SCP SC0-471 Strategic Infrastructure Security Exam Practice Test

Page: 1 / 14
Total 133 questions
Question 1

You are working on the configuration of the authentication systems used in your network, and are considering several different authentication methods for your computer systems. What do LM, NTLM, and NTLMv2 use as their Authentication method?



Answer : A


Question 2

You read on a security website that hackers are reading Newsgroup messages to try to identify potential targets and target details. You had previously not closed the port for the Newsgroup service on your firewall. After you close that port, you do an Internet newsgroup search for your domain name. You do find several messages from users in your organization. What type of information may be found by examining these messages?



Answer : A, C, D


Question 3

On your Windows 2003 system, you want to control inbound access to various ports. What feature of Windows 2003 will allow you to do this?



Answer : D


Question 4

Most companies that do business via the Web offer a shopping cart so you can specify all the items you want before placing the order. Poor shopping cart design, however, can allow a different kind of hack. Take a look at the HTML code sample presented here and determine theline that presents the vulnerability:

QUANTITY:



Answer : B


Question 5

In Windows 2003, there are four methods of implementing IPSec. They are: 1 - Require Security 2 - Request Security 3 - Respond Only 4 - No IPSec Policy Your network hosts many servers, and different security policies are in place in different locations in the network. The Clients and Servers in your network are configured as follows: -You have servers numbered 1-9, which have a policy stating they require no network traffic security. -You have servers numbered 10-19, which have a policy stating they are not required to be secure, but will encrypt network traffic if the client is able to receive it. -You have servers numbered 20-29, which have a policy stating they are required to be secure and all network traffic they deliver must be secured. -You have clients numbered 60-79 that are required to access secure servers 20-29. -You have clients numbered 80-99 that are not required to access secure servers 20-29, but are required to access servers 1-9 and 10-19. Based on the Client and Server configuration provided above, which of the following computers must implement IPSec method 3?



Answer : D


Question 6

Which one of the following is an incorrect mod equation?



Answer : D


Question 7

While configuring TCP Wrappers on your Linux system, you desire to create a line that will effect every local computer's access to the ftp service. Which of the following lines will achieve this desired result?



Answer : B


Page:    1 / 14   
Total 133 questions