Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following SCNS Exam is Retired now. Please select the alternative replacement for your Exam Certification.

SCNS Exam Dumps - SCNS Tactical Perimeter Defense

Go to page:
Question # 9

Your network is a mixed environment of Windows, Linux, and UNIX, computers. The routers are primarily

Cisco and the network uses a T-1 to connect to the Internet. You are experimenting with setting up a mail server in a production environment for internal use only. You do not want this mail server to receive any requests from anywhere but the internal network. Therefore you have decided to block incoming SMTP traffic at the Firewall. Which port will you block at the Firewall?

A.

23

B.

25

C.

53

D.

80

E.

110

Full Access
Question # 10

During a network packet capture in Wireshark, you capture ICMP traffic, and are analyzing this capture.

In an ICMP Message, what is the function of the first eight bits?

A.

To define the source port number

B.

To define the type

C.

To define the destination port number

D.

To define the IP Version

E.

To define the upper layer protocol

Full Access
Question # 11

A router has two active Ethernet interfaces. Interface E0 is connected to network 10.10.0.0/16 while

Interface E1 is connected to network 10.11.0.0/16. You are configuring access control lists to manage specific access, which is disallowed on these segments. The configuration of the lists are as follows:

router(config)#access-list 123 deny tcp 10.11.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq 20

router(config)#access-list 123 deny tcp 10.11.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq 21

router(config)#access-list 123 deny tcp 10.10.0.0 0.0.255.255 10.11.0.0 0.0.255.255 eq 20

router(config)#access-list 123 deny tcp 10.10.0.0 0.0.255.255 10.11.0.0 0.0.255.255 eq 21

router(config)#access-list 123 permit tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255

router(config)#Interface Ethernet 0

router(config-if)#ip access-group 123 in

router(config-if)#Interface Ethernet 1

router(config-if)#ip access-group 123 in

Based on the above list configuration, which of the following statements is true on the router?

A.

All packets will be dropped

B.

All packets that match the deny statements will be forwarded to the console port

C.

All packets that do not match the deny statements will be allowed

D.

An Access List cannot simultaneously be implemented upon two or more interfaces

E.

We do not know if this is a standard or extended access list, therefore there is not enough information.

Full Access
Question # 12

Your organization has extensive resources that you must make available to authorized users, through your ISA Server 2006. From the following answers, select the one that is not a feature of ISA Server Content Publishing:

A.

Secure Sockets Layer (SSL) Bridging

B.

Web Caching and Delivery

C.

Web Publishing Load Balancing

D.

Enhanced Multi-factor Authentication

E.

Robust Logging and Reporting

Full Access
Question # 13

You are going to configure your SuSe Linux computer to run Snort as your IDS. Prior to running Snort, you wish to configure Apache and PHP, so you may use Snort monitoring tools in the browser. You need to verify that Apache and PHP are running properly. What line needs to be entered in the info.php file to test PHP on your Apache server?

A.

B.

http://localhost/info.php

C.

D.

E.

Full Access
Question # 14

You are building the rules for your newly installed ISA Server 2006. There are three basic rule types:

Access rules, Publishing rules, and Network rules. Which of the following best describes Access rules and Publishing rules?

A.

An Access Rule controls access requests from the external network for internal resources.

B.

A Publishing Rule controls what network traffic from the internal network is allowed to access the external network.

C.

A Publishing Rule controls what network traffic is allowed access to published resources, based on Protocol and Port information.

D.

A Publishing Rule controls access requests from the external network for internal resources.

E.

An Access Rule controls what network traffic from the internal network is allowed to access the external network.

Full Access
Question # 15

In an ICMP Message, what is the function of the first eight bits?

A.

To define the source port number

B.

To define the type

C.

To define the destination port number

D.

To define the IP Version

E.

To define the upper layer protocol

Full Access
Question # 16

Your network is going to implement a new network security solution, and as part of this you are configuring IPSec on a Windows Server 2003 machine. Which of the following is the description of the Client (Respond Only) default IPSec Policy?

A.

This policy is used for normal communications, and any system with this policy enabled will have the ability to communicate using IPSec if required, or requested.

B.

This policy is used when all IP network traffic is to be secured. Any system with this policy enabled will always enforce secure communications using IPSec.

C.

This policy is used when IP traffic is to be secured, and to allow unsecured communication with clients that do not respond to the request.

D.

This policy is used when clients are the only machines on the network that need IP traffic to be secured.

Any client with this policy enabled will initialize secure communications with other clients running this policy.

E.

This policy is used when clients must respond to IPSec servers. If the client does not use IPSec, network communications will fail.

Full Access
Go to page: