Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

SCNS Questions and Answers

Note! Following SCNS Exam is Retired now. Please select the alternative replacement for your Exam Certification.

SCNS Questions and Answers

Question # 6

In your network, at the last meeting, it was decided to modify the current client access to allow for VPNs.

Which of the following authentication protocols are used in VPNs?

A.

PAP

B.

CHAP

C.

SPAP

D.

MD7

E.

EAP-TLS

Full Access
Question # 7

You need to install a new antenna for the wireless network available on your companys property. Which antenna type is best for extending the local range of an Access Point?

A.

Yagi

B.

Omni-directional

C.

Di-polar

D.

Parabolic

E.

Mono-polar

Full Access
Question # 8

During a training presentation, that you are delivering, you are asked how wireless networks function, compared to the OSI Model. What two layers of the OSI Model are addressed by the 802.11 standards?

A.

Physical

B.

Data Link

C.

Network

D.

Transport

E.

Session

Full Access
Question # 9

You are concerned that your Access Point security could be improved. What does an Access Point use to announce its SSID to the network?

A.

Burst Packets

B.

802.11g Frames

C.

Broadcast Packets

D.

Beacon Frames

E.

MACv4 Broadcast Frames

Full Access
Question # 10

You have used a diagnostic utility to run a trace between two nodes on your network. During the trace, you are running a packet capture utility and notice the TTL is reaching zero on the trace. What will the router that identified the TTL as zero return to the host that originated the trace command?

A.

An ICMP Source Route Invalid (SRI) message

B.

An ICMP Destination Route Invalid (DRI) message

C.

An ICMP Resend packet message

D.

An IP Source Route Invalid (SRI) message

E.

An ICMP Time Exceeded message.

Full Access
Question # 11

During a network capture in Network Monitor, you capture some UDP traffic. In a UDP Header, what is the function of the first sixteen bits?

A.

To define the upper layer protocol

B.

To define the source port number

C.

To define the destination port number

D.

To define the IP Version

E.

To define the type

Full Access
Question # 12

You are configuring the IP addressing for your network. One of the subnets has been defined with addresses already. You run ifconfig on a host and determine that it has an address of 172.18.32.54 with a mask of 255.255.254.0. What is the network ID to which this host belongs?

A.

172.18.0.0

B.

0.0.32.0

C.

172.0.0.0

D.

172.18.32.32

E.

172.18.32.0

Full Access
Question # 13

You wish to configure a new Cisco router, which will take advantage of the AutoSecure feature. The AutoSecure security features are divided into which two planes?

A.

Critical Plane

B.

Management Plane

C.

Recursive Plane

D.

Non-Critical Plane

E.

Forwarding Plane

F.

Responsive Plane

Full Access
Question # 14

Your company has created it's security policy and it's time to get the firewall in place. Your group is trying to decide whether to build a firewall or buy one. What are some of the downsides to deciding to build a firewall rather than purchase one?

A.

Weak (or no) management GUI.

B.

Weak (or no) logging and alerting.

C.

Weak rule configuration.

D.

The OS cannot be hardened before implementing the firewall on it.

E.

Weak (or no) real time monitoring.

Full Access
Question # 15

A router has two active Ethernet interfaces. Interface E0 is connected to network 10.10.0.0/16 while

Interface E1 is connected to network 10.11.0.0/16. You are configuring access control lists to manage specific access, which is disallowed on these segments. The configuration of the lists are as follows:

router(config)#access-list 123 deny tcp 10.11.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq 20

router(config)#access-list 123 deny tcp 10.11.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq 21

router(config)#access-list 123 deny tcp 10.10.0.0 0.0.255.255 10.11.0.0 0.0.255.255 eq 20

router(config)#access-list 123 deny tcp 10.10.0.0 0.0.255.255 10.11.0.0 0.0.255.255 eq 21

router(config)#access-list 123 permit tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255

router(config)#Interface Ethernet 0

router(config-if)#ip access-group 123 in

router(config-if)#Interface Ethernet 1

router(config-if)#ip access-group 123 in

Based on the above list configuration, which of the following statements is true on the router?

A.

All packets will be dropped

B.

All packets that match the deny statements will be forwarded to the console port

C.

All packets that do not match the deny statements will be allowed

D.

An Access List cannot simultaneously be implemented upon two or more interfaces

E.

We do not know if this is a standard or extended access list, therefore there is not enough information.

Full Access
Question # 16

You are configuring your new Intrusion Detection System, and studying the true-false matrix. You read about the different types of alarms and events. Which of the following defines an event where an alarm is indicating an intrusion when there is an actual intrusion?

A.

True-negative

B.

False-positive

C.

True-positive

D.

False-negative

E.

Absolute-positive

Full Access
Question # 17

You are installing a new firewall and your CEO asks what the benefits will be to the organization. Which of the following are benefits to implementing a firewall?

A.

Increased bandwidth

B.

End node virus control

C.

Central network traffic auditing

D.

Increased ability to enforce policies

E.

Efficient IP Address allocation

Full Access
Question # 18

As you increase the layers of security in your organization you watch the network behavior closely. What kind of problems can be introduced by adding file encryption to the computers in your network?

A.

Network traffic will increase, due to larger packet size

B.

Routers processors will have more work to perform

C.

Routers will require reconfiguring to address encrypted packets

D.

Intrusion Detection system will generate more false-positives

E.

Computers processors will have more work to perform

Full Access
Question # 19

You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.

Router(config)#access-list 55 deny 10.10.12.0 0.0.0.255

Router(config)#access-list 55 permit 0.0.0.0 255.255.255.255

Router(config)#interface E1

Router(config-if)#ip access-group 55 out

Router(config-if)#interface S0

Router(config-if)#ip access-group 55 out

Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.

A.

Permit network 10.10.12.0 access to network 10.10.11.0

B.

Permit network 10.10.12.0 access to network 10.10.10.0

C.

Permit network 10.10.12.0 access to the Internet

D.

Permit network 10.10.10.0 access to the Internet

E.

Permit network 10.10.11.0 access to the Internet

Full Access
Question # 20

You are introducing a co-worker to the security systems in place in your organization. Early in the discussion you begin talking about the network, and how it is implemented. You decide to run a packet capture to identify different aspects of network traffic for your co-worker. In the packet capture you are able to identify Protocol IDs. Which of the following is the IP Protocol ID for UDP?

A.

Protocol ID 51

B.

Protocol ID 21

C.

Protocol ID 6

D.

Protocol ID 17

E.

Protocol ID 11

Full Access
Question # 21

What tool used in wireless network analysis has the ability to output its findings to MapPoint?

A.

Netstumbler

B.

AirSnort

C.

Wireshark

D.

Network Monitor

E.

AirSniffer

Full Access
Question # 22

You are configuring your new IDS machine, and are creating new rules. You enter the following rule:

Alert tcp any any -> 10.0.10.0/24 any (msg: "SYN-FIN scan detected"; flags: SF;)

What is the effect of this rule?

A.

This is an alert rule, designed to notify you of SYN-FIN scans of the network in one direction.

B.

This is an alert rule, designed to notify you of SYN-FIN scans of the network in either direction.

C.

This is a logging rule, designed to capture SYN-FIN scans.

D.

This is a logging rule, designed to notify you of SYN-FIN scans.

E.

This is an alert rule, designed to notify you of SYN-FIN scans originating from the 10.0.10.0/24 network.

Full Access
Question # 23

The main reason you have been hired at a company is to bring the network security of the organization up to current standards. A high priority is to have a full security audit of the network as soon as possible. You have chosen an Operational Audit and are describing it to your coworkers. Which of the following best describes an Operational audit?

A.

This type of audit is typically done by a contracted external team of security experts who check for policy compliance.

B.

This type of audit is usually done by internal resources to examine the current daily and on-going activities within a network system for compliance with an established security policy.

C.

This type of audit is typically done by an internal team who ensures the security measures are up to international standards.

D.

This type of audit is usually done by the current network administrators who ensure the security measures are up to international standards.

E.

This type of audit is usually conducted by external resources and may be a review or audit of detailed audit logs.

Full Access
Question # 24

You are configuring the rules on your firewall, and need to take into consideration that some clients in the

network are using automatic addressing. What is the IP address range reserved for internal use for APIPA in Microsoft networks?

A.

169.254.0.0 /4

B.

169.254.0.0 /16

C.

169.254.0.0 /8

D.

169.254.0.0 /0

E.

168.255.0.0 /16

Full Access
Question # 25

During a network packet capture in Wireshark, you capture ICMP traffic, and are analyzing this capture.

In an ICMP Message, what is the function of the first eight bits?

A.

To define the source port number

B.

To define the type

C.

To define the destination port number

D.

To define the IP Version

E.

To define the upper layer protocol

Full Access
Question # 26

As you analyze the settings of the Secure Server (Require Security) IPSec policy in Windows Server

2003, you are looking at the options available for encryption and integrity. Which of the following answers presents a legitimate combination for encryption and integrity in the IPSec policy?

A.

Encryption: SHA1, Integrity: 3DES

B.

Encryption: 3DES, Integrity: SHA1

C.

Encryption: RSA, Integrity: MD5

D.

Encryption: MD5, Integrity: RSA

E.

Encryption: SHA1, Integrity: MD5

Full Access
Question # 27

You have recently been contracted to implement a new firewall solution at a client site. What are the two basic forms of firewall implementations?

A.

Chaining

B.

Stateful

C.

DMZ

D.

Stateless

E.

KMZ

Full Access
Question # 28

After a meeting between the IT department leaders and a security consultant, they decide to implement

a new IDS in your network. You are later asked to explain to your team the type of IDS that is going to be implemented. Which of the following best describes the process of Host-Based Intrusion Detection Systems?

A.

In a Host-Based IDS sensors are installed in key positions throughout the network, and they all report to the command console. The sensors in this case, are full detection engines that have the ability to sniff network packets, analyze for known signatures, and notify the console with an alert if an intrusion is detected.

B.

Host-Based IDS uses what are known as agents (also called sensors). These agents are in fact small programs running on the hosts that are programmed to detect intrusions upon the host. They communicate with the command console, or a central computer controlling the IDS.

C.

In Host-Based IDS, the agents on the hosts are the ones that perform the analysis of the network traffic.

The intrusion data can be monitored in real-time.

D.

In a Host-Based IDS sensors (also called agents) are placed on each key host throughout the network analyzing the network packets for intrusion indicators. Once an incident is identified the sensor notifies the command console.

E.

In Host-Based IDS, the network traffic data is gathered and sent from the host to a centralized location.

There is no significant performance drop on the hosts because the agents simply gather information and send them elsewhere for analysis. However, due to the nature of the design, there is no possibility of real-time detection and response.

Full Access
Question # 29

You have been given the task of installing a new firewall system for your network. You are analyzing the different implementation options. Which of the following best describes a Multi-homed Device?

A.

This is when one device is configured to run as a packet filter, granting or denying access based on the content of the headers.

B.

This is when a packet is received on one interface and sent out another interface.

C.

This is when a device has been configured with more than one network interface, and is running proxy software to forward packets back and forth between the interfaces.

D.

This is when the device reads only the session layer and higher headers to grant or deny access to the packet.

E.

This is when the network is protected by multiple functions.

Full Access
Question # 30

If you are physically examining the office where your WLAN is configured, what are you performing?

A.

Protocol Analysis

B.

Packet Analysis

C.

Cryptographic Analysis

D.

Site Survey

E.

Logical Survey

Full Access
Question # 31

Your company has recently become security conscious and wishes to protect it's electronic assets.

What is the first thing you should have in place before configuring rules for your company's firewall?

A.

A Security Policy

B.

AN IDS

C.

A DNS server

D.

An Email server

E.

A WINS server

Full Access
Question # 32

In your company it has been decide to create a custom firewall using IPTables. You have been given the task of configuration and implementation. What is the first step you should take?

A.

Set the three default policies (Input, Output, and Forward) to DENY.

B.

Set the Output policy to DENY

C.

Set the Input policy to DENY

D.

Set the Forward policy to DENY

E.

Set the Masquerade policy to DENY

Full Access
Question # 33

If you wanted to configure your new system to use the process of detecting unauthorized activity that matches known patterns of misuse, this system would be an example of which of the following?

A.

Intrusion

B.

Misuse

C.

Intrusion detection

D.

Misuse detection

E.

Anomaly detection

Full Access
Question # 34

You have been working with Snort, on your Windows Server 2003, for some time as a packet capture tool, and now wish to connect Snort to a database on your server. You install MySQL as the database, and are ready to configure Snort. If the database is named: snortdb1, has a user name of: snort, and a password of: snortpass, what is the configuration line you need to add to Snort?

A.

output database: log, mysql, username:snort, password:snortpass, dbname:snortdb1, host:localhost

B.

output database: log: mysql: user=snort: password=snortpass: dbname=snortdb1: host=localhost

C.

output database: log; mysql; username:snort; password:snortpass; dbname:snortdb1; host:localhost

D.

output database log mysql user=snort password=snortpass dbname=snortdb1 host=localhost

E.

output database: log, mysql, user=snort password=snortpass dbname=snortdb1 host=localhost

Full Access