ITIL SCNP - SCNP Strategic Infrastructure Security Exam

Question #6 (Topic: Topic 1)
What type of cipher is used by an algorithm that encrypts data one bit at a time?
A. 64-bit encryption Cipher B. Block Cipher C. Stream Cipher D. Diffuse Cipher E. Split Cipher
Answer: C
Question #7 (Topic: Topic 1)
You have just become the senior security professional in your office. After you have taken
a complete inventory of the network and resources, you begin to work on planning for a
successful security implementation in the network. You are aware of the many tools
provided for securing Windows 2003 machines in your network. What is the function of
Secedit.exe?
A. This tool is used to set the NTFS security permissions on objects in the domain. B. This tool is used to create an initial security database for the domain. C. This tool is used to analyze a large number of computers in a domain-based infrastructure. D. This tool provides an analysis of the local system NTFS security. E. This tool provides a single point of management where security options can be applied to a local computer or can be imported to a GPO.
Answer: C
Question #8 (Topic: Topic 1)
To increase the security of your network and systems, it has been decided that EFS will be
implemented in the appropriate situations. Two users are working on a common file, and
often email this file back and forth between each other. Is this a situation where the use of
EFS will create effective security, and why (or why not)?
A. No, the security will remain the same since both users will share the same key for encryption. B. Yes, since the file will be using two keys for encryption the security will increase. C. No, the security will remain the same since both users will share the same key for decryption. D. Yes, since the file will be using two keys for decryption the security will increase. E. No, EFS cannot be used for files that are shared between users.
Answer: E
Question #9 (Topic: Topic 1)
Recently, you have seen an increase in intrusion attempts and in network traffic. You
decide to use Snort to run a packet capture and analyze the traffic that is present. Looking
at the example, what type of traffic did Snort capture in this log file?
A. Windows 2000 Ping Request B. Windows NT 4.0 Ping Request C. Linux Ping Request D. Linux Ping Response E. Windows NT 4.0 Ping Response
Answer: B
Question #10 (Topic: Topic 1)
In order for your newly written security policy to have any weight, it must be implemented.
Which of the following are the three components of a successful Security Policy
Implementation in an organization?
A. Policy Monitoring B. Policy Design C. Policy Committee D. Policy Enforcement E. Policy Documentation
Answer: A,B,D
Download Exam
Page: 2 / 47
Total 233 questions