SCNP-EN Dumps SCNP-EN Braindumps

SCNP-EN Real Questions SCNP-EN Practice Test SCNP-EN Actual Questions


Exin


SCNP-EN


SCNP Strategic Infrastructure Security


https://killexams.com/pass4sure/exam-detail/SCNP-EN


Answer: B


QUESTION: 225

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?


  1. Linux Ping Reply

  2. Windows 2000 Ping Reply

  3. Windows NT 4.0 Ping Request

  4. Linux Ping Request

  5. Windows 2000 Ping Request


Answer: E


QUESTION: 226

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?



  1. Trojan Horse Scan

  2. Back Orifice Scan

  3. NetBus Scan

  4. Port Scan

  5. Ping Sweep


Answer: B


QUESTION: 227

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?


  1. Linux Ping Response

  2. Linux Ping Request

  3. Windows 2000 Ping Request

  4. Windows 2000 Ping Response

  5. Windows NT 4.0 Ping Request


Answer: B


QUESTION: 228

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?


  1. Nmap SYN/FIN Scan

  2. Nmap ACK Scan

  3. Nmap NULL Scan

  4. Nmap XMAS Scan

  5. Nmap SYN Scan


Answer: C


QUESTION: 229

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?



  1. Nmap SYN/FIN Scan

  2. Nmap NULL Scan

  3. Nmap ACK Scan

  4. Nmap SYN Scan

  5. Nmap XMAS Scan


Answer: D


QUESTION: 230

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?


  1. Nmap XMAS Scan

  2. Nmap NULL Scan

  3. Nmap SYN Scan

  4. Nmap ACK Scan

  5. Nmap SYN/FIN Scan


Answer: A


QUESTION: 231

The image shows an example of what algorithm?


  1. DES

  2. Triple-DES

  3. Blowfish

  4. DH

  5. IDEA


Answer: D


QUESTION: 232

What type of cryptographic system is represented in this image?



  1. Caesar

  2. Vingre

  3. Polybius

  4. Purple E. Enigma


Answer: E


QUESTION: 233

What classic cipher is shown in this image?


  1. Feistel Cipher

  2. Caesar Cipher

  3. Vingre Cipher

  4. Polybius Cipher

  5. Enigma Cipher


Answer: A