Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following SCNS Exam is Retired now. Please select the alternative replacement for your Exam Certification.

SCNS Exam Dumps - SCNS Tactical Perimeter Defense

Go to page:
Question # 17

If you are looking for plain-text ASCII characters in the payload of a packet you capture using Network

Monitor, which Pane will provide you this information?

A.

Summary Pane

B.

Packet Pane

C.

Collection Pane

D.

Hex Pane

E.

Detail Pane

Full Access
Question # 18

During your investigation into wireless security options, you are reading about the 820.11 standards.

What wireless standard is designed to address the security issues of 802.11 networks?

A.

802.11a

B.

802.11i

C.

802.11b

D.

802.11e

E.

802.11g

Full Access
Question # 19

You have discovered that your Bastion host has been compromised but cannot determine when the compromise occurred. The best course of action for you to take would be:

A.

Boot to the "Last Known Good Configuration".

B.

Format the disk and re-install everything from scratch.

C.

Restore from your most recent tape back-up.

D.

Run an Anti-Virus scan on the Bastion host and clean any infected files.

E.

Download and run the patch for the exploit that was used in the attack.

Full Access
Question # 20

In order to properly manage the network traffic in your organization, you need a complete understanding of protocols and networking models. In regards to the 7-layer OSI model, what is the function of the Network Layer?

A.

The Network layer allows two applications on different computers to establish, use, and end a session.

This layer establishes dialog control between the two computers in a session, regulating which side transmits, plus when and how long it transmits.

B.

The Network layer manages logical addresses. It also determines the route from the source to the destination computer and manages traffic problems, such as routing, and controlling the congestion of data packets.

C.

The Network layer packages raw bits from the Physical (Layer 1) layer into frames (structured packets for data). Physical addressing (as opposed to network or logical addressing) defines how devices are addressed at the data link layer. This layer is responsible for transferring frames from one computer to another, without errors. After sending a frame, it waits for an acknowledgment from the receiving computer.

D.

The Network layer transmits bits from one computer to another and regulates the transmission of a stream of bits over a physical medium. For example, this layer defines how the cable is attached to the network adapter and what transmission technique is used to send data over the cable.

E.

The Network layer handles error recognition and recovery. It also repackages long messages, when necessary, into small packets for transmission and, at the receiving end, rebuilds packets into the original message. The corresponding Network layer at the receiving end also sends receipt acknowledgments.

Full Access
Question # 21

In the command ipchains -N chain , what will the -N accomplish in the chain?

A.

Calls up the next sequential chain

B.

Create a new chain named "chain"

C.

Calls up the chain named "chain"

D.

Negate the current chain

E.

Commit the new changes in the present chain

Full Access
Question # 22

If you wanted to configure your new system to use the process of detecting unauthorized activity that matches known patterns of misuse, this system would be an example of which of the following?

A.

Intrusion

B.

Misuse

C.

Intrusion detection

D.

Misuse detection

E.

Anomaly detection

Full Access
Question # 23

You are evaluating the security of different wireless media, and are considering an infrared solution. If an attacker is trying to gain access to an infrared transmission, what will the attacker need?

A.

Powered light source

B.

Beam Integrator

C.

Beam Collider

D.

Beam Splitter

E.

Photon Analyzer

Full Access
Question # 24

You are configuring a L2TP solution between your office and your primary branch office. The CEO has requested a report on the benefits of using this technology. Which of the following benefits does L2TP (with IPSec) provide?

A.

Bandwidth Management

B.

Encryption

C.

User Authentication

D.

Packet Authentication

E.

Key Management

Full Access
Go to page: