SCP Hardening the Infrastructure SC0-411 SCP-HTI Exam Practice Test

Page: 1 / 14
Total 574 questions
Question 1

According to Internet Assigned Numbers Authority, port numbers are divided into three ranges - the Well-Known Ports, the Registered Ports and the Dynamic and/or Private Ports. The Registered ports range from:



Answer : D


Question 2

In order to properly manage the network traffic in your organization, you need a complete understanding of protocols and networking models. In regards to the 7-layer OSI model, what is the function of the Network Layer?



Answer : B


Question 3

At the root@linuxbox$ prompt on a Linux machine you type ls --l and one of the lines in the output reads:

drw------- 1 simon users 1024 Oct 9 11:23 b According to this output, which of the following is(are) true?



Answer : C


Question 4

You work for a medium sized ISP and there have been several attacks of the DNS configuration recently. You are particularly concerned with DNS Spoofing attacks. If an attacker is able to take advantage of a BIND vulnerability to gain root access, where he or she may control the network configuration, including zone transfers, this is which type of DNS Spoofing?



Answer : A


Question 5

The following exhibit is a screen shot of a capture using Network Monitor on Windows 2000 Server Sp2. Examine the details as shown for a frame and identify which of the statements that follow best describes it.



Answer : C


Question 6

While creating the backup strategy for your organization, you examine the three primary types of backups. What are those three types?



Answer : B, D, E


Question 7

As per the specifications of the RFC on TCP, identify from the list below the correct order of the Control Bits in the TCP header from the left to the right (i.e., in the order they are sent):



Answer : D


Page:    1 / 14   
Total 574 questions