Latest SCNP-EN Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : SCNP-EN
Exam Name : SCNP Strategic Infrastructure Security
Vendor Name : "Exin"







SCNP-EN Dumps SCNP-EN Braindumps

SCNP-EN Real Questions SCNP-EN Practice Test SCNP-EN Actual Questions


Exin


SCNP-EN


SCNP Strategic Infrastructure Security


https://killexams.com/pass4sure/exam-detail/SCNP-EN




Answer: B



Question: 225

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?


  1. Linux Ping Reply

  2. Windows 2000 Ping Reply

  3. Windows NT 4.0 Ping Request

  4. Linux Ping Request

  5. Windows 2000 Ping Request




Answer: E



Question: 226

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?



  1. Trojan Horse Scan

  2. Back Orifice Scan

  3. NetBus Scan

  4. Port Scan

  5. Ping Sweep




Answer: B



Question: 227

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?


  1. Linux Ping Response

  2. Linux Ping Request

  3. Windows 2000 Ping Request

  4. Windows 2000 Ping Response

  5. Windows NT 4.0 Ping Request




Answer: B



Question: 228

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?


  1. Nmap SYN/FIN Scan

  2. Nmap ACK Scan

  3. Nmap NULL Scan

  4. Nmap XMAS Scan

  5. Nmap SYN Scan




Answer: C



Question: 229

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?



  1. Nmap SYN/FIN Scan

  2. Nmap NULL Scan

  3. Nmap ACK Scan

  4. Nmap SYN Scan

  5. Nmap XMAS Scan




Answer: D



Question: 230

Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?


  1. Nmap XMAS Scan

  2. Nmap NULL Scan

  3. Nmap SYN Scan

  4. Nmap ACK Scan

  5. Nmap SYN/FIN Scan




Answer: A



Question: 231

The image shows an example of what algorithm?


  1. DES

  2. Triple-DES

  3. Blowfish

  4. DH

  5. IDEA




Answer: D



Question: 232

What type of cryptographic system is represented in this image?



  1. Caesar

  2. Vingre

  3. Polybius

  4. Purple E. Enigma




Answer: E



Question: 233

What classic cipher is shown in this image?


  1. Feistel Cipher

  2. Caesar Cipher

  3. Vingre Cipher

  4. Polybius Cipher

  5. Enigma Cipher




Answer: A