish to perform further testing, to ensure that passwords are the proper length in the network.

What feature of Nessus allows you to perform this type of custom scanning?

A.

Nessus Plugins

B.

Nessus cannot perform this type of scan, it is restricted to vulnerability scanning

C.

Nessus Advanced Scripting

D.

Nessus Password Scanning Module

E.

Nessus Policies

Full Access
Question # 24

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

A.

Linux Ping Response

B.

Linux Ping Request

C.

Windows 2000 Ping Request

D.

Windows 2000 Ping Response

E.

Windows NT 4.0 Ping Request

Full Access
Question # 25

From the following list, chose the primary reason for splitting a Security Policy into multiple smaller policies?

A.

Smaller policies are cheaper to produce

B.

Smaller policies are simpler to manage

C.

Smaller policies are simpler to produce

D.

Smaller policies are more legally binding

E.

Smaller policies provide better security control

Full Access
Question # 26

You are forming the security policy for your organization. You have identified those in the organization who will participate in the creation of the policy. Several of the people you have contacted wish to know what will be on the agenda during the first meeting. During the very first policy design meeting, which of the following issues will you tell those in the policy committee to discuss?

A.

Identification of the critical business resources

B.

Identification of the infrastructure architecture

C.

Determination of the type of policy to create

D.

Identification of the critical business policies

E.

Determination of the critical policies of key connected business partners

Full Access
Question # 27

In your organization, the majority of employees use Microsoft Outlook Express as their email client. You are configuring these systems so that applications on the employee systems cannot send email, posing as the user of the system. Under the Security tab, which option will you select to achieve this goal?

A.

Do not allow other applications to send mail as me.

B.

Disable application mail delivery.

C.

Prompt me prior to application mail delivery.

D.

Warn me when other applications try to send mail as me.

E.

Do not allow applications that could potentially transmit a virus to send mail as me.

Full Access
Question # 28

During a routine security inspection of the clients in your network, you find a program called cgiscan.c on one of the computers. You investigate the file, reading part of the contents. Using the portion of the program shown below, identify the function of the program.

Temp[1] = "GET /cgi-bin/phf HTTP/1.0\n\n";

Temp[2] = "GET /cgi-bin/Count.cgi HTTP/1.0\n\n";

Temp[3] = "GET /cgi-bin/test-cgi HTTP/1.0\n\n";

Temp[4] = "GET /cgi-bin/php.cgi HTTP/1.0\n\n";

Temp[5] = "GET /cgi-bin/handler HTTP/1.0\n\n";

Temp[6] = "GET /cgi-bin/webgais HTTP/1.0\n\n";

Temp[7] = "GET /cgi-bin/websendmail HTTP/1.0\n\n";

A.

The program is designed to launch the users email program.

B.

The program is designed to manage the counters on a target web server.

C.

The program is simply old temp files, and nothing of interest.

D.

The program is designed to test the functionality of the cgi email scripts that are installed on the server.

E.

The program is a vulnerability scanner

Full Access
Question # 29

You work for a medium sized ISP and there have been several attacks of the DNS configuration recently. You are particularly concerned with DNS Spoofing attacks. You have a few older machines that define the storage of Resource Records (RR) based on the TTL of name mapping information. If an attacker sends fake mapping information to the DNS Server, with a high TTL, which type of DNS Spoofing is this?

A.

DNS Server Compromise

B.

DNS Cache Poisoning

C.

Spoofing the DNS Response

D.

DNS Source-Router Spoof

E.

IXFR Source-Spoof

Full Access
Question # 30

You are concerned that email messages sent to your Outlook clients could contain customized and dangerous scripting. What can you do to minimize the threat that this specific type of email presents?

A.

Install and Update Anti-Virus software

B.

Update the Security Settings for the clients at the SMTP Server

C.

Disable the Preview Pane

D.

Be sure that all forms of scripting are disabled on all clients

E.

Minimize the number of contacts allowed in an address book

Full Access
Question # 31

Your organization assigns an Annual Loss Expectancy to assets during a risk analysis meeting. You have a server which if down for a day will lose the company $35,000, and has a serious root access attack against it once per month. What is the ALE for this attack against this server?

A.

$35,000

B.

$120,000

C.

$2,916

D.

$3,500

E.

$420,000

Full Access
Question # 32

You are examining a packet from an unknown host that was trying to ping one of your protected servers and notice that the packets it sent had an IPLen of 20 byes and DgmLen set to 60 bytes. What type of operating system should you believe this packet came from?

A.

Linux

B.

SCO

C.

Windows

D.

Mac OSX

E.

Netware

Full Access
Question # 33

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

A.

Port Scan

B.

Trojan Scan

C.

Back Orifice Scan

D.

NetBus Scan

E.

Ping Sweep

Full Access
Question # 34

During a one week investigation into the security of your network you work on identifying the information that is leaked to the Internet, either directly or indirectly. One thing you decide to evaluate is the information stored in the Whois lookup of your organizational website. Of the following, what pieces of information can be identified via this method?

A.

Registrar

B.

Mailing Address

C.

Contact Name

D.

Record Update

E.

Network Addresses (Private)

Full Access