ITIL SCNS - SCNS Tactical Perimeter Defense Exam
Page: 2 / 47
Total 232 questions
Question #6 (Topic: Topic 1)
There are several options available to you for your new wireless networking technologies,
and you are examining how different systems function. What transmission system uses
short bursts combined together as a channel?
and you are examining how different systems function. What transmission system uses
short bursts combined together as a channel?
A. Frequency Hopping Spread Spectrum (FHSS)
B. Direct Sequence Spread Spectrum (DSSS)
C. Lamar Anthell Transmission (LAT)
D. Digital Band Hopping (DBH)
E. Digital Channel Hopping (DCH)
Answer: A
Question #7 (Topic: Topic 1)
You have just installed a new Intrusion Detection System in your network. You are
concerned that there are functions this system will not be able to perform. What is a reason
an IDS cannot manage hardware failures?
concerned that there are functions this system will not be able to perform. What is a reason
an IDS cannot manage hardware failures?
A. The IDS can only manage RAID 5 failures.
B. The IDS cannot be programmed to receive SNMP alert messages.
C. The IDS cannot be programmed to receive SNMP trap messages.
D. The IDS cannot be programmed to respond to hardware failures.
E. The IDS can only inform you that an event happened.
Answer: E
Question #8 (Topic: Topic 1)
For the new Snort rules you are building, it will be required to have Snort examine inside
the content of the packet. Which keyword is used to tell Snort to ignore a defined number of
bytes before looking inside the packet for a content match?
the content of the packet. Which keyword is used to tell Snort to ignore a defined number of
bytes before looking inside the packet for a content match?
A. Depth
B. Offset
C. Nocase
D. Flow_Control
E. Classtype
Answer: B
Question #9 (Topic: Topic 1)
You have recently taken over the security of a mid-sized network. You are reviewing the
current configuration of the IPTables firewall, and notice the following rule:
ipchains -A input -p TCP -d 0.0.0.0/0 12345 -j DENY
What is the function of this rule?
current configuration of the IPTables firewall, and notice the following rule:
ipchains -A input -p TCP -d 0.0.0.0/0 12345 -j DENY
What is the function of this rule?
A. This rule for the output chain states that all incoming packets from any host to port 12345 are to be denied.
B. This rule for the input chain states that all incoming packets from any host to port 12345 are to be denied.
C. This rule for the input chain states that any TCP traffic from any address destined for any IP address and to port 12345 is to be denied.
D. This rule for the output chain states that any TCP traffic from any address destined for any IP address and to port 12345 is to be denied.
E. This rule for the input chain states that all TCP packets inbound from any network destined to any network is to be denied for ports 1, 2, 3, 4, and 5.
Answer: C
Question #10 (Topic: Topic 1)
At a policy meeting you have been given the task of creating the firewall policy. What are
the two basic positions you can take when creating the policy?
the two basic positions you can take when creating the policy?
A. To deny all traffic and permit only that which is required.
B. To permit only IP traffic and filter TCP traffic
C. To permit only TCP traffic and filter IP traffic
D. To permit all traffic and deny that which is required.
E. To include your internal IP address as blocked from incoming to prevent spoofing.
Answer: A,D