Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following SCNS Exam is Retired now. Please select the alternative replacement for your Exam Certification.

SCNS Exam Dumps - SCNS Tactical Perimeter Defense

Go to page:
Question # 4

You are configuring Snort on your new IDS, and wish to categorize the events of the rules you will use.

Which keyword is used to categorize Snort events?

A.

Content

B.

Alert

C.

Depth

D.

Classtype

E.

Offset

Full Access
Question # 5

You are a host in a network segment that has IP addresses in the range of 168.16.1~192.168.31.254. You need to create an access control list that will filter your segment of addresses. Which of the following is the wildcard mask that will be used to filter your network segment?

A.

10.0.16.1/20

B.

0.0.16.254

C.

255.240.0.0

D.

0.0.240.0

E.

0.0.15.255

Full Access
Question # 6

In the image, there are two nodes communicating via two access points that are bridging together two segments. In the middle packet, under the left access point, the Address 4: field is blank. If this packet is destined for the computer on the right side of the image, what must be the value of Address field 4 in this middle packet?

A.

ABCD

B.

6789

C.

2345

D.

1234

E.

CDEF

Full Access
Question # 7

You are in the process of configuring your network firewall policy. As you begin building the content of the policy you start to organize the document into sections. Which of the following are sections found in the firewall policy?

A.

The Acceptable Use Statement

B.

The Firewall Administrator Statement

C.

The Network Connection Statement

D.

The Incident Handling Statement

E.

The Escalation Procedures Statement

Full Access
Question # 8

As you analyze the settings of the Secure Server (Require Security) IPSec policy in Windows Server

2003, you are looking at the options available for encryption and integrity. Which of the following answers presents a legitimate combination for encryption and integrity in the IPSec policy?

A.

Encryption: SHA1, Integrity: 3DES

B.

Encryption: 3DES, Integrity: SHA1

C.

Encryption: RSA, Integrity: MD5

D.

Encryption: MD5, Integrity: RSA

E.

Encryption: SHA1, Integrity: MD5

Full Access
Go to page: