Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

Note! Following SCNP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

SCNP SCNP Strategic Infrastructure Security Questions and Answers

Questions 4

You wish to install a new Windows 2003 Server in your network, and are deciding which of the server roles will best suit your environment. From the following answers, select the option that is not a Windows 2003 Server Role.

Options:

A.

SQL Server

B.

DNS Server

C.

DHCP Server

D.

Print Server

E.

SharePoint Services Server

Buy Now
Questions 5

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Linux Ping Reply

B.

Windows 2000 Ping Reply

C.

Windows NT 4.0 Ping Request

D.

Linux Ping Request

E.

Windows 2000 Ping Request

Buy Now
Questions 6

When a cryptanalyst is using linguistic patterns to decrypt ciphertext, what is the analyst doing?

Options:

A.

Analyzing the frequency of letters

B.

Analyzing the degree of the letters

C.

Analyzing the Caesar Shift

D.

Analyzing the Transposition Cipher

E.

Analyzing the Substitution Cipher

Buy Now
Questions 7

The image shows an example of what algorithm?

Options:

A.

DES

B.

Triple-DES

C.

Blowfish

D.

DH

E.

IDEA

Buy Now
Questions 8

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Port Scan

B.

Trojan Scan

C.

Back Orifice Scan

D.

NetBus Scan

E.

Ping Sweep

Buy Now
Questions 9

In Windows Server 2003, there are four methods of implementing IPSec. They are:

1 - Require Security

2 - Request Security

3 - Respond Only

4 - No IPSec Policy

Your network hosts many servers, and different security policies are in place in different locations in the network. The Clients and Servers in your network are configured as follows:

-You have servers numbered 1-9, which have a policy stating they require no network traffic security.

-You have servers numbered 10-19, which have a policy stating they are not required to be secure, but will encrypt network traffic if the client is able to receive it.

-You have servers numbered 20-29, which have a policy stating they are required to be secure and all network traffic they deliver must be secured.

-You have clients numbered 60-79 that are required to access secure servers 20-29.

-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are required to access servers 1-9 and 10-19.

Based on the Client and Server configuration provided above, which of the following computers will implement IPSec method 4?

Options:

A.

Computers numbered 1-9

B.

Computers numbered 10-19

C.

Computers numbered 20-29

D.

Computers numbered 60-79

E.

Computers numbered 80-99

Buy Now
Questions 10

You wish to manage your Linux system remotely, using a web browser. Which of the following tools will allow you to accomplish your task?

Options:

A.

Snort

B.

Bastille

C.

Tripwire

D.

Webmin

E.

SSH

Buy Now
Questions 11

During a routine security inspection of the clients in your network, you find a program called cgiscan.c on one of the computers. You investigate the file, reading part of the contents. Using the portion of the program shown below, identify the function of the program.

Temp[1] = "GET /cgi-bin/phf HTTP/1.0\n\n";

Temp[2] = "GET /cgi-bin/Count.cgi HTTP/1.0\n\n";

Temp[3] = "GET /cgi-bin/test-cgi HTTP/1.0\n\n";

Temp[4] = "GET /cgi-bin/php.cgi HTTP/1.0\n\n";

Temp[5] = "GET /cgi-bin/handler HTTP/1.0\n\n";

Temp[6] = "GET /cgi-bin/webgais HTTP/1.0\n\n";

Temp[7] = "GET /cgi-bin/websendmail HTTP/1.0\n\n";

Options:

A.

The program is designed to launch the users email program.

B.

The program is designed to manage the counters on a target web server.

C.

The program is simply old temp files, and nothing of interest.

D.

The program is designed to test the functionality of the cgi email scripts that are installed on the server.

E.

The program is a vulnerability scanner

Buy Now
Questions 12

You have just become the senior security professional in your office. After you have taken a complete inventory of the network and resources, you begin to work on planning for a successful security implementation in the network. You are aware of the many tools provided for securing Windows 2003 machines in your network. What is the function of Secedit.exe?

Options:

A.

This tool is used to set the NTFS security permissions on objects in the domain.

B.

This tool is used to create an initial security database for the domain.

C.

This tool is used to analyze a large number of computers in a domain-based infrastructure.

D.

This tool provides an analysis of the local system NTFS security.

E.

This tool provides a single point of management where security options can be applied to a local computer or can be imported to a GPO.

Buy Now
Questions 13

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Nmap Scan

B.

Port Scan

C.

Trojan Scan

D.

Ping Request

E.

Ping Sweep

Buy Now
Questions 14

You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS 6.0.

You are concerned about the overall security of your servers, and are checking with Microsoft for any patches or updates that you might need to apply to your systems. Which of the following would you apply if you need to implement an update based on a critical Microsoft Security Bulletin?

Options:

A.

Critical Update

B.

Security Update

C.

Feature Pack

D.

Update Rollup

E.

MSB Update

Buy Now
Questions 15

You are creating the User Account section of your organizational security policy. From the following options, select the questions to use for the formation of this section?

Options:

A.

Are users allowed to make copies of any operating system files (including, but not limited to /etc/passwd or the SAM)?

B.

Who in the organization has the right to approve the request for new user accounts?

C.

Are users allowed to have multiple accounts on a computer?

D.

Are users allowed to share their user account with coworkers?

E.

Are users required to use password-protected screensavers?

F.

Are users allowed to modify files they do not own, but have write abilities?

Buy Now
Questions 16

You are running some tests in your network, to see if you can remotely identify the operating system of nodes in the network. Using the nmap tool, which of the following commands will identify the operating system of the computer using IP address 192.168.10.1?

Options:

A.

nmap -ident 192.168.10.1 -sS

B.

nmap -sS 192.168.10.1 -O

C.

nmap -Id 192.168.10.1 -sS

D.

nmap -a -u -x -Id 192.168.10.1

E.

nmap -Id 192.168.10.1 -aux -sS

Buy Now
Questions 17

To maintain the security of your network you routinely run several checks of the network and computers.

Often you use the built-in tools, such as netstat. If you run the following command:

netstat –e which of the following will be the result?

Options:

A.

Displays all connections and listening ports

B.

Displays Ethernet statistics

C.

Displays addresses and port numbers in numerical form

D.

Shows connections for the protocol specified

E.

Displays per-protocol statistics

Buy Now
Questions 18

Your organization assigns an Annual Loss Expectancy to assets during a risk analysis meeting. You have a server which if down for a day will lose the company $35,000, and has a serious root access attack against it once per month. What is the ALE for this attack against this server?

Options:

A.

$35,000

B.

$120,000

C.

$2,916

D.

$3,500

E.

$420,000

Buy Now
Questions 19

You are working on the authentication systems in your network, and are concerned with your legacy systems. In Windows NT 4.0, before Service Pack 4 (SP4), there were only two supported methods of authentication. What were those two methods?

Options:

A.

NetBIOS

B.

LM

C.

NTLM

D.

NTLMv2

E.

Kerberos

Buy Now
Questions 20

During a one week investigation into the security of your network you work on identifying the information that is leaked to the Internet, either directly or indirectly. One thing you decide to evaluate is the information stored in the Whois lookup of your organizational website. Of the following, what pieces of information can be identified via this method?

Options:

A.

Registrar

B.

Mailing Address

C.

Contact Name

D.

Record Update

E.

Network Addresses (Private)

Buy Now
Questions 21

As per the guidelines in the ISO Security Policy standard, what is the purpose of the section on Physical and Environmental Security?

Options:

A.

The objectives of this section are to avoid breaches of any criminal or civil law, statutory, regulatory or contractual obligations and of any security requirements, and to ensure compliance of systems with organizational security policies and standards.

B.

The objectives of this section are to prevent unauthorized access, damage and interference to business premises and information; to prevent loss, damage or compromise of assets and interruption to business activities; to prevent compromise or theft of information and information processing facilities.

C.

The objectives of this section are to provide management direction and support for information security.

D.

The objectives of this section are to maintain appropriate protection of corporate assets and to ensure that information assets receive an appropriate level of protection.

E.

The objectives of this section are to control access to information, to prevent unauthorized access to information systems, to ensure the protection of networked services, and to prevent unauthorized computer access.

Buy Now
Questions 22

You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS 6.0.

You are concerned about the overall security of your servers, and are checking with Microsoft for any patches or updates that you might need to apply to your systems. Which of the following would you apply if you need to implement a single update, which contains a single cumulative package that includes multiple files that are used to address a problem in your IIS Servers?

Options:

A.

Critical Update

B.

Security Update

C.

Feature Pack

D.

Update Rollup

E.

MSB Update

Buy Now
Questions 23

Most companies that do business via the Web offer a shopping cart so you can specify all the items you want before placing the order. Poor shopping cart design, however, can allow a different kind of hack. Take a look at the HTML code sample presented here and determine the line that presents the vulnerability:

QUANTITY:

Options:

A.

The line specifying the Perl script orders.pl

B.

The line specifying input type for price

C.

The line specifying input type for item number

D.

The line specifying input type for quantity

E.

The line specifying input type for item number and quantity

Buy Now
Questions 24

You read on a security website that hackers are reading Newsgroup messages to try to identify potential targets and target details. You had previously not closed the port for the Newsgroup service on your firewall.

After you close that port, you do an Internet newsgroup search for your domain name. You do find several messages from users in your organization. What type of information may be found by examining these messages?

Options:

A.

Email Address

B.

Internal Server Names

C.

Corporate Public IP Address

D.

Client Newsreader Program

E.

Client Email Program

Buy Now
Questions 25

In the process of public key cryptography, which of the following is true?

Options:

A.

Only the public key is used to encrypt and decrypt

B.

Only the private key can encrypt and only the public key can decrypt

C.

Only the public key can encrypt and only the private key can decrypt

D.

The private key is used to encrypt and decrypt

E.

If the public key encrypts, then only the private key can decrypt

Buy Now
Questions 26

You work for a medium sized ISP and there have been several attacks of the DNS configuration recently.

You are particularly concerned with DNS Spoofing attacks. If an attacker is able to send out false data to a

DNS client before the response from the DNS server arrives, this is which type of DNS Spoofing?

Options:

A.

DNS Server Compromise

B.

DNS Cache Poisoning

C.

Spoofing the DNS Response

D.

DNS Source-Router Spoof

E.

IXFR Source-Spoof

Buy Now
Questions 27

In Windows 2003, there are four methods of implementing IPSec. They are:

1 - Require Security

2 - Request Security

3 - Respond Only

4 - No IPSec Policy

Your network hosts many servers, and different security policies are in place in different locations in the network. The Clients and Servers in your network are configured as follows:

-You have servers numbered 1-9, which have a policy stating they require no network traffic security.

-You have servers numbered 10-19, which have a policy stating they are not required to be secure, but will encrypt network traffic if the client is able to receive it.

-You have servers numbered 20-29, which have a policy stating they are required to be secure and all network traffic they deliver must be secured.

-You have clients numbered 60-79 that are required to access secure servers 20-29.

-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are required to access servers 1-9 and 10-19.

Based on the Client and Server configuration provided above, which of the following computers must implement IPSec method 3?

Options:

A.

Computers numbered 1-9

B.

Computers numbered 10-19

C.

Computers numbered 20-29

D.

Computers numbered 60-79

E.

Computers numbered 80-90

Buy Now
Questions 28

You are running a Linux Server for your organization. You realize after a security scan that the Telnet service is accepting connections, which you do not want. In order to disable the computers ability to accept incoming Telnet sessions, the easiest method for you to choose is which of the following?

Options:

A.

Remove the Telnet service from the server

B.

Comment out the Telnet line in inetd.conf

C.

Stop the Telnet service on the server

D.

Pause the Telnet service on the server

E.

Configure the firewall to block Telnet requests

Buy Now
Questions 29

After installing a new SuSe Linux system, you wish to enhance the security of this computer. You type in the following commands (with actions in parenthesis): grub (press Enter) md5crypt qwerty (copy the result of this command) quit

gedit /boot/grub/menu.1st & password -md5 (Paste what you copied earlier)

(Save and close gedit)

What is the effect of following these commands and actions?

Options:

A.

You have encrypted the grub menu with an MD5 hash.

B.

You have added an MD5 hash of the word qwerty to the 1st time the grub menu is run.

C.

You have added an MD5 password to the gedit process.

D.

You have added an MD5 hash to the grub process.

E.

You have added an MD5 hash of the word qwerty to the boot process.

Buy Now
Questions 30

Which of the following equation pairs show examples of an Inverse Function?

Options:

A.

20+3=23 and 23-3=20

B.

10*2=20 and 20/2=10

C.

20*2=40 and 40*0.5=20

D.

40/2=20 and 20/0.5=40

E.

30+10=40 and 40-10=30

F.

10*2=20 and 20*0.5=10

Buy Now
Questions 31

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

Options:

A.

Linux Ping Reply

B.

Windows 2000 Ping Reply

C.

Windows NT 4.0 Ping Request

D.

Linux Ping Request

E.

Windows 2000 Ping Request

Buy Now
Questions 32

You have decided to alter the default permissions of files on your SuSe Linux system. To do so, you are going to change the umask settings. Where is the umask setting located?

Options:

A.

/etc/profile

B.

/etc/umask

C.

/var/profile

D.

/var/umask

E.

/dev/null

Buy Now
Questions 33

You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system, if you wish to audit events like the computer restarting, which of the following options would you use?

Options:

A.

Audit Account Logon Events

B.

Audit Account Management

C.

Audit Logon Events

D.

Audit Object Access

E.

Audit System Events

Buy Now
Questions 34

You are showing a colleague some of the commands available in Linux, and you type telinit 6 what is the result of typing this command?

Options:

A.

This runs the telnet service with a priority level of 6.

B.

This configures the system to use single-user mode.

C.

This halts the system.

D.

This restarts the system.

E.

This interrupts the telnet service on socket 6.

Buy Now
Exam Code: SCNP
Exam Name: SCNP Strategic Infrastructure Security
Last Update: Apr 26, 2023
Questions: 233