image


SC0-451 Dumps SC0-451 Braindumps

SC0-451 Real Questions SC0-451 Practice Test SC0-451 Actual Questions


SCP


SC0-451


Tactical Perimeter Defense


https://killexams.com/pass4sure/exam-detail/SC0-451


QUESTION: 169

You are considering your options for a new firewall deployment. At which two layers of the OSI model does a simple (stateless) packet filtering firewall operate?


  1. Data Link

  2. Application

  3. Session

  4. Presentation

  5. Network


Answer: A,E


QUESTION: 170

The following exhibit is a screen shot of a capture using Network Monitor. Examine the details as shown for a frame and identify which of the statements that follow best describes it.


image


  1. This frame represents an ICMP echo message between the two hosts

  2. This frame represents an IP broadcast trying to resolve the target IP address to its MAC address

  3. This frame represents an Ethernet broadcast trying to resolve the target IP address to its MAC address

  4. This frame represents a reply from the target machine with the appropriate resolution

  5. This frame represents the first fragment of the three-way handshake.


QUESTION: 171

Which of the following is a potential weakness of a commercial firewall product that is installed on a hardened machine?


  1. That you will not be able to use it in conjunction with personal firewalls on user's desktop machines.

  2. You will have to give the vendor confidential network information.

  3. You will be required to use the configuration that the vendor assigns you.

  4. That the firewall's vendor may be compromised and your private information may publicly available.

  5. That it may be vulnerable to attacks targeting the underlying Operating System.


Answer: E


QUESTION: 172

Which of the following is a potential weakness of a commercial firewall product that is installed on a hardened machine?


  1. That you will not be able to use it in conjunction with personal firewalls on user's desktop machines.

  2. You will have to give the vendor confidential network information.

  3. You will be required to use the configuration that the vendor assigns you.

  4. That the firewall's vendor may be compromised and your private information may publicly available.

  5. That it may be vulnerable to attacks targeting the underlying Operating System.


Answer: E


QUESTION: 173

In order to perform promiscuous mode captures using the Wireshark capture tool on a Windows Server 2003 machine, what must first be installed?


  1. IPv4 stack

  2. IPv6 stack

  3. WinPcap

  4. Nothing, it will capture by default

  5. At least two network adapters


QUESTION: 174

You have found a user in your organization who has managed to gain access to a system that this user was not granted the right to use. This user has just provided you with a working example of which of the following?


  1. Intrusion

  2. Misuse

  3. Intrusion detection

  4. Misuse detection

  5. Anomaly detection


Answer: A


QUESTION: 175

You have recently been contracted to implement a new firewall solution at a client site. What are the two basic forms firewall implementations?


  1. Chaining

  2. Stateful

  3. DMZ

  4. Stateless

  5. KMZ


Answer: B,D


QUESTION: 176

You are considering your options for a new firewall deployment. At which two layers of the OSI model does a simple (stateless) packet filtering firewall operate?


  1. Data Link

  2. Application

  3. Session

  4. Presentation

  5. Network


Answer: A,E

QUESTION: 177

Your organization has extensive resources that you must make available to authorized users, through your ISA Server 2006. From the following answers, select the one that is not a feature of ISA Server Content Publishing:


  1. Secure Sockets Layer (SSL) Bridging

  2. Web Caching and Delivery

  3. Web Publishing Load Balancing

  4. Enhanced Multi-factor Authentication

  5. Robust Logging and Reporting


Answer: B


QUESTION: 178

The exhibit shows a router with three interfaces EO, E1 and SO. Interfaces EO and E1 are connected to internal networks 192.168.10.0 and 192.168.20.0 respectively and interface SO is connected to the Internet. The objective is to allow only network 192.168.20.0 to access e-commerce Web sites on the Internet, while allowing all internal hosts to access resources within the internal network. From the following, select all the access list statements that are required to make this possible.


image


  1. access-list 113 permit tcp 192.168.20.0 0.0.0.255 any eq 80

  2. access-list 113 permit tcp 192.168.20.0 0.0.0.255 any eq 53

  3. access-list 113 permit tcp 192.168.20.0 0.0.0.255 any eq 443

D. access-list 113 permit tcp 192.168.20.0 0.0.0.255 any It 1023

  1. int SO, ip access-group 113 in

  2. int E1, ip access-group 113 in

  3. int SO, ip access-group 113 out


Answer: A,B,C,G

QUESTION: 179.

In your office, you are building the new wireless network, and you will need to install several access points. What do wireless access points use to counter multipath interference?


  1. Multiple encryption algorithms

  2. Multiple Antennas

  3. Multiple radio frequencies

  4. Duplicate packet transfer

  5. Secondary transmissions


Answer: B


QUESTION: 180.

One of the firewall choices you are thinking of implementing, in your network, is a proxy server. A proxy server can accomplish which of the following statements?


  1. Cache web pages for increased performance

  2. Operate at the Application layer of the OSI model

  3. Allow direct communication between an internal and external host

  4. Permit or deny traffic based upon type of service

  5. Filter executables that are attached to an e-mail


Answer: A,B,D,E


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG