PrepAway - Latest Free Exam Questions & Answers

Tag: Exam SCNP

Exam SCNP: SCNP Strategic Infrastructure Security

which of the following would an attacker most likely assume is the operating system that was used to create

To increase the security of your corporate website, you are running some basic checks on leaked
information. You view the source code for a web page and see the following:
<code>
<html>
<head>
<meta http-equiv=”Content-Type” content=”text/html; charset=windows-1252″>
<meta name=”GENERATOR” content=”FrontPage 4.0″>
<meta name=”ProgId” content=”Editor.Document”>
<title>Security Certifications for the IT Pro</title>
<style type=”text/css”>
<!–P, TD, LI, TH { font-size: 10pt; font-family: Arial, Verdana, Helvetica }
.eight { font-size: 8pt }
–>
</style>
</head>
</code>
From this code, which of the following would an attacker most likely assume is the operating

system that was used to create this web site?

What type of information may be found by examining these messages?

You read on a security website that hackers are reading Newsgroup messages to try to identify
potential targets and target details. You had previously not closed the port for the Newsgroup
service on your firewall.
After you close that port, you do an Internet newsgroup search for your domain name. You do find
several messages from users in your organization. What type of information may be found by
examining these messages?

Which of the following are issues you must be sure to address when securing the SAM file?

In your network, you have built a single domain of only Windows computers. There are 55 XP
machines and 10 Windows Server 2003 machines. You are concerned about the security of your
SAM files on the Servers. Windows Server 2003 is the only Operating System on the computers,
and the hard drives are all formatted with NTFS. Which of the following are issues you must be
sure to address when securing the
SAM file?

What type of program is in the network?

One of your users calls to state that their computer is acting unusual. You go to investigate and
find there is an unauthorized program installed on this computer. You examine the network and
find that this program is now on other machines in the network. It seems to be unable to move
through the network on its own, and is getting sent as an email attachment. What type of program
is in the network?

you need to implement an update based on a critical Microsoft Security Bulletin?

You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS
6.0.
You are concerned about the overall security of your servers, and are checking with Microsoft for
any patches or updates that you might need to apply to your systems. Which of the following
would you apply if you need to implement an update based on a critical Microsoft Security
Bulletin?

you need to implement an update to fix a specific problem that addresses a critical, non-security-related bug?

You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS
6.0.
You are concerned about the overall security of your servers, and are checking with Microsoft for
any patches or updates that you might need to apply to your systems. Which of the following
would you apply if you need to implement an update to fix a specific problem that addresses a
critical, non-security-related bug?

you need to implement a single update, which contains a single cumulative package that includes multiple files

You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS
6.0.
You are concerned about the overall security of your servers, and are checking with Microsoft for
any patches or updates that you might need to apply to your systems. Which of the following
would you apply if you need to implement a single update, which contains a single cumulative
package that includes multiple files that are used to address a problem in your IIS Servers?


Page 8 of 24« First...678910...20...Last »