Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following SCNS Exam is Retired now. Please select the alternative replacement for your Exam Certification.

SCNS Exam Dumps - SCNS Tactical Perimeter Defense

Go to page:
Question # 25

In order to perform promiscuous mode captures using the Wireshark capture tool on a Windows Server

2003 machine, what must first be installed?

A.

IPv4 stack

B.

IPv6 stack

C.

WinPcap

D.

Nothing, it will capture by default

E.

At least two network adapters

Full Access
Question # 26

In your organization a decision has been made to implement a multicasting application. You are configuring your firewall to allow this application to flow through in both directions. What address range are you going to address on the firewall?

A.

10.0.0.0/8

B.

172.16.0.0/12

C.

Multicast addresses use APIPA's 169.254.0.0/16

D.

224.0.0.0/4

E.

Addresses are negotiated at the time of the multicast. The nearest router assigns a public IP address assigned by ARIN.

Full Access
Question # 27

You are configuring the rules on your firewall, and need to take into consideration that some clients in the

network are using automatic addressing. What is the IP address range reserved for internal use for APIPA in Microsoft networks?

A.

169.254.0.0 /4

B.

169.254.0.0 /16

C.

169.254.0.0 /8

D.

169.254.0.0 /0

E.

168.255.0.0 /16

Full Access
Question # 28

You are working on your companys IPTables Firewall; you wish to create a rule to address traffic using ports 1024 through 2048. Which of the following would you use during the creation of your rule?

A.

p:1024 P:2048

B.

P:1024 p2048

C.

p=1024-2048

D.

1024-2048

E.

1024:2048

Full Access
Question # 29

You have been given the task of building the new wireless networks for your office. What wireless standard allows for up to 54 Mbps transmission rates, but is not compatible with 802.11b?

A.

802.11c

B.

802.11g

C.

802.11e

D.

802.11i

E.

802.11a

Full Access
Question # 30

You suspect an increase in malicious traffic on your network. You run several packet captures to analyze traffic patterns and look for signs of intruders. While studying the packets, you are currently looking for ICMP Messages. You choose to use the IP Protocol ID to locate different kinds of packets. What is the IP Protocol ID of ICMP?

A.

1

B.

6

C.

17

D.

25

E.

9

Full Access
Question # 31

You are introducing a co-worker to the security systems in place in your organization. During the discussion you begin talking about the network, and how it is implemented. You decide to run a packet capture to identify different aspects of network traffic for your co-worker. In the packet capture you are able to identify Protocol IDs. What is the IP protocol ID for TCP?

A.

Protocol ID 1

B.

Protocol ID 44

C.

Protocol ID 6

D.

Protocol ID 17

E.

Protocol ID 4

Full Access
Question # 32

After you implemented your IPSec solution, you wish to run some tests to verify functionality. Which of the following provides confidentiality and authentication when implementing IPSec?

A.

Authentication Header

B.

Encapsulating Security Payload

C.

Security Associations

D.

Security Authentications

E.

Encapsulating Delimiters

Full Access
Go to page: