SCP SC0-471.docx

download SCP SC0-471.docx

of 24

Transcript of SCP SC0-471.docx

  • 8/20/2019 SCP SC0-471.docx

    1/55

    SCP SC0-471SC0-471 Strategic Infrastructure Security

    Practice TestVersion 1.3QUESTIO O! 1You wish to increase the security of your Windows 2003 system by modifying TCP/IP intheRegistry. To ater how Windows reacts to !Y" #ttac$s% which three &aues are ad'usted(

     #. TCP)a*Ports+*hausted,. TCP)a*-afenC. TCP#IIowedConnections. TCP)a*-afenRetried+. TCP#IIowed!essions"ns#er! "$%$&

    QUESTIO O! ')ost comanies that do business &ia the Web offer a shoing cart so you can secifya theitems you want before acing the order. Poor shoing cart design% howe&er% can aowa different$ind of hac$. Ta$e a oo$ at the -T)1 code same resented here and determine theine thatresents the &unerabiity4R) #CTI"56htt//70.0.70.238/cgi9bin/orders.6 method56ost6:inuttye5hidden name56rice6 &aue563;.;+T;6:

    ?@#"TITY inut tye5te*t name56Auantity6 siBe52 ma*ength52 &aue5:/4R):

     #. The ine secifying the Per scrit orders.,. The ine secifying inut tye for riceC. The ine secifying inut tye for item number . The ine secifying inut tye for Auantity+. The ine secifying inut tye for item number and Auantity"ns#er! %QUESTIO O! 3You ha&e recenty hired an assistant to he you with managing the security of yournetwor$. You

    are currenty running an a Windows !er&er 2003 en&ironment% and are describing theissuesassociated with sharing foders. You describe different shared foder ermissions. Whichof thefoowing describes the ma*imum abiities of the Read ermission(

     #. isay foder names% fienames and data% and e*ecute fies!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 2

  • 8/20/2019 SCP SC0-471.docx

    2/55

    ,. Rename fies andfoders% deete fies and fodersC. Create foders% add fies to foders% change or deete fies in foders. Rename fies and foders% and e*ecute fies+. Changefie ermissions and ta$e ownershi of fies"ns#er! "

    QUESTIO O! 4You read on a security website that hac$ers are reading "ewsgrou messages to try toidentifyotentia targets and target detais. You had re&iousy not cosed the ort for the"ewsgrouser&ice on your firewa. #fter you cose that ort% you do an Internet newsgrou searchfor your domain name. You do find se&era messages from users in your organiBation. What tyeof information may be found by e*amining these messages(

     #. +mai #ddress

    ,. Interna !er&er "amesC. Cororate Pubic IP #ddress. Cient "ewsreader Program+. Cient +mai Program"ns#er! "$C$&QUESTIO O! (You susect that your root account has been comromised. What command can yourun on your 1inu* system% in the /&ar/og directory to see you the recent ogin acti&ity of the rootaccount(

     #. root=access 9R,. 9R rootC. ast 9@/acctroot. ast 9a 9d root+. ast 9R/acctroot"ns#er! &QUESTIO O! )There are se&era cients of your networ$ that reAuire the abiity to connect remotey.You areusing Internet #uthentication !er&ices FI#!G in Windows !er&er 2003 for security. Whatis I#! theWindows imementation of(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 3 #. )<,. +!C. R!#. PHI+. R#I@!"ns#er! E

  • 8/20/2019 SCP SC0-471.docx

    3/55

    QUESTIO O! 7You ha&e been gi&en the tas$ of writing your organiBations security oicy. uring yourresearchyou find that there are se&era estabished standards for security oicy design. Which of the

    foowing are acceted standards( #. I! 7DD;;,. ,! 7;DC. I! ;D;. ,! DD;;+. I! 7D;"ns#er! "$&QUESTIO O! *You wish to manage your 1inu* system remotey% using a web browser. Which of thefoowingtoos wi aow you to accomish your tas$(

     #. !nort,. ,astieC. Triwire. Webmin+. !!-"ns#er! &QUESTIO O! +You are concerned that emai messages sent to your utoo$ cients coud containcustomiBedand dangerous scriting. What can you do to minimiBe the threat that this secific tyeof emairesents(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed  #. Insta and @date #nti9Jirus software,. @date the !ecurity !ettings for the cients at the !)TP !er&er C. isabe the Pre&iew Pane. ,e sure that a forms of scriting are disabed on a cients+. )inimiBe the number of contacts aowed in an address boo$"ns#er! CQUESTIO O! 10Which of the foowing has the stages of Ris$ #naysis in order% from a to e(

     #. )anagementb. Threat #ssessmentC. Contro +&auation. In&entory+. )onitoring,. b% d% c% e% aC. a% b% d% c% e. d% b% c% a% e

  • 8/20/2019 SCP SC0-471.docx

    4/55

    +. a% b% c% d% e4. d% b% a% c% e"ns#er! CQUESTIO O! 11)icrosoft has de&eoed se&era security toos to he you with the security and

    configuration of the systems in your networ$. ne of these toos is the )icrosoft !ecurity ,aseine #nayBer F),!#G. In the command ine otions of the ),!# is the -4"etCh$ too. What is thefunction of the -4"etCh$ too% a&aiabe with ),!#(

     #. To chec$ for the current -otfi*es that area&aiabe from )icrosoft,. It is an ugrade to the Windows @date too for chec$ing on a udatesC. It is the too that must be run rior to instaing II! 8.0. It is the too that chec$s the networ$ configuration of a web ser&ers+. To record what -otfi*es and ser&ice ac$s are running on the Windows machine

    "ns#er! E!CP !C09D7 Practice +*am # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed <QUESTIO O! 1'You are studying the current attac$ methods and find that one of your ser&ers is&unerabe to a,uffer &erfow attac$. Which of the foowing do ,uffer &erfows e*oit(

     #. Ramdri&es,. # rogram that does not do bounds chec$ingC. )emory ea$s in the hardware. # rogram aowing itsef to be coied+. Paging of memory to a dis$"ns#er! %QUESTIO O! 13

     #t the rootKinu*bo*L romt on a 1inu* machine you tye Is 9I b.doc and the oututreads9tw9tw9r997 simonusers3733D0ct< 7727 b.doc

     #ccording to this outut% which of the foowing is true( #. b.doc is a word document,. "obody but the owner can e*ecute this fieC. This fie is infected by thesimon tro'an. "obody can read this fie+. +&eryone can read this fie"ns#er! EQUESTIO O! 14You susect that your root account has been comromised. What command can yourun on your 1inu* system% in the /&ar/og directory to see you the recent ogin acti&ity of the rootaccount(

     #. root=access 9R

  • 8/20/2019 SCP SC0-471.docx

    5/55

    ,. 9R rootC. ast 9@/acctroot. ast 9a 9d root+. ast 9R/acctroot"ns#er! &

    !CP !C09D7 Practice +*am # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 8QUESTIO O! 1(You are running a 1inu* !er&er for your organiBation. You reaiBe after a security scanthat theTenet ser&ice is acceting connections% which you do not want. In order to disabe thecomutersabiity to accet incoming Tenet sessions% the easiest method for you to choose iswhich of thefoowing(

     #. Remo&e the Tenet ser&ice from the ser&er 

    ,. Comment out the Tenet ine ininetd.conf C. !to the Tenet ser&ice on the ser&er . Pause the Tenet ser&ice on the ser&er +. Configure the firewa to boc$ Tenet reAuests"ns#er! %QUESTIO O! 1)You ha&e a fie on your 1inu* system% and you need to modify the fies ermissions. Theermissions you wish to ay are Read% Write% and +*ecute for the @serM Read for the>rouand Read for the thers. What command wi aow you to achie&e this(

     #. chmod D test=fie.tar.gB,. chmod 8 test=fie.tar.gBC. chmod D00 test=fie.tar.gB. chmod DD test=fie.tar.gB+. chmod 800 test=fie.tar.gB"ns#er! "QUESTIO O! 17You are discussing the design and infrastructure of the Internet with se&era coeagueswhen adisagreement begins o&er the actua function of the "#P in the Internet design. What isthefunction of a "#P in the hysica structure of the Internet(

     #. The "#P ro&ides for a ayered connection system of I!Ps connecting to thebac$bone.,. The "#P ro&ides the actua connection oint between a oca user and the Internet.C. The "#P ro&ides the hysica networ$ with communication channes for the Internetand&oice/data aications.. The "#P ro&ides a nationa interconnection of systems% caed eering centers% tothe "!Ps.

  • 8/20/2019 SCP SC0-471.docx

    6/55

    +. The "#P ro&ides for a connection oint between an I!P and the bac$bone of theInternet.!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed D"ns#er! E

    QUESTIO O! 1*You wor$ for a medium siBed I!P and there ha&e been se&era attac$s of the "!configurationrecenty. You are articuary concerned with "! !oofing attac$s. If an attac$er isabe to sendout fase data to a "! cient before the resonse from the "! ser&er arri&es% this iswhich tyeof "! !oofing(

     #. "! !er&er Comromise,. "! Cache PoisoningC. !oofing the "! Resonse

    . "! !ource9Router !oof +. IN4R !ource9!oof "ns#er! CQUESTIO O! 1+uring a discussion of asset cassification and rotection with a cowor$er% you reaiBethat your cowor$er does not $now the basic concets of asset rotection. You are as$ed todescribe thetyes of asset rotection. Which of the foowing describes the concet of feasiberotection of anasset(

     #. The cost to reace the asset is greater than the cost of reco&ery of the asset.,. The cost to reace the asset is ess than the cost of rotect the asset.C. The cost to rotect the asset is greater than the cost of reco&ery of the asset.. The cost to reace the asset is ess than the cost of reco&ery of the asset.+. The cost to rotect the asset is ess than the cost of reco&ery of the asset."ns#er! EQUESTIO O! '0What are the four different modes of imementation of +!(

     #. !tream Cyce Chaining F!CCG,. +ectronic Codeboo$ F+C,GC. utut 4eedbac$ F4,G. Ciher 4eedbac$ FC4,G+. Ciher ,oc$ Chaining FC,CG!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed O"ns#er! %$C$&$EQUESTIO O! '1You are studying the current attac$ methods and find that one of your ser&ers is&unerabe to a

  • 8/20/2019 SCP SC0-471.docx

    7/55

    ,uffer &erfow attac$. Which of the foowing do ,uffer &erfows e*oit( #. Ramdri&es,. # rogram that does not do bounds chec$ingC. )emory ea$s in the hardware. # rogram aowing itsef to be coied

    +. Paging of memory to a dis$"ns#er! %QUESTIO O! ''Which of the foowing fieds are found in a user accounts ine in the /etc/shadow fie(

     #. The @ser Identifier assigned to the user account,. The home directory used by the user accountC. The hashed &ersion of the user accounts assword. The number of days since the user account assword was changed+. The number of days unti the user accounts assword must change"ns#er! C$&$EQUESTIO O! '3

    In the +ngish anguage% what is the most freAuenty used etter( #. #,. +C. Td. r e. s"ns#er! %QUESTIO O! '4!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed ;You ha&e 'ust finished instaing new ser&ers and cients in your office networ$. # thenew cientmachines are running Windows 2000 Professiona% and the ser&ers are runningWindows !er&er 2003. You are now wor$ing on securing a user authentication reated areas of thesystems.Where is user account information stored% both for the omain and the oca machine(

     #. omain user account information is stored in the #cti&e irectory.,. 1oca user account information is stored in the !#).C. 1oca user account information is stored in the #cti&e irectory.. omain user account information is stored in the !#).+. omain user account information is stored in the )etabase"ns#er! "$%QUESTIO O! '(You wish to insta a new Windows 2003 !er&er in your networ$% and are deciding whichof theser&er roes wi best suit your en&ironment. 4rom the foowing answers% seect theotion that isnot a Windows 2003 !er&er Roe.

     #. !?1 !er&er 

  • 8/20/2019 SCP SC0-471.docx

    8/55

    ,. "! !er&er C. -CP !er&er . Print !er&er +. !harePoint !er&ices !er&er "ns#er! "

    QUESTIO O! ')To maintain the security of your networ$ you routiney run se&era chec$s of the networ$andcomuters. ften you use the buit9in toos% such as netstat. If you run the foowingcommandnetstat 9eWhich of the foowing wi be the resut(

     #. isays a connections and istening orts,. isays +thernet statisticsC. isays addresses and ort numbers in numerica form. !hows connections for the rotoco secified

    +. isays er9rotoco statistics!CP !C09D7 Practice +*am # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 70"ns#er! %QUESTIO O! '7You wish to increase the security of your Windows 2003 system by modifying TCP/IP intheRegistry. To ater how Windows reacts to !Y" #ttac$s% which three &aues are ad'usted(

     #. TCP)a*Ports+*hausted,. TCP)a*-afenC. TCP#IIowedConnections. TCP)a*-afenRetried+. TCP#IIowed!essions"ns#er! "$%$&QUESTIO O! '*uring a routine security insection of the cients in your networ$% you find a rogramcaedcgiscan. c on one of the comuters. You in&estigate the fie% reading art of thecontents. @singthe ortion of the rogram shown beow% identify the function of the rogram.TemQ 5 6>+T/cgi9bin/hf -TTP/7.0nn6MTem2Q 5 6>+T/cgi9bin/Count.cgi -TTP/7.0nn6MTem3Q 5 6>+T/cgi9bin/test9cgi -TTP/7.0nn6MTemQ 5 6>+T/cgi9bin/h.cgi -TTP/7.0nn6MTem+T/cgi9bin/hander -TTP/7.0nn6MTem8Q 5 6>+T/cgi9bin/webgais -TTP/7.0nn6MTemDQ 5 6>+T/cgi9bin/websendmai -TTP/7.0nn6M

     #. The rogram is designed to aunch the users emai rogram.,. The rogram is designed to manage the counters on a target web ser&er.C. The rogram is simy od tem fies% and nothing of interest.

  • 8/20/2019 SCP SC0-471.docx

    9/55

    . The rogram is designed to test the functionaity of the cgi emai scrits that areinstaed on theser&er.+. The rogram is a &unerabiity scanner "ns#er! E

    QUESTIO O! '+!CP !C09D7 Practice +*am # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 77You ha&e 'ust finished instaing new ser&ers and cients in your office networ$. # thenew cientmachines are running Windows 2000 Professiona% and the ser&ers are runningWindows !er&er 2003. You are now wor$ing on securing a user authentication reated areas of thesystems.Where is user account information stored% both for the omain and the oca machine(

     #. omain user account information is stored in the #cti&e irectory.

    ,. 1oca user account information is stored in the !#).C. 1oca user account information is stored in the #cti&e irectory.. omain user account information is stored in the !#).+. omain user account information is stored in the )etabase"ns#er! "$%QUESTIO O! 30What tye of ciher is used by an agorithm that encryts data one bit at a time(

     #. 89bit encrytion Ciher ,. ,oc$ Ciher C. !tream Ciher . iffuse Ciher +. !it Ciher "ns#er! CQUESTIO O! 31You ha&e been gi&en the tas$ of writing your organiBations security oicy. uring yourresearchyou find that there are se&era estabished standards for security oicy design. Which of thefoowing are acceted standards(

     #. I! 7DD;;,. ,! 7;DC. I! ;D;. ,! DD;;+. I! 7D;"ns#er! "$&QUESTIO O! 3'!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 72 #s you configure your !u!e 1inu* comuter% you ma$e sure to modify TCP Wraersas reAuired

  • 8/20/2019 SCP SC0-471.docx

    10/55

    by the security oicy. What are two benefits that TCP Wraers ro&ides you with incontroingthe security of the system(

     #. Connection 1ogging,. Password +ncrytion

    C. "etwor$ +ncrytion. "etwor$ #ccess Contro+. !ecure Pac$et +ncasuation"ns#er! "$&QUESTIO O! 33You are discussing the design and infrastructure of the Internet with se&era coeagueswhen adisagreement begins o&er the actua function of the Tier !ystem in the Internet design.What is thefunction of the Tier !ystem in the hysica structure of the Internet(

     #. The Tier !ystem ro&ides the hysica networ$ with communication channes for the

    Internetand &oice/data aications.,. The Tier !ystem ro&ides a nationa interconnection of systems% caed eeringcenters% to the"#Ps.C. The Tier !ystem ro&ides for a ayered/hierarchica connection system of I!Psconnecting tothe bac$bone.. The Tier !ystem ro&ides for a connection oint between an I!P and the bac$boneof theInternet.+. The Tier !ystem ro&ides the actua connection oint between a oca user and theInternet."ns#er! CQUESTIO O! 34Which of the foowing answers is the word !+C@RITY after ha&ing been encrytedusing thefoowing Poybius Ciher shown in the figure(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 73 #. 2O0,. 3

  • 8/20/2019 SCP SC0-471.docx

    11/55

    C. 4ie siBe in ,ytes. 4iename+. 4ie access time"ns#er! %$C$EQUESTIO O! 3)

    The Root91e&e "! ser&ers ha&e come under many attac$s o&er the years. ue toattac$s% suchas the o! attac$ on the Root91e&e "! ser&ers in ctober of 2002% which of thefoowingsystems was imemented to increase the security of the "! ser&ers for the Internet(

     #. )uticasting,. @nicastingC. #nycasting. ,roadcasting+. N9Casting"ns#er! C

    QUESTIO O! 37If an attac$er uses a rogram that sends thousands of emai messages to e&ery user ofthenetwor$% some of them with o&er uaranteed 7,. Cient hard dis$s can fi to caacityC. !er&er can cometey crash. "etwor$ bandwidth can be used u+. Cients cannot recei&e new emai messages"ns#er! "$CQUESTIO O! 3*The test.doc fie on your 1inu* system that needs the ownershi changed. You wish toha&e thenew owner of the fie to be &=finance. Which of the foowing is the command tochangeownershi to the &=finance user account(

     #. ch=own &=finance test=doc,. chown &=finance test.docC. chown test/doc &=finance. chown &=finance test/doc+. ch=own &=financetest.doc"ns#er! %QUESTIO O! 3+In Windows 2003% there are four methods of imementing IP!ec. They are7 9 ReAuire !ecurity2 9 ReAuest !ecurity

  • 8/20/2019 SCP SC0-471.docx

    12/55

    3 9 Resond ny 9 "o IP!ec PoicyYour networ$ hosts many ser&ers% and different security oicies are in ace in differentocationsin the networ$. The Cients and !er&ers in your networ$ are configured as foows

    9You ha&e ser&ers numbered 79;% which ha&e a oicy stating they reAuire no networ$trafficsecurity.9You ha&e ser&ers numbered 7097;% which ha&e a oicy stating they are not reAuired tobesecure% but wi encryt networ$ traffic if the cient is abe to recei&e it.9You ha&e ser&ers numbered 2092;% which ha&e a oicy stating they are reAuired to besecureand a networ$ traffic they dei&er must be secured. 9You ha&e cients numbered 809D;that arereAuired to access secure ser&ers 2092;.

    9You ha&e cients numbered O09;; that are not reAuired to access secure ser&ers 2092;%but arereAuired to access ser&ers 79; and 7097;.!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 7<,ased on the Cient and !er&er configuration ro&ided abo&e% which of the foowingcomutersmust imement IP!ec method 3(

     #. Comuters numbered 79;,. Comuters numbered 7097;C. Comuters numbered 2092;. Comuters numbered 809D;+. Comuters numbered O09;0"ns#er! &QUESTIO O! 40You ha&e 'ust become the senior security rofessiona in your office. #fter you ha&eta$en acomete in&entory of the networ$ and resources% you begin to wor$ on anning for asuccessfusecurity imementation in the networ$. You are aware of the many toos ro&ided forsecuringWindows 2003 machines in your networ$. What is the function of The !ecurityConfiguration and

     #naysis sna9in( #. This too is used to manage the "T4! security ermissions on ob'ects in the domain.,. This too is used to create an initia security database for the domain.C. This too is used to anayBe a arge number of comuters in a domain9basedinfrastructure.. This too ro&ides an anaysis of the oca system security configuration.

  • 8/20/2019 SCP SC0-471.docx

    13/55

    +. This too ro&ides a singe oint of management where security otions can beaied to aoca comuter or can be imorted to a >P."ns#er! &QUESTIO O! 41

    Which crytograhic rocess too$ ad&antage of a hysica machine using rotors( #. Ri'ndae,. 4eisteC. +nigma. Jinge+. Poybius"ns#er! C!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 78QUESTIO O! 4'n your Windows 2003 system% you want to contro inbound access to &arious orts.

    What featureof Windows 2003 wi aow you to do this( #. atagram 4itering,. IP!ecC. +4!. TCP/IP 4itering+. !ession )anagement"ns#er! &QUESTIO O! 43ften times attac$ers wi run scans against the networ$ to identify different networ$ andoeratingsystems% and resources that are a&aiabe. If an attac$er runs scans on the networ$% andyou areogging the connections% which of the foowing reresent the egitimate combination ofac$etsthat wi be sent between the attac$er and target(

     #. #ttac$er P!-94I" !can% Target R!T94I" Resonse,. #ttac$er #CH !can% Target "@11 ResonseC. #ttac$er "@11 !can% Target R!T Resonse. #ttac$er !Y" !can% Target "@11 Resonse+. #ttac$er 4I" !can% Target R!T Resonse"ns#er! C$EQUESTIO O! 44You are configuring the security of a ser&ice using Ninetd. You wish to add a ine to theconfiguration of the ser&ice that imits the number of simutaneous connections to aser&ice at

  • 8/20/2019 SCP SC0-471.docx

    14/55

    ,. conn=

  • 8/20/2019 SCP SC0-471.docx

    15/55

     #s you configure your !u!e 1inu* comuter% you ma$e sure to modify TCP Wraersas reAuiredby the security oicy. What are two benefits that TCP Wraers ro&ides you with incontroingthe security of the system(

     #. Connection 1ogging,. Password +ncrytionC. "etwor$ +ncrytion. "etwor$ #ccess Contro+. !ecure Pac$et +ncasuation"ns#er! "$&QUESTIO O! 4+)icrosoft has de&eoed se&era security toos to he you with the security andconfiguration of the systems in your networ$. ne of these toos is the )icrosoft !ecurity ,aseine

     #nayBer 

    F),!#G. In the command ine otions of the ),!# is the -4"etCh$ too. What is thefunction of the -4"etCh$ too% a&aiabe with ),!#(

     #. To chec$ for the current -otfi*es that area&aiabe from )icrosoft,. It is an ugrade to the Windows @date too for chec$ing on a udatesC. It is the too that must be run rior to instaing II! 8.0. It is the too that chec$s the networ$ configuration of a web ser&ers+. To record what -otfi*es and ser&ice ac$s are running on the Windows machine"ns#er! EQUESTIO O! (0Which of the foowing ieces of information are found in the Inode% on a 1inu* system(

     #. irectory 1ocation,. 4ie ownershi informationC. 4ie siBe in ,ytes. 4iename+. 4ie access time!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 7;"ns#er! %$C$EQUESTIO O! (1You are configuring the ines that contro access to e*orted ob'ects on your ser&errunning "4!.If you ha&e a directory caed / Tech and you wish to e*ort this directory to networ$7;2.78O.20.0/2% aowing root access% and the ermissions of read and write% which ofthefoowing ines wi accomish this(

     #. FRWGno=root=sAuash /Tech 7;2.78O.20.0/2,. /Tech 7;2.78O.20.0/2 FrwG no=root=sAuashC. FRWGno=root=sAuash 7;2.78O.20.0/2 /Tech. FRWGno=root=sAuashfTech 7;2.78O.20.0/2

  • 8/20/2019 SCP SC0-471.docx

    16/55

    +. /Tech 7;2.78O.20.0/2FrwG no=root=sAuash"ns#er! EQUESTIO O! ('4rom the foowing ist% chose the rimary reason for sitting a !ecurity Poicy intomutie smaer 

    oicies( #. !maer oicies are cheaer to roduce,. !maer oicies are simer to manageC. !maer oicies are simer to roduce. !maer oicies are more egay binding+. !maer oicies ro&ide better security contro"ns#er! %QUESTIO O! (3n your Windows 2003 system% you want to contro inbound access to &arious orts.What featureof Windows 2003 wi aow you to do this(

     #. atagram 4itering,. IP!ecC. +4!. TCP/IP 4itering+. !ession )anagement!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 20"ns#er! &QUESTIO O! (4When using the 3+! encrytion FC 5 + H7 H2 + H7 PQQQG% what is the function ofC(

     #. C is the te*t before encrytion,. C is the first encrytion $eyC. C is the second encrytion $ey. C is the decrytion $ey+. C is the te*t after encrytion"ns#er! EQUESTIO O! ((You ha&e a fie on your @nu* system% and you need to modify the fies ermissions. Theermissions you wish to ay are Read and Write for the @serM Read and Write for the>rouand Read for the thers. What command wi aow you to achie&e this(

     #. chmod 880 test=fie.tar.gB,. chmod D80 test=fie.tar.gBC. chmod 80 test=fie.tar.gB. chmod D0 test=fie.tar.gB+. chmod 88 test=fie.tar. gB"ns#er! EQUESTIO O! ()In Windows !er&er 2003% there are four methods of imementing IP!ec. They are

  • 8/20/2019 SCP SC0-471.docx

    17/55

    7 9 ReAuire !ecurity2 9 ReAuest !ecurity3 9 Resond ny 9 "o IP!ec PoicyYour networ$ hosts many ser&ers% and different security oicies are in ace in different

    ocationsin the networ$. The Cients and !er&ers in your networ$ are configured as foows9You ha&e ser&ers numbered 79;% which ha&e a oicy stating they reAuire no networ$traffic!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 27security.9You ha&e ser&ers numbered 7097;% which ha&e a oicy stating they are not reAuired tobesecure% but wi encryt networ$ traffic if the cient is abe to recei&e it.9You ha&e ser&ers numbered 2092;% which ha&e a oicy stating they are reAuired to be

    secureand a networ$ traffic they dei&er must be secured. 9You ha&e cients numbered 809D;that arereAuired to access secure ser&ers 2092;.9You ha&e cients numbered O09;; that are not reAuired to access secure ser&ers 2092;%but arereAuired to access ser&ers 79; and 7097;.,ased on the Cient and !er&er configuration ro&ided abo&e% which of the foowingcomuterswi imement IP!ec method (

     #. Comuters numbered 79;,. Comuters numbered 7097;C. Comuters numbered 2092;. Comuters numbered 809D;+. Comuters numbered O09;;"ns#er! "$EQUESTIO O! (7You ha&e recenty introduced the users of your Windows 2003 omain networ$ to +4!%and thecomany oicy indicates that se&era users must ta$e ad&antage of +4! for certainfies. !ince itis new% you are concerned with +4! being imemented in ways not defined in theoicy. Whichuser account is% by defaut% the Reco&ery #gent% that can decryt data if need be(

     #. The user who created the fie,. omain #dministrator C. The user who encryted the fie. #ny Power@ser +. The ,ac$u erator "ns#er! %

  • 8/20/2019 SCP SC0-471.docx

    18/55

    QUESTIO O! (*You ha&e 'ust finished instaing new ser&ers and cients in your office networ$. # thenew cientmachines are running Windows 2000 Professiona% and the ser&ers are runningWindows !er&er 

    2003. You are now wor$ing on securing a user authentication reated areas of thesystems.Where is user account information stored% both for the omain and the oca machine(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 22 #. omain user account information is stored in the #cti&e irectory.,. 1oca user account information is stored in the !#).C. 1oca user account information is stored in the #cti&e irectory.. omain user account information is stored in the !#).+. omain user account information is stored in the )etabase"ns#er! "$%

    QUESTIO O! (+ #s er the guideines in the I! !ecurity Poicy standard% what is the urose of thesection onPhysica and +n&ironmenta !ecurity(

     #. The ob'ecti&es of this section are to a&oid breaches of any crimina or ci&i aw%statutory%reguatory or contractua obigations and of any security reAuirements% and to ensurecomianceof systems with organiBationa security oicies and standards.,. The ob'ecti&es of this section are to re&ent unauthoriBed access% damage andinterference tobusiness remises and informationM to re&ent oss% damage or comromise of assetsandinterrution to business acti&itiesM to re&ent comromise or theft of information andinformationrocessing faciities.C. The ob'ecti&es of this section are to ro&ide management direction and suort forinformationsecurity.. The ob'ecti&es of this section are to maintain aroriate rotection of cororateassets and toensure that information assets recei&e an aroriate e&e of rotection.+. The ob'ecti&es of this section are to contro access to information% to re&entunauthoriBedaccess to information systems% to ensure the rotection of networ$ed ser&ices% and tore&entunauthoriBed comuter access."ns#er! %QUESTIO O! )0

  • 8/20/2019 SCP SC0-471.docx

    19/55

    You wor$ for a medium siBed I!P and there ha&e been se&era attac$s of the "!configurationrecenty. You are articuary concerned with "! !oofing attac$s. You ha&e a fewoder machines that define the storage of Resource Records FRRG based on the TT1 of name

    mainginformation. If an attac$er sends fa$e maing information to the "! !er&er% with ahigh TT1%which tye of "! !oofing is this(

     #. "! !er&er Comromise,. "! Cache PoisoningC. !oofing the "! Resonse!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 23. "! !ource9Router !oof +. IN4R !ource9!oof 

    "ns#er! %QUESTIO O! )1You ha&e a series of new Windows !er&er 2003 systems% incuding 3 new web ser&ersrunning II!8.0. You are concerned about the o&era security of your ser&ers% and are chec$ing with)icrosoftfor any atches or udates that you might need to ay to your systems. Which of thefoowingwoud you ay if you need to imement an udate to fi* a secific robem thataddresses acritica% non9security9reated bug(

     #. Critica @date,. !ecurity @dateC. 4eature Pac$. @date Rou+. )!, @date"ns#er! "QUESTIO O! )'To maintain the security of your networ$ you routiney run se&era chec$s of the networ$andcomuters. ften you use the buit9in toos% such as netstat. If you run the foowingcommand%netstat 9s which of the foowing wi be the resut(

     #. isays a connections and istening orts,. isays +thernet statistics.C. isays addresses and ort numbers in numerica form. !hows connections for the rotoco secified+. isays er9rotoco statistics"ns#er! EQUESTIO O! )3

  • 8/20/2019 SCP SC0-471.docx

    20/55

    When using mutie ahabets% what tye of ciher is being used( #. Poyahabetic Ciher ,. )utieCiher !CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 2

    C. )utiahabetic Ciher . Confusion Ciher +. iffusion Ciher "ns#er! "QUESTIO O! )4Which of the foowing answers is the word !+C@RITY after ha&ing been encrytedusing thefoowing Poybius Ciher shown in the figure(

     #. 2O0,. 3

  • 8/20/2019 SCP SC0-471.docx

    21/55

    +. F2SG mod < 5 7"ns#er! &QUESTIO O! )*You ha&e recenty hired an assistant to he you with managing the security of yournetwor$. You

    are currenty running an a Windows en&ironment% and are describing "T4! ermissionissues.You are using some demonstration fies to he with your discussion. You ha&e two"T4!artitions% C and

     #. The fie wi ha&e the same ermissions as IR2,. The fie ermissions wi remain the sameC. The fie ermissions wi be ost. The fie ermissions wi con&ert to +&eryone 9 4u Contro+. The ermissions wi be set to whate&er the CR+#TR W"+R ermissions are forthe

    artition"ns#er! %!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 28QUESTIO O! )+You are creating a new #uditing and 1ogging oicy for your networ$. n a Windows2003 system%if you wish to audit e&ents i$e access to a fie% foder% or rinter% which of the foowingotionswoud you use(

     #. #udit #ccount 1ogon +&ents,. #udit #ccount )anagementC. #udit 1ogon +&ents. #udit b'ect #ccess+. #udit !ystem +&ents"ns#er! &QUESTIO O! 70You are concerned that emai messages sent to your utoo$ cients coud containcustomiBedand dangerous scriting. What can you do to minimiBe the threat that this secific tyeof emairesents(

     #. Insta and @date #nti9Jirus software,. @date the !ecurity !ettings for the cients at the !)TP !er&er C. isabe the Pre&iew Pane. ,e sure that a forms of scriting are disabed on a cients+. )inimiBe the number of contacts aowed in an address boo$"ns#er! CQUESTIO O! 71

  • 8/20/2019 SCP SC0-471.docx

    22/55

     #s er the guideines in the I! !ecurity Poicy standard% what is the urose of thesection onPhysica and +n&ironmenta !ecurity(

     #. The ob'ecti&es of this section are to a&oid breaches of any crimina or ci&i aw%statutory%

    reguatory or contractua obigations and of any security reAuirements% and to ensurecomianceof systems with organiBationa security oicies and standards.,. The ob'ecti&es of this section are to re&ent unauthoriBed access% damage andinterference tobusiness remises and informationM to re&ent oss% damage or comromise of assetsandinterrution to business acti&itiesM to re&ent comromise or theft of information andinformationrocessing faciities.C. The ob'ecti&es of this section are to ro&ide management direction and suort for

    informationsecurity.!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 2D. The ob'ecti&es of this section are to maintain aroriate rotection of cororateassets and toensure that information assets recei&e an aroriate e&e of rotection.+. The ob'ecti&es of this section are to contro access to information% to re&entunauthoriBedaccess to information systems% to ensure the rotection of networ$ed ser&ices% and tore&entunauthoriBed comuter access."ns#er! %QUESTIO O! 7'You are discussing the design and infrastructure of the Internet with se&era coeagueswhen adisagreement begins o&er the actua function of the "#P in the Internets design. Whatis thefunction of a "#P in the hysica structure of the Internet(

     #. The "#P ro&ides for a ayered connection system of I!Ps connecting to thebac$bone.,. The "#P ro&ides the actua connection oint between a oca user and the Internet.C. The "#P ro&ides the hysica networ$ with communication channes for the Internetand&oice/data aications.. The "#P ro&ides a nationa interconnection of systems% caed eering centers% tothe "!Ps.+. The "#P ro&ides for a connection oint between an I!P and the bac$bone of theInternet."ns#er! E

  • 8/20/2019 SCP SC0-471.docx

    23/55

    QUESTIO O! 73What can be used to remo&e any of the freAuency and statistica reationshi betweenunencryted and encryted te*t( FChoose twoG

     #. +*onentiaism,. ifferentiaism

    C. !uosition. Confusion+. iffusion"ns#er! &$EQUESTIO O! 74You ha&e become the ead security rofessiona for a mid9siBed organiBation. You arecurrentystudying "! issues% and configuration otions. You come across the concets of "!!oofing%and in&estigate more. What is "! !oofing(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 2O #. "! !oofing is when the "! cient submits a fase "! reAuest to the "!ser&er% and the"! ser&er resonds with correct data.,. "! !oofing is the "! cient submits a "! reAuest to the "! ser&er using abogus IPaddress% and the "! ser&er resonds to the incorrect host.C. "! !oofing is when a "! !er&er resonds to an unauthoriBed "! cient%ro&iding thatcient with name resoution.. "! !oofing is when a "! cient is forced to ma$e a "! Auery toan imoster"! ser&er%which send the cient to an imoster resource.+. "!soofing is when a "! ser&er ro&ides name resoution to cients that areocated in adifferent IP subnet than the ser&er itsef."ns#er! &QUESTIO O! 7(You are setting the ermissions on a new fie in 1inu*. What wi be the e&e ofermission gi&en tothe user if you assign an cta &aue of D(

     #. rw9,. r9*C. 999. r9+. rw*"ns#er! EQUESTIO O! 7)Recenty% you ha&e seen an increase in intrusion attemts and in networ$ traffic. Youdecide to

  • 8/20/2019 SCP SC0-471.docx

    24/55

    use !nort to run a ac$et cature and anayBe the traffic that is resent. 1oo$ing at thee*ame%what tye of traffic did !nort cature in this og fie(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 2;

     #. 1inu* Ping Resonse,. 1inu* Ping ReAuestC. Windows 2000 Ping ReAuest. Windows 2000 Ping Resonse+. Windows "T .0 Ping ReAuest"ns#er! %QUESTIO O! 77ne of your users cas to state the their comuter is acting unusua. You go toin&estigate and findthere is an unauthoriBed rogram instaed on this comuter. You e*amine the networ$and find

    that this rogram has reicated itsef to other machines in the networ$% without the inutof theuser. What tye of rogram is in the networ$(

     #. The rogram is a Worm.,. The rogram is a Jirus.C. The rogram is a ,ug.. The rogram is a Tro'an-orse.+. The rogram is a )acro."ns#er! "QUESTIO O! 7*)icrosoft has de&eoed se&era security toos to he you with the security andconfiguration of the systems in your networ$. ne of these toos is the )icrosoft !ecurity ,aseine

     #nayBer F),!#G. In the command ine otions of the ),!# is the -4"etCh$ too. What is thefunction of the -4"etCh$ too% a&aiabe with ),!#(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 30 #. To chec$ for the current -otfi*es that area&aiabe from )icrosoft,. It is an ugrade to the Windows @date too for chec$ing on a udatesC. It is the too that must be run rior to instaing II! 8.0. It is the too that chec$s the networ$ configuration of a web ser&ers+. To record what -otfi*es and ser&ice ac$s are running on the Windows machine"ns#er! EQUESTIO O! 7+Which of the foowing is a boc$ ciher(

     #. +!,. 3+!C. #+!

  • 8/20/2019 SCP SC0-471.docx

    25/55

    . RC+. >1C"ns#er! "$%$CQUESTIO O! *0To manage the ris$ anaysis of your organiBation you must first identify the method of

    anaysis touse. Which of the foowing organiBations defines the current standards of ris$ anaysismethodoogies(

     #. "I!T,. C+RTC. 4 9ICRC. ",!+. "!#"ns#er! "QUESTIO O! *1n your 1inu* comuter you are e*amining the contents of &arious fies to ensure they

    aresecured and contain the designated information. +ntries in the /etc/hosts fie consist ofwhich of the foowing(

     #. The IP address% the host9name and aiases Fif anyG!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 37,. The IP address% subnet mas$% the host9name Fif anyGC. The IP address% subnet mas$% the host9name and aiases Fif anyG. The IP address% subnet mas$% defaut gateway and the host9name+. The IP address% subnet mas$% defaut gateway% the host9name and aiases Fif anyG"ns#er! "QUESTIO O! *'You are concerned that emai messages sent to your utoo$ cients coud containcustomiBedand dangerous scriting. What can you do to minimiBe the threat that this secific tyeof emairesents(

     #. Insta and @date #nti9Jirus software,. @date the !ecurity !ettings for the cients at the !)TP !er&er C. isabe the Pre&iew Pane. ,e sure that a forms of scriting are disabed on a cients+. )inimiBe the number of contacts aowed in an address boo$"ns#er! CQUESTIO O! *3You ha&e a series of new Windows !er&er 2003 systems% incuding 3 new web ser&ersrunning II!8.0. You are concerned about the o&era security of your ser&ers% and are chec$ing with)icrosoft

  • 8/20/2019 SCP SC0-471.docx

    26/55

    for any atches or udates that you might need to ay to your systems. Which of thefoowingwoud you ay if you need to imement an udate based on a critica )icrosoft!ecurity,uetin(

     #. Critica @date,. !ecurity @dateC. 4eature Pac$. @date Rou+. )!, @date"ns#er! %QUESTIO O! *4Which of the foowing eAuation airs show e*ames of an In&erse 4unction(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 32 #. 20S3523 and 2393520

    ,. 702520 and 20/2570C. 20250 and 00.

  • 8/20/2019 SCP SC0-471.docx

    27/55

     #. C is the te*t before encrytion,. C is the first encrytion $eyC. C is the second encrytion $ey. C is the decrytion $ey+. C is the te*t after encrytion

    "ns#er! EQUESTIO O! **+! is often defined as no onger 6secure enough6 to hande high securityreAuirements. Why isthis(

     #. +! is more &unerabe to dictionary attac$s than other agorithms,. +! is more &unerabe to brute9force attac$s than other agorithmsC. +! uses a 329bit $ey ength% which can be crac$ed easiy. +! uses a 89bit $ey% which can be crac$ed easiy+. The +! $ey can be crac$ed in a short time"ns#er! E

    QUESTIO O! *+You ha&e 'ust become the senior security rofessiona in your office. #fter you ha&eta$en acomete in&entory of the networ$ and resources% you begin to wor$ on anning for asuccessfusecurity imementation in the networ$. You are aware of the many toos ro&ided forsecuringWindows 2003 machines in your networ$. What is the function of !ecedit.e*e(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 3 #. This too is used to set the "T4! security ermissions on ob'ects in the domain.,. This too is used to create an initia security database for the domain.C. This too is used to anayBe a arge number of comuters in a domain9basedinfrastructure.. This too ro&ides an anaysis of the oca system "T4! security.+. This too ro&ides a singe oint of management where security otions can beaied to aoca comuter or can be imorted to a >P."ns#er! CQUESTIO O! +0If you wanted to use Pubic Hey crytograhy to encryt data transmissions% which ofthe foowingcihers coud you use(

     #. Trie9+!,. +!C. ,owfish. I+#+. R!#"ns#er! EQUESTIO O! +1

  • 8/20/2019 SCP SC0-471.docx

    28/55

    4rom the answers isted% seect the one that does not reresent a correct NRFe*cusi&e RGoeration

     #. 0 NR 0 5 0,. 0 NR 7 5 7

    C. 7 NR 0 5 7. 7 NR 7 5 0+. 7 NR 7 5 7"ns#er! EQUESTIO O! +'Windows 2003 !er&er can utiiBe many different forms of authentication% from standardasswordsto !mart Cards. What are the ad&antages of using "T1) #uthentication o&er 1)

     #uthentication inWindows(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 3

  • 8/20/2019 SCP SC0-471.docx

    29/55

    . The reair mode ma$es use of the ac$nowedged s$is and abiities of the e*istingersonne.Hnowing that assets ha&e &ery secific doar &aues assigned to them% the choice onhow tomanage the asset is based on the e*erience of the ersonne.

    +. ,efore incurring the cost for reair of an inoerati&e asset% chec$ for maintenanceagreementsthat may incude the cost of reair or the actua reair itsef. "e&ertheess% the reairmode shoudfocus on the restoration of the downed asset to its wor$ing status within the networ$infrastructure.Hee in mind that after hardware costs% costs for the reoading or reacement ofsoftware can bea arge cost factor as we."ns#er! EQUESTIO O! +4

    What tye of ciher is used by an agorithm that encryts data in chun$s of data% 8 bitsat a time( #. 89bit encrytion Ciher ,. ,oc$ Ciher !CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 38C. !tream Ciher . iffuse Ciher +. !it Ciher "ns#er! %QUESTIO O! +(You are creating the Remote #ccess section of your organiBationa security oicy. 4romthefoowing otions% seect the Auestions to use for the formation of this section(

     #. What methods of remote access are aowed Fcabe modem% !1% and so onG(,. -ow are artner JP"s to be configured Fto firewa or hostG(C. Which users are authoriBed to insta networ$ing de&ices into comuters(. What is the rocess for becoming authoriBed for remote access(+. Is the entire networ$ accessibe remotey("ns#er! "$&$EQUESTIO O! +)uring the configuration of your 1inu* system% you are wor$ing with the a&aiabe dri&esin thecomuter. What synta* defines the 4irst FPrimaryG I+ hard dis$ dri&e(

     #. /de&/sda,. /de&/fdaC. /de&/hd. /de&/hda+. /de&/fd"ns#er! &

  • 8/20/2019 SCP SC0-471.docx

    30/55

    QUESTIO O! +7You are setting the ermissions on a new fie in 1inu*. What wi be the e&e ofermission gi&en tothe user if you assign an cta &aue of 8(

     #. rw*

    ,. rw9C. r99. r9*e. 999!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 3D"ns#er! %QUESTIO O! +*You are wor$ing on the configuration of the authentication systems used in yournetwor$% and areconsidering se&era different authentication methods for your comuter systems. What

    do 1)%"T1)% and "T1)&2 use as their #uthentication method( #. Chaenge/Resonse,. Pubic Hey CrytograhyC. Pri&ate Hey Crytograhy. Pri&ate Certificates+. Pubic Certificates"ns#er! "QUESTIO O! ++You wor$ for a medium siBed I!P and there ha&e been se&era attac$s of the "!configurationrecenty. You are articuary concerned with "! !oofing and other "! attac$s. If anattac$er is abe to ta$e ad&antage of a ,I" &unerabiity to gain root access% this is which tyeof "!

     #ttac$( #. "! !er&er Comromise,. "! Cache PoisoningC. !oofing the "! Resonse. "! !ource9Router !oof +. IN4R !ource9!oof "ns#er! "QUESTIO O! 100You are re&iewing the ines used in the configuration of TCP Wraers on your 1inu*system.When aced in the denia fie% what is the function of the foowing ine(in.tenetd 7;2.78O.23. sawn F/bin/echo Uc ::/&ar/og/tenet.ogG

     #. This ine wi initiate a Tenet connection to the 7;2.78O.23.0/2 networ$.,. This ine wi write a og ine to the /bin/echo directory when a host tries to use Tenetto connect

  • 8/20/2019 SCP SC0-471.docx

    31/55

    to the 7;2.78O.23.0/2 networ$.!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 3OC. This ine wi initiate an IC)P echo reAuest when a host from the 7;2.78O.23.0/2networ$ uses

    Tenet.. This ine wi write a og ine that contains cient information when a host from the7;2.78O.23.0/2 networ$ attemts to use Tenet.+. This ine wi write a og ine to the /&ar/og directory when a host tries to use Tenet toconnectto the 7;2.78O.23.0/2 networ$."ns#er! &QUESTIO O! 101When a crytanayst is using inguistic atterns to decryt ciherte*t% what is the anaystdoing(

     #. #nayBing the freAuency of etters

    ,. #nayBing the degree of the ettersC. #nayBing the Caesar !hift. #nayBing the Transosition Ciher +. #nayBing the !ubstitution Ciher "ns#er! "QUESTIO O! 10'You are creating the @ser #ccount section of your organiBationa security oicy. 4romthefoowing otions% seect the Auestions to use for the formation of this section(

     #. #re users aowedto ma$e coies of any oerating system fies Fincuding% but notimited to/etc/asswd or the !#)G(,. Who in the organiBation has the right to aro&e the reAuest for new user accounts(C. #re users aowedto ha&e mutie accounts on a comuter(. #re users aowed to share their user account with cowor$ers(+. #re users reAuiredto use assword9rotected screensa&ers(4. #re users aowed to modify fies they do not own% but ha&e write abiities("ns#er! %$C$&QUESTIO O! 103uring a one wee$ in&estigation into the security of your networ$ you wor$ onidentifying theinformation that is ea$ed to the Internet% either directy or indirecty. ne thing youdecide toe&auate is the information stored in the Whois oo$u of your organiBationa website. f thefoowing% what ieces o information can be identified &ia this method(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 3; #. Registrar ,. )aiing #ddress

  • 8/20/2019 SCP SC0-471.docx

    32/55

    C. Contact "ame. Record @date+. "etwor$ #ddresses FPri&ateG"ns#er! "$%$C$&QUESTIO O! 104

    You are configuring TCP Wraers on your 1inu* system. What are the twoconfiguration fies thatare used by TCP Wraers to ro&ide contro(

     #. /etc/hosts.aow,. /etc/hosts.denyC. /etc/tcwraers/inbound/conf.d. /etc/tcwraers/outbound/conf.d+. /etc/hosts/aow4. /etc/hosts/deny"ns#er! "$%QUESTIO O! 10(

    Which of the foowing best describes the Reair )ode( #. The mode ma$es use of re&enti&e measures and reguar ser&ice as we asudates such as!er&ice Pac$s% maintenance udates% and atches. Pre&enti&e measures can asoimro&e thechances of the reair mode wor$ing better than if the system had no re&enti&emeasures e&er ta$en.,. The reair mode is the transference of ris$ to an insurance comany that co&ers thecosts of reacing the critica assets within your networ$. The drawbac$s are increase inremiums after ma$ing a caim% high remiums anyway% down time whie the insurance comany isrocessing thecaim% and caim may not ay what reacement costs are today.C. #ssets wi tyicay cost much more than the origina caita outay that it too$ tourchase itong ago. Reair costs can be &ery high and a decision to e*ercise this mode shoudnot be madein haste. There are aso dereciation issues to dea with as we. In any case% this modeshoud bethe ast resort because of cost and may be the most time consuming.. The reair mode ma$es use of the ac$nowedged s$is and abiities of the e*istingersonne.Hnowing that assets ha&e &ery secific doar &aues assigned to them% the choice onhow tomanage the asset is based on the e*erience of the ersonne.!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 0

  • 8/20/2019 SCP SC0-471.docx

    33/55

    +. ,efore incurring the cost for reair of an inoerati&e asset% chec$ for maintenanceagreementsthat may incude the cost of reair or the actua reair itsef. "e&ertheess% the reairmode shoudfocus on the restoration of the downed asset to its wor$ing status within the networ$

    infrastructure.Hee in mind that after hardware costs% costs for the reoading or reacement ofsoftware can bea arge cost factor as we."ns#er! EQUESTIO O! 10)ne of your users cas to state that their comuter is acting unusua. You go toin&estigate andfind there is an unauthoriBed rogram instaed on this comuter. You e*amine thenetwor$ andfind that this rogram is now on other machines in the networ$. It seems to be unabe to

    mo&ethrough the networ$ on its own% and is getting sent as an emai attachment. What tyeof rogramis in the networ$(

     #. The rogram is a Worm.,. The rogram is a Jirus.C. The rogram is a Port scanner.. The rogram is a Tro'an -orse.+. The rogram is a )acro."ns#er! %QUESTIO O! 107You are creating a new #uditing and 1ogging oicy for your networ$. n a Windows2003 system%if you wish to audit e&ents i$e the comuter restarting% which of the foowing otionswoud youuse(

     #. #udit #ccount 1ogon +&ents,. #udit #ccount )anagementC. #udit 1ogon +&ents. #udit b'ect #ccess+. #udit !ystem +&ents"ns#er! EQUESTIO O! 10*If you had a ciher that used a uniAue $ey e&ery time you encoded te*t% what woud yoube using(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 7 #. # boc$ ciher ,. # ne9time adC. # stream ciher 

  • 8/20/2019 SCP SC0-471.docx

    34/55

    . #n asymmetric ciher +. # symmetric ciher "ns#er! %QUESTIO O! 10+Recenty% you ha&e seen an increase in intrusion attemts and in networ$ traffic. You

    decide touse !nort to run a ac$et cature and anayBe the traffic that is resent. 1oo$ing at thee*ame%what tye of traffic did !nort cature in this og fie(

     #. "ma !Y"/4I" !can,. "ma "@11 !canC. "ma #CH !can. "ma !Y" !can+. "ma N)#! !can"ns#er! &QUESTIO O! 110

    Which of the foowing are asymmetric encrytion agorithms( #. )<!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 2,. R!#C. iffie9-eman. 3+!+. #+!"ns#er! %$CQUESTIO O! 111

     #fter a security meeting% IT eaders decided that the organiBation wi erform acometey newris$ anaysis% as the re&ious one was done o&er fi&e years ago. The methods that wibe used is4R#P. Which of the foowing best describes the 4R#P method of ris$ anaysis(

     #. 4R#P in&o&es assigning team members to identify secific &unerabiities. nce the&unerabiities ha&e been identified% a e&e of ris$ is assigned% as a factor of times eryear this&unerabiity may be e*oited. 4inay% a doar &aue in ost re&enue is assigned to eachasset thatcan be comromised by this &unerabiity.,. 4R#P is a team method. Indi&iduas from different asects of an organiBation form acommittee.nce together% they discuss the areas of ris$% the i$eihood of a threat% the imact of thethreat%and the methods that shoud be used to minimiBe the threat.C. 4R#P in&o&es assigning doar &aues to assets% and cacuating how often a threatto the assetwi occur. nce determined an aro*imate doar &aue to each asset and threatcombination is

  • 8/20/2019 SCP SC0-471.docx

    35/55

    cacuated.. 4R#P is the rocess of determining the i$eihood of a threat as medium% high% or ow.nce thei$eihood is determined the cost is identified% again as medium% high% or ow. 4inay%based on

    cost% a resonse to the threat is determined.+. 4R#P is the rocess of determining the i$eihood of a threat as medium% high% or ow.nce thei$eihood is determined% the e&e of damage is identified% again as high% medium% orow. 4inay%the resonse to the threat is determined."ns#er! %QUESTIO O! 11'What tye of ciher is used by an agorithm that encryts data in chun$s of data% 8 bitsat a time(

     #. 89bit encrytion Ciher 

    ,. ,oc$ Ciher C. !tream Ciher . iffuse Ciher +. !it Ciher !CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 3"ns#er! %QUESTIO O! 113The security oicy of your organiBation defines what data is to be ocay encryted andwhat isnot to be. You are running Windows !er&er 2003% which aows for oca encrytion% andyou ha&edata that has been secured. Which of the foowing is the correct command fordecryting asubfoder named 6)arch6 under a foder named 64inancias6(

     #. decryt 4inancias/)arch,. ciher /d 4inancias/)archC. ciher /d 4inancias)arch. decryt4inancias)arch+. ciher /d UsysrootU/4inancias)arch"ns#er! CQUESTIO O! 114To increase the security of your cororate website% you are running some basic chec$son ea$edinformation. You &iew the source code for a web age and see the foowinghtm:head:meta htt9eAui&56Content9Tye6 content56te*t/htmM charset5windows972+"+R#TR6 content564rontPage .06:meta name56Progd6 content56+ditor.ocument6:

  • 8/20/2019 SCP SC0-471.docx

    36/55

    tite:!ecurity Certifications for the IT Pro/tite:stye tye56te*t/css6:V9P% T% 1I% T- font9siBe tM font9famiy #ria% Jerdana% -e&etica X.eight font9siBe OtX

    99:/stye:/head:4rom this code% which of the foowing woud an attac$er most i$ey assume is theoeratingsystem that was used to create this web site(

     #. en,!,. 4ree,!!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed C. 1inu*

  • 8/20/2019 SCP SC0-471.docx

    37/55

    QUESTIO O! 117You wish to add a new user to your 1inu* system. The user account is caed 1n*=%theasswordis ?W3RTY% and the grou is @sers. What is the correct command to add this useraccount(

     #. useradd 9g @sers 1n*=!CP !C09D7 Practice +*am # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed <,. useradd 1n*= Sgr @sersC. useradd 1n*= Sg @sers. adduser g/@sers u/1n*=+. adduser g/@sers 9act 1n*="ns#er! "QUESTIO O! 11*Recenty% you ha&e seen an increase in intrusion attemts and in networ$ traffic. Youdecide to

    use !nort to run a ac$et cature and anayBe the traffic that is resent. 1oo$ing at thee*ame%what tye of traffic did !nort cature in this og fie(

     #. Windows 2000 Ping ReAuest,. Windows "T .0 Ping ReAuestC. 1inu* Ping ReAuest. 1inu* Ping Resonse+. Windows "T .0 Ping Resonse"ns#er! %QUESTIO O! 11+You are wor$ing on the authentication systems in your networ$% and are concerned withyour egacy systems. In Windows "T .0% before !er&ice Pac$ F!PG% there were ony twosuortedmethods of authentication. What were those two methods(

     #. "et,I!,. 1)C. "T1). "T1)&2!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 8+. Herberos"ns#er! %$CQUESTIO O! 1'0To increase the security of your cororate website% you are running some basic chec$son ea$edinformation. You &iew the source code for a web age and see the foowinghtm:head:meta htt9eAui&56Content9Tye6 content56te*t/htmM charset5windows972

  • 8/20/2019 SCP SC0-471.docx

    38/55

    meta name56>+"+R#TR6 content564rontPage .06:meta name56Progd6 content56+ditor.ocument6:tite:!ecurity Certifications for the IT Pro/tite:stye tye56te*t/css6:V9

    P% T% 1I% T- font9siBe tM font9famiy #ria% Jerdana% -e&etica X.eight font9siBe OtX99:/stye:/head:4rom this code% which of the foowing woud an attac$er most i$ey assume is theoeratingsystem that was used to create this web site(

     #. en,!,. 4ree,!C. 1inu*

  • 8/20/2019 SCP SC0-471.docx

    39/55

    C. Configuring the roerties of the RPC !er&ice Fas Tenet !er&ice is deendent onRPCG toaow ony a grou of users to access the ser&ice.. Configuring the roerties of the RPC 1ocator !er&ice Fas Tenet !er&ice isdeendent on

    RPCG to aow ony a grou of users to access the ser&ice.+. Creating a hardware rofie and configuring the Tenet !er&ice to start ony when thishardwarerofie is chosen uon ogin."ns#er! "QUESTIO O! 1'3Your organiBation assigns an #nnua 1oss +*ectancy to assets during a ris$ anaysismeeting.You ha&e a ser&er which if down for a day wi ose the comany L3

  • 8/20/2019 SCP SC0-471.docx

    40/55

    ,. The IP address% subnet mas$% the host9name Fif anyGC. The IP address% subnet mas$% the host9name and aiases Fif anyG. The IP address% subnet mas$% defaut gateway and the host9name+. The IP address% subnet mas$% defaut gateway% the host9name and aiases Fif anyG"ns#er! "

    QUESTIO O! 1')What is the name of the informationa age that is ree&ant to a articuar command in1inu*(

     #. Readme Page,. 1n*=nfo PageC. )an Page. N=Win Page+. Cmd=oc Page"ns#er! CQUESTIO O! 1'7!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed ;When erforming cryanaysis. often the anayst wi use inguistic atterns. What is adigram(

     #. # two9etter word,. Two etters that are ne*t to each other in ahabetic order C. # two9etter combination. Two etters whose etter ace in the ahabet add u to an e&en &aue+. # three9etter combination"ns#er! CQUESTIO O! 1'*You are showing a coeague some of the commands a&aiabe in 1inu*% and you tyeteinit 8 whatis the resut of tying this command(

     #. This runs the tenet ser&ice with a riority e&e of 8.,. This configures the system to use singe9user mode.C. This hats the system.. This restarts the system.+. This interruts the tenet ser&ice on soc$et 8."ns#er! &QUESTIO O! 1'+What tye of crytograhic system is reresented in this image(

     #. Caesar !CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed

  • 8/20/2019 SCP SC0-471.docx

    41/55

    It has come to your attention that some machine has tried to send a ac$et to your "!ser&er containing both a "! Auery and an answer that is fase. What tye of attac$ was usedagainstyour networ$(

     #. "! o&erfow,. "! oisoning through seAuence redictionC. !tatd o&erfow. "! cache oisoning+. "! arse corrution"ns#er! &QUESTIO O! 131Which of the foowing fieds are found in a user accounts ine in the /etc/shadow fie(

     #. The @ser Identifier assigned to the user account,. The home directory used by the user accountC. The hashed &ersion of the user accounts assword

    . The number of days since the user account assword was changed+. The number of days unti the user accounts assword must change"ns#er! C$&$EQUESTIO O! 13'You are e*amining the +&ent Is in your Windows 2003 networ$. There ha&e been aargenumber of faied attemts at ogon in the networ$. What is the +&ent I for a faiedattemt at1ogon due to an account being disabed(

     #. 70D,. 230!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed

  • 8/20/2019 SCP SC0-471.docx

    42/55

    +. # the Windows 2003 domain controers maintain a coy of the "! database."ns#er! EQUESTIO O! 134Your networ$ has been hit by a &irus that is infecting the ),R on many of the systemsin the

    networ$. You are wor$ing to reair the damage this &irus has done. #fter two days ofnon9stowor$ on the robem% you get things under contro. What tye of &irus was in yournetwor$(

     #. )acro Jirus,. !criting JirusC. ,oot !ector Jirus. )uti9art Jirus+. 4ie Infection Jirus"ns#er! CQUESTIO O! 13(

    In order to run some tests on your system% you ha&e decided to use the netcat utiity.You want tobe abe to access the command romt on a Windows system from your 1inu* system.What isthe roer command on the Windows system to aow for you to gain remote access(!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed

  • 8/20/2019 SCP SC0-471.docx

    43/55

    !tates +*ort Restrictions are not met% what mode wi "T1)&2 be instaed in( #.

  • 8/20/2019 SCP SC0-471.docx

    44/55

    resistance% you describe the many benefits to ha&ing a security oicy. Which of thefoowing arethe benefits of a security oicy(

     #. -e to re&ent misuse of resources,. -e to decrease the ega iabiity

    C. -e to rotect rorietary information. -e to ower bandwidth usage+. -e rotect data from unauthoriBed access"ns#er! "$%$C$E!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed

  • 8/20/2019 SCP SC0-471.docx

    45/55

     #ttac$ers ha&e the abiity to use rograms that are abe to re&ea oca asswords byacing some$ind of a ointer/cursor o&er the asteris$s in a rograms assword fied. The reasonthat suchtoos can unco&er asswords in some erating !ystems is because

     #. the asswords are simy mas$ed with asteris$s,. the etc/asswd fie is on a 4#T32 artitionC. the asswords are decryted on screen. the assword te*t is stored in #!CII format+. the etc/asswd fie is on a 4#T78 artition"ns#er! "QUESTIO O! 144When using -% what $eys wi ,ob use to send an encryted message to #ice(

     #. #ice Pubic Hey,. #ice Pri&ate HeyC. The !ession Hey

    . ,ob Pubic Hey+. ,ob Pri&ate Hey"ns#er! "$C$EQUESTIO O! 14(You ha&e recenty hired an assistant to he you with managing the security of yournetwor$. Youare currenty running an a Windows en&ironment% and are describing "T4! ermissionissues.You are using some demonstration fies to he with your discussion. You ha&e two"T4!artitions% C and

     #. The fie wi ha&e the same ermissions as IR2,. The fie ermissions wi remain the sameC. The fie ermissions wi be ost. The fie ermissions wi con&ert to +&eryone 9 4u Contro+. The ermissions wi be set to whate&er the CR+#TR W"+R ermissions are forthe artition"ns#er! %!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed

  • 8/20/2019 SCP SC0-471.docx

    46/55

    . # )acro #ttac$+. # Tro'an #ttac$"ns#er! "QUESTIO O! 147To maintain the security of your networ$ you routiney run se&era chec$s of the networ$

    andcomuters. ften you use the buit9in toos% such as netstat. If you run the foowingcommand%netstat 9s which of the foowing wi be the resut(

     #. isays a connections and istening orts,. isays +thernet statistics.C. isays addresses and ort numbers in numerica form. !hows connections for the rotoco secified+. isays er9rotoco statistics"ns#er! EQUESTIO O! 14*

    You are running a comuter that boots to mutie oerating systems on mutieartitions andwish to use Windows 2003 data encrytion to rotect your fies. Which of the foowingotions wiWindows 2003s +4! erform(

     #. #ows you to encryt a fie as we as the fie name% so no one other than you or thereco&eryagent can see the e*istence of the fie.,. #ows you to encryt a foder as we as the foder name% so no one other than you or thereco&ery agent can see the e*istence of the foder.C. #ows you to encryt a fie ony if the foder it is in aows encrytion.. #ows you to encryt a foder but not the foder nameM howe&er% the foder itsef is notencryted. ny the fies within the foder are encryted.+. #ows you to encryt a fie but not the fie nameM users with access to the foder thatthe fie isin are not rohibited from &iewing the e*istence of a fie.!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed

  • 8/20/2019 SCP SC0-471.docx

    47/55

    Recenty% you ha&e seen an increase in intrusion attemts and in networ$ traffic. Youdecide touse !nort to run a ac$et cature and anayBe the traffic that is resent. 1oo$ing at thee*ame%what tye of traffic did !nort cature in this og fie(

     #. 1inu* Ping Rey,. Windows 2000 Ping ReyC. Windows "T .0 Ping ReAuest. 1inu* Ping ReAuest+. Windows 2000 Ping ReAuest!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed

  • 8/20/2019 SCP SC0-471.docx

    48/55

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed

  • 8/20/2019 SCP SC0-471.docx

    49/55

    oicies( #. !maer oicies are cheaer to roduce,. !maer oicies are simer to manageC. !maer oicies are simer to roduce. !maer oicies are more egay binding

    +. !maer oicies ro&ide better security contro"ns#er! %QUESTIO O! 1(*You are re&iewing the ines used in the configuration of TCP Wraers on your 1inu*system.When aced in the denia fie% what is the function of the foowing ine(in.tenetd 7;2.78O.23. sawn F/bin/echo Uc ::/&ar/og/tenet.ogG

     #. This ine wi initiate a Tenet connection to the 7;2.78O.23.0/2 networ$.,. This ine wi write a og ine to the /bin/echo directory when a host tries to use Tenetto connectto the 7;2.78O.23.0/2 networ$.

    C. This ine wi initiate an IC)P echo reAuest when a host from the 7;2.78O.23.0/2networ$ usesTenet.. This ine wi write a og ine that contains cient information when a host from the7;2.78O.23.0/2 networ$ attemts to use Tenet.+. This ine wi write a og ine to the /&ar/og directory when a host tries to use Tenet toconnectto the 7;2.78O.23.0/2 networ$."ns#er! &QUESTIO O! 1(+You are configuring the security of a ser&ice using Ninetd. You wish to add a ine to theconfiguration of the ser&ice that grants access during the hours of 8#) to DP). Whichof thefoowing ines wi you need to add to the configuration to achie&e this resut(

     #. access=from 5 800 9 7;00!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 87,. access=times 5 8#)DP)C. access=from 5 8#)DP). access=times 5 8009:7;00+. access=times 5 800 9 7;00"ns#er! EQUESTIO O! 1)0There are se&era cients of your networ$ that reAuire the abiity to connect remotey.You areusing Internet #uthentication !er&ices FI#!G in Windows !er&er 2003 for security. Whatis I#! theWindows imementation of(

     #. )<,. +!

  • 8/20/2019 SCP SC0-471.docx

    50/55

    C. R!#. PHI+. R#I@!"ns#er! EQUESTIO O! 1)1

    If you had a ciher that used a uniAue $ey e&ery time you encoded te*t% what woud yoube using( #. # boc$ ciher ,. # ne9time adC. # stream ciher . #n asymmetric ciher +. # symmetric ciher "ns#er! %QUESTIO O! 1)'n your 1inu* comuter you are e*amining the contents of &arious fies to ensure theyare

    secured and contain the designated information. +ntries in the /etc/hosts fie consist ofwhich of the foowing(

     #. The IP address% the host9name and aiases Fif anyG,. The IP address% subnet mas$% the host9name Fif anyG!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 82C. The IP address% subnet mas$% the host9name and aiases Fif anyG. The IP address% subnet mas$% defaut gateway and the host9name+. The IP address% subnet mas$% defaut gateway% the host9name and aiases Fif anyG"ns#er! "QUESTIO O! 1)3When a comuter reAuires an inut &aue to begin the crytograhic rocess% what isthis &auecaed(

     #. 47 Jaue,. +ntroic JaueC. R"> Jaue. PR"> Jaue+. !eed Jaue"ns#er! EQUESTIO O! 1)4Recenty% you ha&e seen an increase in intrusion attemts and in networ$ traffic. Youdecide touse !nort to run a ac$et cature and anayBe the traffic that is resent. 1oo$ing at thee*ame%what tye of traffic did !nort cature in this og fie(

     #. "ma!Y"/4I" !can,. "ma #CH !can!CP !C09D7 Practice +*am

  • 8/20/2019 SCP SC0-471.docx

    51/55

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 83C. "ma "@11 !can. "ma N)#! !can+. "ma !Y" !can"ns#er! C

    QUESTIO O! 1)(uring a one wee$ in&estigation into the security of your networ$ you wor$ onidentifying theinformation that is ea$ed to the Internet% either directy or indirecty. ne thing youdecide toe&auate is the information stored in the Whois oo$u of your organiBationa website. f thefoowing% what ieces o information can be identified &ia this method(

     #. Registrar ,. )aiing #ddressC. Contact "ame

    . Record @date+. "etwor$ #ddresses FPri&ateG"ns#er! "$%$C$&QUESTIO O! 1))uring a discussion of asset cassification and rotection with a cowor$er% you reaiBethat your cowor$er does not $now the basic concets of asset rotection. You are as$ed todescribe thetyes of asset rotection. Which of the foowing describes the concet of feasiberotection of anasset(

     #. The cost to reace the asset is greater than the cost of reco&ery of the asset.,. The cost to reace the asset is ess than the cost of rotect the asset.C. The cost to rotect the asset is greater than the cost of reco&ery of the asset.. The cost to reace the asset is ess than the cost of reco&ery of the asset.+. The cost to rotect the asset is ess than the cost of reco&ery of the asset."ns#er! EQUESTIO O! 1)7)ost comanies that do business &ia the Web offer a shoing cart so you can secifya theitems you want before acing the order. Poor shoing cart design% howe&er% can aowa different$ind of hac$. Ta$e a oo$ at the -T)1 code same resented here and determine theine thatresents the &unerabiity!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 84R) #CTI"56htt//70.0.70.238/cgi9bin/orders.6 method56ost6:inuttye5hidden name56rice6 &aue563;.;+T;6:

  • 8/20/2019 SCP SC0-471.docx

    52/55

    ?@#"TITY inut tye5te*t name56Auantity6 siBe52 ma*ength52 &aue5:/4R):

     #. The ine secifying the Per scrit orders.,. The ine secifying inut tye for riceC. The ine secifying inut tye for item number 

    . The ine secifying inut tye for Auantity+. The ine secifying inut tye for item number and Auantity"ns#er! %QUESTIO O! 1)*What can be used to remo&e any of the freAuency and statistica reationshi betweenunencryted and encryted te*t( FChoose twoG

     #. +*onentiaism,. ifferentiaismC. !uosition. Confusion+. iffusion

    "ns#er! &$EQUESTIO O! 1)+Which two of the foowing are factors that must be considered in determining thei$eihood of occurrence during a ris$ anaysis re&iew(

     #. What are the methods a&aiabe to attac$ this asset(,. What are the costs associated with rotecting this asset(C. oes the threat ha&e sufficient caabiity to e*ercise the attac$(. oes the threat ha&e the moti&ation or incenti&e to e*ercise the attac$(+. #re any of the assets worthy of an attac$("ns#er! C$&!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 8<QUESTIO O! 170

     #fter you ha&e configured your new 1inu* fie ser&er% a coeague wishes to chec$ theermissionsettings on some fies. You run the command to &iew the ermissions% and the onscreenresut is9rw*9rw9rw9 7 s=admin root 23< 7023 fieWhich of the foowing are true based on this outut(

     #. The owner has read% write% and e*ecute ermissions,. The grou has read% write% and e*ecute ermissionsC. The others ha&e read% write% and e*ecute ermissions. s=admin is the owner +. root is the grou"ns#er! "$%QUESTIO O! 171Which three of the foowing are e*ames of the reason that )essage #uthentication isneeded(

     #. Pac$et 1oss

  • 8/20/2019 SCP SC0-471.docx

    53/55

    ,. Content )odificationC. )asAuerading. Pubic Hey Registration+. !eAuence )odification"ns#er! %$C$E

    QUESTIO O! 17'Which of the foowing is the name of the #cti&e N authentication system )icrosoft hasincuded tore&ent #cti&e N contros from being atered or corruted by attac$ers wanting toerformunwarranted oerations(

     #. ri&er !igning,. #uthenticodeC. Certificate ser&ices. "T1)+. Herberos

    "ns#er! %!CP !C09D7 Practice +*am # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 88QUESTIO O! 173Whie configuring TCP Wraers on your 1inu* system% you desire to create a ine thatwi effecte&ery oca comuters access to the ft ser&ice. Which of the foowing ines wi achie&ethisdesired resut(

     #. "+TWRHF1C#1G in.ftd,. in.ftd 1C#1C. in.ftd "+TWRH. in.ftd "+TWRHF1C#1G+. 1C#1="+Tin.ftd"ns#er! %QUESTIO O! 174efaut +! imementations use a $ey ength that is how ong(

     #. 702 bits,. D2 bitsC.

  • 8/20/2019 SCP SC0-471.docx

    54/55

     #ache web ser&er( #. "etwor$ !er&ices,. !oftwareC. !ystem. !oftware )anagement

    +. )isceaneous"ns#er! "!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 8DQUESTIO O! 17)You are creating a new #uditing and 1ogging oicy for your networ$. n a Windows2003 system%if you wish to audit e&ents i$e access to a fie% foder% rinter% which of the foowingotions woudyou use(

     #. #udit #ccount 1ogon +&ents

    ,. #udit #ccount )anagementC. #udit 1ogon +&ents. #udit b'ect #ccess+. #udit !ystem +&ents"ns#er! &QUESTIO O! 177You are in the rocess of securing se&era new machine on your Windows 2003networ$. To hewith the rocess )icrosoft has defined a set of !ecurity Temates to use in &arioussituations.Which of the foowing best describes the !ecure !ecurity Temates F!+C@R+. I"4G(

     #. This temate is ro&ided as a way to re&erse the imementation of differentWindows 2000security settings% e*cet for user rights.,. This temate is ro&ided so that 1oca @sers ha&e idea security settings% whiePower @sersha&e settings that are comatibe with "T @sers.C. This temate is ro&ided to imement suggested security settings for a securityareas% e*cetfor the foowing fies% foders% and Registry $eys.. This temate is ro&ided to create the ma*imum e&e of security for networ$ trafficbetweenWindows 2000 cients.+. This temate is ro&ided to aow for an administrator to run egacy aications on aC."ns#er! CQUESTIO O! 17*You ha&e been hired to wor$ in the security di&ision of a goba Tier ne I!P. You ha&ebeen

  • 8/20/2019 SCP SC0-471.docx

    55/55

    gi&en a staff of 2< eoe a new to networ$ security. You wish to bring them a u toseed onthe comonents of the Internet and how they interact. Which one of the foowing is nota ma'or comonent of the Internet(

     #. The ,ac$bone!CP !C09D7 Practice +*am # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 8O,. "#Ps F"etwor$ #ccess PointsGC. I!Ps FInternet !er&ice Pro&idersG. "ICs F"etwor$ Information CentersG+. "!Fomain "ame !er&iceG"ns#er! &QUESTIO O! 17+To maintain the security of your networ$ you routiney run se&era chec$s of the networ$and

    comuters. ften you use the buit9in toos% such as netstat. If you run the foowingcommand%netstat 9s which of the foowing wi be the resut(

     #. isays a connections and istening orts,. isays +thernet statistics.C. isays addresses and ort numbers in numerica form. !hows connections for the rotoco secified+. isays er9rotoco statistics"ns#er! E!CP !C09D7 Practice +*am

     # Comosite !oution With Eust ne Cic$ 9 Certification >uaranteed 8;