Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following SCNP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

SCNP Exam Dumps - SCNP Strategic Infrastructure Security

Go to page:
Question # 25

You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS 6.0.

You are concerned about the overall security of your servers, and are checking with Microsoft for any patches or updates that you might need to apply to your systems. Which of the following would you apply if you need to implement a single update, which contains a single cumulative package that includes multiple files that are used to address a problem in your IIS Servers?

A.

Critical Update

B.

Security Update

C.

Feature Pack

D.

Update Rollup

E.

MSB Update

Full Access
Question # 26

To maintain the security of your network you routinely run several checks of the network and computers.

Often you use the built-in tools, such as netstat. If you run the following command: netstat –e which of the following will be the result?

A.

Displays all connections and listening ports

B.

Displays Ethernet statistics

C.

Displays addresses and port numbers in numerical form

D.

Shows connections for the protocol specified

E.

Displays per-protocol statistics

Full Access
Question # 27

You are concerned that email messages sent to your Outlook clients could contain customized and dangerous scripting. What can you do to minimize the threat that this specific type of email presents?

A.

Install and Update Anti-Virus software

B.

Update the Security Settings for the clients at the SMTP Server

C.

Disable the Preview Pane

D.

Be sure that all forms of scripting are disabled on all clients

E.

Minimize the number of contacts allowed in an address book

Full Access
Question # 28

In your organization, the majority of employees use Microsoft Outlook Express as their email client. You are configuring these systems so that applications on the employee systems cannot send email, posing as the user of the system. Under the Security tab, which option will you select to achieve this goal?

A.

Do not allow other applications to send mail as me.

B.

Disable application mail delivery.

C.

Prompt me prior to application mail delivery.

D.

Warn me when other applications try to send mail as me.

E.

Do not allow applications that could potentially transmit a virus to send mail as me.

Full Access
Question # 29

What type of cipher is used by an algorithm that encrypts data one bit at a time?

A.

64-bit encryption Cipher

B.

Block Cipher

C.

Stream Cipher

D.

Diffuse Cipher

E.

Split Cipher

Full Access
Question # 30

You read on a security website that hackers are reading Newsgroup messages to try to identify potential targets and target details. You had previously not closed the port for the Newsgroup service on your firewall.

After you close that port, you do an Internet newsgroup search for your domain name. You do find several messages from users in your organization. What type of information may be found by examining these messages?

A.

Email Address

B.

Internal Server Names

C.

Corporate Public IP Address

D.

Client Newsreader Program

E.

Client Email Program

Full Access
Question # 31

You have just become the senior security professional in your office. After you have taken a complete inventory of the network and resources, you begin to work on planning for a successful security implementation in the network. You are aware of the many tools provided for securing Windows 2003 machines in your network. What is the function of Secedit.exe?

A.

This tool is used to set the NTFS security permissions on objects in the domain.

B.

This tool is used to create an initial security database for the domain.

C.

This tool is used to analyze a large number of computers in a domain-based infrastructure.

D.

This tool provides an analysis of the local system NTFS security.

E.

This tool provides a single point of management where security options can be applied to a local computer or can be imported to a GPO.

Full Access
Question # 32

You just installed a new SuSe Linux web server, running Apache, and are in the process of hardening the server. The server will perform basic web services, static web pages to internal clients only. Which of the following would you not perform to harden this system?

A.

Disable server-side includes

B.

Disable CGI execution

C.

Disable httpd.conf

D.

Disable directory browsing

E.

Disable unnecessary modules

Full Access
Go to page: