Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following SCNP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

SCNP Exam Dumps - SCNP Strategic Infrastructure Security

Go to page:
Question # 17

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

A.

Linux Ping Response

B.

Linux Ping Request

C.

Windows 2000 Ping Request

D.

Windows 2000 Ping Response

E.

Windows NT 4.0 Ping Request

Full Access
Question # 18

Your organization assigns an Annual Loss Expectancy to assets during a risk analysis meeting. You have a server which if down for a day will lose the company $25,000, and has a serious root access attack against it once per month. What is the ALE for this attack against this server?

A.

$25,000

B.

$300,000

C.

$120,000

D.

$2,083

E.

$2,500

Full Access
Question # 19

You have a file on your Linux system, and you need to modify the file's permissions. The permissions you wish to apply are: Read, Write, and Execute for the User; Read for the Group: and Read for the Others.

What command will allow you to achieve this?

A.

chmod 744 test_file.tar.gz

B.

chmod 644 test_file.tar.gz

C.

chmod 700 test_file.tar.gz

D.

chmod 774 test_file.tar.gz

E.

chmod 600 test_file.tar.gz

Full Access
Question # 20

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

A.

Linux Ping Reply

B.

Windows 2000 Ping Reply

C.

Windows NT 4.0 Ping Request

D.

Linux Ping Request

E.

Windows 2000 Ping Request

Full Access
Question # 21

What type of cipher is used by an algorithm that encrypts data in chunks of data, 64 bits at a time?

A.

64-bit encryption Cipher

B.

Block Cipher

C.

Stream Cipher

D.

Diffuse Cipher

E.

Split Cipher

Full Access
Question # 22

You are viewing the /etc/passwd file on your SuSe Linux computer, and you see the following entry: root:23rs5:0:0:root:/root:/bin/bash

In this entry, what does the 23rs5 mean?

A.

It is the code for the time when the root account was created

B.

It is the group that the root account belongs to

C.

It is the unencrypted password of the root account

D.

It is the login name that the root account is to use

E.

It is the encrypted password of the root account

Full Access
Question # 23

When using multiple alphabets, what type of cipher is being used?

A.

Polyalphabetic Cipher

B.

Multiple Cipher

C.

Multialphabetic Cipher

D.

Confusion Cipher

E.

Diffusion Cipher

Full Access
Question # 24

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use

Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?

A.

Nmap SYN/FIN Scan

B.

Nmap NULL Scan

C.

Nmap ACK Scan

D.

Nmap SYN Scan

E.

Nmap XMAS Scan

Full Access
Go to page: