image


SCNS-EN Dumps SCNS-EN Braindumps

SCNS-EN Real Questions SCNS-EN Practice Test SCNS-EN Actual Questions


Exin


SCNS-EN


SCNS Tactical Perimeter Defense


https://killexams.com/pass4sure/exam-detail/SCNS-EN


  1. The MAC Address, the IP Address and the IP Protocol ID

  2. The IP Address, the IP Protocol ID and a Port number

  3. The MAC Address and the IP Protocol ID

  4. The MAC Address, the IP Protocol ID and a Port number

  5. The Ethertype and a Port number


Answer: B


QUESTION: 224

In an ICMP Message, what is the function of the first eight bits?


  1. To define the source port number

  2. To define the type

  3. To define the destination port number

  4. To define the IP Version

  5. To define the upper layer protocol


Answer: B


QUESTION: 225

You are introducing a co-worker to the security systems in place in your organization. Early in the discussion you begin talking about the network, and how it is implemented. You decide to run a packet capture to identify different aspects of network traffic for your co-worker. In the packet capture you are able to identify Protocol IDs. Which of the following is the IP Protocol ID for UDP?


  1. Protocol ID 51

  2. Protocol ID 21

  3. Protocol ID 6

  4. Protocol ID 17

  5. Protocol ID 11 Answer: D QUESTION: 226


In order to properly manage the network traffic in your organization, you need a complete understanding of protocols and networking models. In regards to the 7-layer OSI model, what is the function of the Network Layer?


  1. The Network layer allows two applications on different computers to establish, use, and end a session. This layer establishes dialog control between the two computers in a session, regulating which side transmits, plus when and how long it transmits.

  2. The Network layer manages logical addresses. It also determines the route from the source to the destination computer and manages traffic problems, such as routing, and controlling the congestion of data packets.

  3. The Network layer packages raw bits from the Physical (Layer 1) layer into frames (structured packets for data). Physical addressing (as opposed to network or logical addressing) defines how devices are addressed at the data link layer. This layer is responsible for transferring frames from one computer to another, without errors. After sending a frame, it waits for an acknowledgment from the receiving computer.

  4. The Network layer transmits bits from one computer to another and regulates the transmission of a stream of bits over a physical medium. For example, this layer defines how the cable is attached to the network adapter and what transmission technique is used to send data over the cable.

  5. The Network layer handles error recognition and recovery. It also repackages long messages, when necessary, into small packets for transmission and, at the receiving end, rebuilds packets into the original message. The corresponding Network layer at the receiving end also sends receipt acknowledgments.


Answer: B


QUESTION: 227

You are using Network Monitor to capture some traffic for later analysis. When you do begin to look at your captured data, you examine the TCP traffic you captured. In a TCP Header, what is the function of the first sixteen bits?


  1. To define the type

  2. To define the IP Version

  3. To define the destination port number

  4. To define the upper layer protocol

  5. To define the source port number


Answer: E


QUESTION: 228

If you configure an access-list to block the following networks, what are you trying to protect against? Network 127.0.0.0/8, Network 0.0.0.0\0, Network 10.0.0.0\8, Network 172.16.0.0\16, and Network 168.0.0\16.


  1. You are trying to protect against hijacking

  2. You are trying to protect against spoofing

  3. You are trying to protect against sniffing

  4. You are trying to protect against splicing

  5. You are trying to protect against capturing


Answer: B


QUESTION: 229

You are a host in a network segment that has IP addresses in the range of 168.16.1~192.168.31.254. You need to create an access control list that will filter your segment of addresses. Which of the following is the wildcard mask that will be used to filter your network segment?


A. 10.0.16.1/20 B. 0.0.16.254

C. 255.240.0.0

D. 0.0.240.0

E. 0.0.15.255


Answer: E


QUESTION: 230

The exhibit represents a simple routed network. Node 7 is a Windows NT 4.0 Workstation that establishes a TCP communication with Node 10, a Windows 2000 Professional host. The routers are Cisco 2500 series running IOS 11.2. While working at Node 10, you run a packet capture. When Node 10 receives a packet sent by Node 7, what will the capture reveal is the source MAC address?


image


  1. Interface for Node 7

  2. Interface E0 of Router A

  3. Interfaces for both Nodes 7 and E0

  4. Interface E0 of Router D

  5. Interface for Node 10


Answer: D


QUESTION: 231

During a network capture, using Wireshark, you capture some ICMP traffic for analysis. In an ICMP Message, what is the function of the first eight bits?


  1. To define the source port number

  2. To define the type

  3. To define the destination port number

  4. To define the IP Version

  5. To define the upper layer protocol


Answer: B


QUESTION: 232

A router has two active Ethernet interfaces. Interface E0 is connected to network 10.10.0.0/16 while Interface E1 is connected to network 10.1917.0.0/16. You are configuring access control lists


router(config)#access-list

123

deny

tcp

10.11.0.0

0.0.255.255

10.10.0.0

0.0.255.255

eq

20

router(config)#access-list

123

deny

tcp

10.11.0.0

0.0.255.255

10.10.0.0

0.0.255.255

eq

21

router(config)#access-list

123

deny

tcp

10.10.0.0

0.0.255.255

10.11.0.0

0.0.255.255

eq

20

router(config)#access-list

123

deny

tcp

10.10.0.0

0.0.255.255

10.11.0.0

0.0.255.255

eq

21

to manage specific access, which is disallowed on these segments. The configuration of the lists are as follows:


router(config)#access-list 123 permit tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255

router(config)#Interface Ethernet 0

router(config-if)#ip access-group 123 in router(config-if)#Interface Ethernet 1 router(config- if)#ip access-group 123 in Based on the above list configuration, which of the following statements is true on the router?


  1. All packets will be dropped

  2. All packets that match the deny statements will be forwarded to the console port

  3. All packets that do not match the deny statements will be allowed

  4. An Access List cannot simultaneously be implemented upon two or more interfaces

  5. We do not know if this is a standard or extended access list, therefore there is not enough information.


Answer: A


98


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG