显示标签为“SCP”的博文。显示所有博文
显示标签为“SCP”的博文。显示所有博文

2014年4月21日星期一

Pass4Test offre de SCP SC0-471 matériaux d'essai

Le Certificat de SCP SC0-471 signifie aussi un nouveau jalon de la carrière, le travail aura une space plus grande à augmenter, et tout le monde dans l'industrie IT sont désireux de l'obtenir. En face d'une grande passion pour le test Certification SCP SC0-471, le contrariété est le taux très faible à réussir. Bien sûr que l'on ne passe pas le test SC0-471 sans aucun éffort, en même temps, le test de SCP SC0-471 demande les connaissances bien professionnelles. Le guide d'étude dans le site Pass4Test peut vous fournir un raccourci à réussir le test SCP SC0-471 et à obtenir le Certificat de ce test. Choisissez le guide d'étude de Pass4Test, vous verrez moins de temps dépensés, moins d'efforts contribués, mais plus de chances à réussir le test. Ça c'est une solution bien rentable pour vous.

Il y a beaucoup de gans ambitieux dansn l'Industrie IT. Pour monter à une autre hauteur dans la carrière, et être plus proche du pic de l'Industrie IT. On peut choisir le test SCP SC0-471 à se preuver. Mais le taux du succès et bien bas. Participer le test SCP SC0-471 est un choix intelligent. Dans l'Industrie IT de plus en plus intense, on doit trouver une façon à s'améliorer. Vous pouvez chercher plusieurs façons à vous aider pour réussir le test.

Code d'Examen: SC0-471
Nom d'Examen: SCP (Strategic Infrastructure Security)
Questions et réponses: 180 Q&As

Le produit de Pass4Test est réputée par une bonne qualité et fiabilité. Vous pouvez télécharger le démo grantuit pour prendre un essai, nons avons la confiance que vous seriez satisfait. Vous n'aurez plus de raison à s'hésiter en face d'un aussi bon produit. Ajoutez notre Q&A au panier, vous aurez une meilleure préparation avant le test.

Le test SCP SC0-471 est bien populaire dans l'Industrie IT. Donc il y a de plus en plus de gens à participer le test SCP SC0-471. En fait, c'est pas facile à passer le test si on n'a pas une formation particulière. Pass4Test peut vous aider à économiser le temps et les efforts à réussir le test Certification.

SC0-471 Démo gratuit à télécharger: http://www.pass4test.fr/SC0-471.html

NO.1 In the process of public key cryptography, which of the following is true?
A. Only the public key is used to encrypt and decrypt
B. Only the private key can encrypt and only the public key can decrypt
C. Only the public key can encrypt and only the private key can decrypt
D. The private key is used to encrypt and decrypt
E. If the public key encrypts, then only the private key can decrypt
Answer: E

certification SCP   SC0-471 examen   SC0-471   SC0-471 examen

NO.2 You are configuring the lines that control access to exported objects on your server running NFS. If
you have a directory called /Tech and you wish to export this directory to network 192.168.20.0/24,
allowing root access, and the permissions of read and write, which of the following lines will accomplish
this?
A. (RW) no_root_squash /Tech 192.168.20.0/24
B. /Tech 192.168.20.0/24 (rw) no_root_squash
C. (RW) no_root_squash 192.168.20.0/24 /Tech
D. (RW)no_root_squash:/Tech 192.168.20.0/24
E. /Tech 192.168.20.0/24(rw) no_root_squash
Answer: E

SCP   SC0-471   certification SC0-471   SC0-471

NO.3 During the review of the security logs you notice some unusual traffic. It seems that a user has
connected to your Web site ten times in the last week, and each time has visited every single page on the
site. You are concerned this may be leading up to some sort of attack. What is this user most likely getting
ready to do?
A. Mirror the entire web site.
B. Download entire DNS entries.
C. Scan all ports on a web server.
D. Perform a Distributed Denial of Service attack through the Web server.
E. Allow users to log on to the Internet without an ISP.
Answer: A

SCP   SC0-471   SC0-471

NO.4 As per the guidelines in the ISO Security Policy standard, what is the purpose of the section on
Business Continuity Planning?
A. The objectives of this section are to maintain appropriate protection of corporate assets and to ensure
that information assets receive an appropriate level of protection.
B. The objectives of this section are to provide management direction and support for information security.
C. The objectives of this section are to counteract interruptions to business activities and to critical
business processes from the effects of major failures or disasters.
D. The objectives of this section are to avoid breaches of any criminal or civil law, statutory, regulatory or
contractual obligations and of any security requirements, and to ensure compliance of systems with
organizational security policies and standards.
E. The objectives of this section are to control access to information, to prevent unauthorized access to
information systems, to ensure the protection of networked services, and to prevent unauthorized
computer access.
Answer: C

SCP   SC0-471 examen   SC0-471   SC0-471   SC0-471 examen

NO.5 Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use
Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of
traffic did Snort capture in this log file?
A. Windows 2000 Ping Request
B. Windows NT 4.0 Ping Request
C. Linux Ping Request
D. Linux Ping Response
E. Windows NT 4.0 Ping Response
Answer: B

SCP   SC0-471   SC0-471 examen   SC0-471

NO.6 During a one week investigation into the security of your network you work on identifying the
information that is leaked to the Internet, either directly or indirectly. One thing you decide to evaluate is
the information stored in the Whois lookup of your organizational website. Of the following, what pieces of
information can be identified via this method?
A. Registrar
B. Mailing Address
C. Contact Name
D. Record Update
E. Network Addresses (Private)
Answer: ABCD

SCP   SC0-471   SC0-471   SC0-471

NO.7 To maintain the security of your network you routinely run several checks of the network and
computers. Often you use the built-in tools, such as netstat. If you run the following command:
netstat -e
which of the following will be the result?
A. Displays all connections and listening ports
B. Displays Ethernet statistics
C. Displays addresses and port numbers in numerical form
D. Shows connections for the protocol specified
E. Displays per-protocol statistics
Answer: B

SCP   SC0-471 examen   SC0-471   SC0-471   SC0-471 examen

NO.8 What is the name of the informational page that is relevant to a particular command in Linux?
A. Readme Page
B. Lnx_nfo Page
C. Man Page
D. X_Win Page
E. Cmd_Doc Page
Answer: C

SCP examen   certification SC0-471   SC0-471 examen   SC0-471 examen

NO.9 Which one of the following is an incorrect mod equation?
A. 9 mod 3 = 0
B. 40 mod 10 = 0
C. 40 mod 9 = 4
D. (6-1) mod 3 = 0
E. (2+4) mod 5 = 1
Answer: D

SCP examen   certification SC0-471   SC0-471 examen

NO.10 To increase the security of your network and systems, it has been decided that EFS will be
implemented in the appropriate situations. Two users are working on a common file, and often email this
file back and forth between each other. Is this a situation where the use of EFS will create effective
security, and why (or why not)?
A. No, the security will remain the same since both users will share the same key for encryption.
B. Yes, since the file will be using two keys for encryption the security will increase.
C. No, the security will remain the same since both users will share the same key for decryption.
D. Yes, since the file will be using two keys for decryption the security will increase.
E. No, EFS cannot be used for files that are shared between users.
Answer: E

SCP examen   SC0-471 examen   SC0-471   SC0-471 examen

NO.11 You are working with some new RPM files on your Linux system. You know there are several options
when dealing with RPM files. Which of the following answers lists proper RPM commands, with the
correct description of the command?
A. rpm -q <package name> This command performs software verification.
B. rpm -e <package name> This command removes the software.
C. rpm -v <package name> This command performs software verification.
D. rpm -r <package name> This command removes the software.
E. rpm -i <package name> This command installs the software.
F. rpm -in <package name> This command installs the software.
Answer: ABE

SCP examen   SC0-471   SC0-471

NO.12 If you wish to change the permissions of a parent directory in your Linux system, and want the
permissions to be changed on the files and subdirectories in the parent directory to be the same, what
switch must you use?
A. -G
B. -R
C. -P
D. -S
E. -F
Answer: B

SCP examen   SC0-471   SC0-471   SC0-471

NO.13 You are working on the authentication systems in your network, and are concerned with your legacy
systems. In Windows NT 4.0, before Service Pack 4 (SP4), there were only two supported methods of
authentication. What were those two methods?
A. NetBIOS
B. LM
C. NTLM
D. NTLMv2
E. Kerberos
Answer: BC

SCP examen   SC0-471   SC0-471 examen

NO.14 Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use
Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of
traffic did Snort capture in this log file?
A. NetBus Scan
B. Trojan Scan
C. Ping Sweep
D. Port Scan
E. Ping Sweep
Answer: D

SCP   SC0-471   SC0-471   SC0-471 examen

NO.15 Attackers have the ability to use programs that are able to reveal local passwords by placing some
kind of a pointer/cursor over the asterisks in a program's password field. The reason that such tools can
uncover passwords in some Operating Systems is because:
A. the passwords are simply masked with asterisks
B. the etc/passwd file is on a FAT32 partition
C. the passwords are decrypted on screen
D. the password text is stored in ASCII format
E. the etc/passwd file is on a FAT16 partition
Answer: A

certification SCP   SC0-471   SC0-471 examen

NO.16 In order for your newly written security policy to have any weight, it must be implemented. Which of
the following are the three components of a successful Security Policy Implementation in an
organization?
A. Policy Monitoring
B. Policy Design
C. Policy Committee
D. Policy Enforcement
E. Policy Documentation
Answer: ABD

SCP   certification SC0-471   SC0-471 examen   certification SC0-471   SC0-471

NO.17 What type of cipher is used by an algorithm that encrypts data one bit at a time?
A. 64-bit encryption Cipher
B. Block Cipher
C. Stream Cipher
D. Diffuse Cipher
E. Split Cipher
Answer: C

SCP   certification SC0-471   SC0-471 examen   certification SC0-471   certification SC0-471

NO.18 You are aware of the significance and security risk that Social Engineering plays on your company. Of
the following Scenarios, select those that, just as described, represent potentially dangerous Social
Engineering:
A. A writer from a local college newspapers calls and speaks to a network administrator. On the call the
writer requests an interview about the current trends in technology and offers to invite the administrator to
speak at a seminar.
B. An anonymous caller calls and wishes to speak with the receptionist. On the call the caller asks the
receptionist the normal business hours that the organization is open to the public.
C. An anonymous caller calls and wishes to speak with the purchaser of IT hardware and software. On
the call the caller lists several new products that the purchaser may be interested in evaluating. The caller
asks for a time to come and visit to demonstrate the new products.
D. An email, sent by the Vice President of Sales and Marketing, is received by the Help Desk asking to
reset the password of the VP of Sales and Marketing.
E. An email is received by the Chief Security Officer (CSO) about a possible upgrade coming from the ISP
to a different brand of router. The CSO is asked for the current network's configuration data and the
emailer discusses the method, plan, and expected dates for the rollover to the new equipment.
Answer: DE

SCP examen   certification SC0-471   certification SC0-471   SC0-471 examen   SC0-471 examen   certification SC0-471

NO.19 On Monday, during a routine check of a users Windows workstation, you find the following program,
called regedit.bat on the users local hard drive:
Net localgroup administrators local /all
Start regedit.exe
Exit
What is this program capable of doing on this computer?
A. Nothing, the first line is coded wrong.
B. It will add the administrators to the local group
C. It will add the local user to all local groups
D. It will add the administrators to all local groups
E. It will add the local user to the administrators group
Answer: E

certification SCP   SC0-471 examen   certification SC0-471   SC0-471 examen   SC0-471

NO.20 What is a problem with symmetric key cryptography?
A. It is slower than asymmetric key cryptography
B. Secure distribution of the public key
C. There is a lack of encryption protocols that can use symmetric key cryptography
D. Secure distribution of a secret key
E. Symmetric key cryptography is reserved for the NSA
Answer: D

SCP   SC0-471   SC0-471   SC0-471 examen   SC0-471   certification SC0-471

NO.21 As per the guidelines in the ISO Security Policy standard, what is the purpose of the section on
Physical and Environmental Security?
A. The objectives of this section are to avoid breaches of any criminal or civil law, statutory, regulatory or
contractual obligations and of any security requirements, and to ensure compliance of systems with
organizational security policies and standards.
B. The objectives of this section are to prevent unauthorized access, damage and interference to
business premises and information; to prevent loss, damage or compromise of assets and interruption to
business activities; to prevent compromise or theft of information and information processing facilities.
C. The objectives of this section are to provide management direction and support for information
security.
D. The objectives of this section are to maintain appropriate protection of corporate assets and to ensure
that information assets receive an appropriate level of protection.
E. The objectives of this section are to control access to information, to prevent unauthorized access to
information systems, to ensure the protection of networked services, and to prevent unauthorized
computer access.
Answer: B

SCP   SC0-471   certification SC0-471   SC0-471 examen   certification SC0-471

NO.22 Which of the following are symmetric encryption algorithms?
A. MD5
B. RSA
C. Diffie-Hellman
D. 3DES
E. AES
Answer: DE

SCP   certification SC0-471   certification SC0-471   SC0-471   certification SC0-471   SC0-471 examen

NO.23 If you encrypt or decrypt files and folders located on a remote computer that has been enabled for
remote encryption; the data that is transmitted over the network by this process is not encrypted. In order
to keep data encrypted as it is transmitted over the network, which of the following must you do?
A. You must implement EFS.
B. You must implement B2 security for Windows.
C. You must use IPSec.
D. You must use a recovery agent.
E. You must transmit the entire folder, not individual files.
Answer: C

certification SCP   SC0-471   SC0-471 examen   SC0-471   SC0-471   SC0-471

NO.24 Often times attackers will run scans against the network to identify different network and operating
systems, and resources that are available. If an attacker runs scans on the network, and you are logging
the connections, which of the following represent the legitimate combination of packets that will be sent
between the attacker and target?
A. Attacker PSH-FIN Scan, Target RST-FIN Response
B. Attacker ACK Scan, Target NULL Response
C. Attacker NULL Scan, Target RST Response
D. Attacker SYN Scan, Target NULL Response
E. Attacker FIN Scan, Target RST Response
Answer: CE

SCP   SC0-471 examen   SC0-471   SC0-471

NO.25 You have just become the senior security professional in your office. After you have taken a complete
inventory of the network and resources, you begin to work on planning for a successful security
implementation in the network. You are aware of the many tools provided for securing Windows 2003
machines in your network. What is the function of Secedit.exe?
A. This tool is used to set the NTFS security permissions on objects in the domain.
B. This tool is used to create an initial security database for the domain.
C. This tool is used to analyze a large number of computers in a domain-based infrastructure.
D. This tool provides an analysis of the local system NTFS security.
E. This tool provides a single point of management where security options can be applied to a local
computer or can be imported to a GPO.
Answer: C

SCP   certification SC0-471   certification SC0-471   SC0-471 examen

NO.26 You have become the lead security professional for a mid-sized organization. You are currently
studying DNS issues, and configuration options. You come across the concepts of DNS Spoofing, and
investigate more. What is DNS Spoofing?
A. DNS Spoofing is when the DNS client submits a false DNS request to the DNS server, and the DNS
server responds with correct data.
B. DNS Spoofing is the DNS client submits a DNS request to the DNS server using a bogus IP address,
and the DNS server responds to the incorrect host.
C. DNS Spoofing is when a DNS Server responds to an unauthorized DNS client, providing that client
with name resolution.
D. DNS Spoofing is when a DNS client is forced to make a DNS query to an imposter DNS server, which
send the client to an imposter resource.
E. DNS spoofing is when a DNS server provides name resolution to clients that are located in a different
IP subnet than the server itself.
Answer: D

SCP   certification SC0-471   SC0-471   SC0-471 examen   SC0-471   SC0-471

NO.27 You are discussing the design and infrastructure of the Internet with several colleagues when a
disagreement begins over the actual function of the NAP in the Internets design. What is the function of a
NAP in the physical structure of the Internet?
A. The NAP provides for a layered connection system of ISPs connecting to the backbone.
B. The NAP provides the actual connection point between a local user and the Internet.
C. The NAP provides the physical network with communication channels for the Internet and voice/data
applications.
D. The NAP provides a national interconnection of systems, called peering centers, to the NSPs.
E. The NAP provides for a connection point between an ISP and the backbone of the Internet.
Answer: E

SCP   SC0-471   SC0-471   SC0-471   SC0-471

NO.28 When using the 3DES encryption ( C = EK1[DK2[EK1[P]]] ) , what is the function of C?
A. C is the text before encryption
B. C is the first encryption key
C. C is the second encryption key
D. C is the decryption key
E. C is the text after encryption
Answer: E

SCP   SC0-471   SC0-471 examen   SC0-471 examen   SC0-471 examen

NO.29 You have just downloaded a new file, called scnpfile.tar.gz. You are going to verify the file prior to
un-archiving the file. Which command do you need to type to un-compress the file, prior to un-archiving?
A. tar xvf scnpfile.tar.gz
B. tar -zxvf scnpfile.tar.gz
C. gunzip scnpfile.tar.gz
D. gunzip -xvf scnpfile.tar.gz
E. gunzip -zxvf scnpfile.tar.gz
Answer: C

SCP   certification SC0-471   SC0-471

NO.30 What encryption algorithm was selected to replace DES?
A. RC5
B. IDEA
C. AES
D. Blowfish
E. RSA
Answer: C

SCP examen   SC0-471   SC0-471   certification SC0-471

Dans ce monde d'informatique, l'industrie IT est suivi par de plus en plus de ges. Dans ce domaine demandant beaucoup de techniques, il faut des Certificat à se preuver les techniques professionnelle. Les Certificats IT sont improtant pour un interviewé pendant un entretien. C'est pas facile à passer le test SCP SC0-471, donc c'est pourquoi beaucoup de professionnels qui choisissent ce Certificat pour se preuver.

2013年12月5日星期四

Meilleur SCP SC0-501 test formation guide

En quelques années, le test de certification de SCP SC0-501 faisait un grand impact sur la vie quotidienne pour pas mal de gens. Voilà le problème, comme on peut réussir facilement le test de SCP SC0-501? Notre Pass4Test peut vous aider à tout moment à résourdre ce problème rapidement. Pass4Test peut vous offrir une bonne formation particulière à propos du test de certification SC0-501. Notre outil de test formation est apporté par les IT experts. Chez Pass4Test, vous pouvez toujours trouver une formations à propos du test Certification SC0-501, plus nouvelle et plus proche d'un test réel. Tu choisis le Pass4Test aujourd'hui, tu choisis le succès de test Certification demain.

Le Certificat de SCP SC0-501 peut vous aider à monter un autre degré de votre carrière, même que votre niveau de vie sera amélioré. Avoir un Certificat SCP SC0-501, c'est-à-dire avoir une grande fortune. Le Certificat SCP SC0-501 peut bien tester des connaissances professionnelles IT. La Q&A SCP SC0-501 plus nouvelle vient de sortir qui peut vous aider à faciilter le cours de test préparation. Notre Q&A comprend les meilleurs exercices, test simulation et les réponses.

Code d'Examen: SC0-501
Nom d'Examen: SCP (Enterprise Security Implementation (ESI) )
Questions et réponses: 50 Q&As

L'équipe de Pass4Test autorisée offre sans arrêt les bonnes resources aux candidats de test Certification SCP SC0-501. Les documentations particulièrement visée au test SCP SC0-501 aide beaucoup de candidats. La Q&A de la version plus nouvelle est lancée maintenant. Vous pouvez télécharger le démo gratuit en Internet. Généralement, vous pouvez réussir le test 100% avec l'aide de Pass4Test, c'est un fait preuvé par les professionnels réputés IT. Ajoutez le produit au panier, vous êtes l'ensuite à réussir le test SCP SC0-501.

Les produits de Pass4Test sont recherchés par les experts de Pass4Test qui se profitent de leurs connaissances et leurs expériences dans l'Idustrie IT. Si vous allez participer le test SCP SC0-501, vous devez choisir Pass4Test. La Q&A de Pass4Test peut vous aider à préparer mieux le test SCP SC0-501 avec sa grande couiverture des questions. En face d'un test très difficile, vous pouvez obtenir le Certificat SCP SC0-501 sans aucune doute.

SC0-501 Démo gratuit à télécharger: http://www.pass4test.fr/SC0-501.html

NO.1 Which antenna type is best for extending the local range of an Access Point?
A.Yagi
B.Omni-directional
C.Di-polar
D.Parabolic
E.Mono-polar
Answer: B

certification SCP   SC0-501 examen   SC0-501   SC0-501

NO.2 When using the 3DES encryption ( C = E
?K1
[D
?K2
[E
?K1
[P]]] ) , what is the function of D?
A.D is the text before encryption
B.D is the first encryption key
C.D is the second encryption key
D.D is the decryption key
E.D is the text after encryption
Answer: D

SCP   certification SC0-501   SC0-501 examen   SC0-501   SC0-501

NO.3 What type of information can be learned from a user
COOKIES/index.dat file?
A.Their MAC address
B.Their IP address
C.Their email address
D.The websites they have visited
E.The user logon name
Answer: DE

SCP   certification SC0-501   SC0-501 examen

NO.4 Which of the following is not a category of Intellectual Property?
A.Patents
B.Trademarks
C.Copyrights
D.Manufacturing Standards
E.Trade Secrets
Answer: D

SCP   SC0-501 examen   SC0-501   SC0-501   SC0-501

NO.5 There are many certificate templates built into Windows 2000 Certificate Servers. Which of the
following user templates are valid for client authentication?
A.Smart Card Logon
B.Domain Controller
C.Authenticated Session
D.IPSec (Offline Request)
E.Smart Card User
Answer: ACE

certification SCP   SC0-501   SC0-501   SC0-501

NO.6 Based on the provided image, what type of certification path will be used in this network?
A.Nested certification path
B.Hierarchical certification path
C.Functional certification path
D.Mesh certification path
E.Bridged certification path
Answer: D

certification SCP   SC0-501 examen   SC0-501   certification SC0-501

NO.7 If you capture an 802.11 frame, and the ToDS bit is set to zero and the FromDS bit is set to zero, what
type of WLAN is this frame a part of?
A.Mesh
B.Broadcast
C.Infrastructure
D.Hierarchical
E.Ad Hoc
Answer: E

certification SCP   certification SC0-501   certification SC0-501   SC0-501 examen

NO.8 You are in the process of designing your PKI. You are working on the individual systems and servers
that you will need. Which machine that you install is designed simply to enroll new users into the PKI?
A.Certification Authority
B.Archive Server
C.Security Server
D.Registration Authority
E.Certification Repository
Answer: D

SCP examen   SC0-501   SC0-501 examen

NO.9 If you are going to build a PKI you will need many different components. What is an industry standard
that you can build your PKI upon?
A.Contiguous distinguished name spaces
B.X.509v3 Certificates
C.A defined hierarchy of authorities
D.128-bit SHA1
E.128-bit MD5
Answer: B

SCP   SC0-501   SC0-501 examen   SC0-501   SC0-501

NO.10 In PGP, there are two conditions that can be present to provide for the validity of a certificate. What
are these two conditions?
A.The certificate has been digitally signed by your local trusted root Certificate Authority.
B.The certificate is digitally signed by at least one completely trusted key holder, who has a valid
certificate.
C.The certificate is digitally signed by at least two of the marginally trusted key holders, who have valid
certificates.
D.The certificate has been digitally signed by the sender
trusted root Certificate Authority.
E.The certificate is digitally signed by the sender, who is authenticated by your local Certificate Authority.
Answer: BC

SCP   SC0-501   SC0-501 examen   SC0-501

NO.11 If a Certificate Authority is also designed to accept requests for certificates, then it can be termed as
what?
A.A Root CA
B.An Intermediate CA
C.A CA Hierarchy
D.A Registration Authority
E.A Repository
Answer: D

SCP   SC0-501 examen   SC0-501   SC0-501

NO.12 When an OCSP responder provides a digitally signed response for each of the certificates sent to it by
the relying party in the original request, its reply consists of the certificate identifier, one of three status
values and a validity interval. What are the three status values?
A.Okay, Not Okay, Revoked
B.This Update, Next Update, Future Update
C.Good, Revoked, Unknown
D.Issuer
Public Key, Hash of the Private Key, Unknown
E.Issuer
Private Key, Thumbprint of the Public Key, Unknown
Answer: C

SCP   SC0-501   SC0-501   SC0-501 examen

NO.13 When a biometric system performs a one-to-one mapping, what is the systems doing?
A.Identification
B.Authentication
C.Classification
D.Detection
E.Recognition
Answer: B

SCP examen   SC0-501 examen   certification SC0-501

NO.14 Which of the following are hash algorithms?
A.MD5
B.SHA
C.RSA
D.3DES
E.AES
Answer: AB

SCP   SC0-501 examen   SC0-501   SC0-501 examen   SC0-501 examen

NO.15 What transmission system uses multiple frequencies combined together as a band?
A.Digital Channel Hopping (DCH)
B.Lamar Anthell Transmission (LAT)
C.Frequency Hopping Spread Spectrum (FHSS)
D.Digital Band Hopping (DBH)
E.Direct Sequence Spread Spectrum (DSSS)
Answer: E

certification SCP   SC0-501   SC0-501   SC0-501   SC0-501

NO.16 What is the name of the option in Windows to hide, or append, a second file to a main file?
A.The Hidden Bit
B.Dynamic Link Libraries
C.NTFS Streams
D.File Associations
E.Hidden Server Management
Answer: C

SCP examen   SC0-501 examen   SC0-501 examen

NO.17 When Windows places a file on a FAT 16 partition, what does it look for, in HEX, to know that a file can
be placed in that cluster?
A.0000
B.FFFF
C.0001
D.000F
E.1111
Answer: A

SCP examen   SC0-501   certification SC0-501

NO.18 If you wish to make your Windows user account use smart cards, where must you go to check this
option?
A.Active Directory Users and Computers
B.Computer Management, Local Users and Groups
C.Active Directory Sites and Services
D.Active Directory Security Services
E.On the Enterprise Certificate Server
Answer: A

certification SCP   SC0-501   SC0-501   SC0-501

NO.19 Which of the following can be protected by a patent?
A.A new invention
B.A new product
C.A new process
D.A new name
E.An old product made in a new way
Answer: ABCE

SCP   SC0-501   SC0-501

NO.20 What format is used to list the information that is contained in the Issuer field of an X.509 digital
certificate?
A.FQDN
B.X.500 CN
C.CA Name
D.X.500 DN
E.Position of the CA in the CA hierarchy
Answer: D

SCP   SC0-501   SC0-501   SC0-501   SC0-501   certification SC0-501

NO.21 What transmission system uses short bursts combined together as a channel?
A.Frequency Hopping Spread Spectrum (FHSS)
B.Direct Sequence Spread Spectrum (DSSS)
C.Lamar Anthell Transmission (LAT)
D.Digital Band Hopping (DBH)
E.Digital Channel Hopping (DCH)
Answer: A

SCP examen   certification SC0-501   certification SC0-501   certification SC0-501

NO.22 What is the average size of a biometric template?
A.Between 10 and 100 KB
B.Between 100 and 500 KB
C.Less than 1 KB
D.Less than 3 bytes
E.Between 500 KB and 1 MB
Answer: C

SCP   SC0-501 examen   SC0-501

NO.23 When you install and use PGP on your local computer, where is the key pair stored, by default?
A.secret.ring
B.public.ring
C./usr/bin/pgp
D.pubring.pkr
E.secring.pkr
Answer: DE

SCP   SC0-501 examen   certification SC0-501   SC0-501   SC0-501 examen   certification SC0-501

NO.24 One of the many extensions in an X.509 digital certificate is called the SubjectKeyIdentifier. What is
this extension used for?
A.The extension is used to verify the SubjectPrivateKeyInfo
B.The extension is used to match the hashes of the SubjectKeyAlgorithm
C.The extension is used only when the certificate is used for code signing from a defined Subject
D.The extension is used when matching the hash value of the public key on the certificate
E.The extension is used only if the certificate is sent from a Root CA
Answer: D

SCP examen   SC0-501 examen   certification SC0-501   SC0-501

NO.25 If your goal is to make your CA issue certificates that have specific key usage, what can you use to
achieve this goal?
A.This can be done by using unique DNs for each key use that you want.
B.This can be done by using OIDs for each key use that you want.
C.This can be done by using unique CNs for each key use that you want.
D.This can only be done by selecting the key use options during the setup of the CA.
E.This can be done by installing the identifier file for each key use.
Answer: B

SCP examen   SC0-501   SC0-501   SC0-501 examen

NO.26 If you receive an X.509 digital certificate that has a unique identifier, but has no extensions, what
version is the certificate?
A.It is a Version 2 certificate
B.It is a Version 3 certificate
C.It is a Version 1 certificate
D.All X.509 digital certificates have unique identifiers
E.The unique identifier is determined by implementation, not version number
Answer: A

SCP   SC0-501   SC0-501   SC0-501

NO.27 Incidents are generally categorized as falling into attacks on the CIA triad. Which of the following three
attacks are the general categories?
A.Attacks against Integrity
B.Attacks against Confidentiality
C.Attacks against Availability
D.Attacks against Accuracy
E.Attacks against Collisions
Answer: ABC

certification SCP   SC0-501   certification SC0-501

NO.28 What is a unique benefit to using a File Viewer as one of your Forensics Tools?
A.You do not have to copy data files to your forensic machine for analysis
B.You do not have to worry about modifying the evidence in any manner
C.You are able to view the evidence files in HEX format
D.You do not need to have all the programs installed on your forensic machine to view evidence files
E.You are able to search for specific file types to which the O/S does not have application associations
Answer: D

SCP   certification SC0-501   SC0-501

NO.29 Which of the following numbers are Non-Prime Numbers?
A.23
B.2
C.24
D.39
E.17
Answer: CD

SCP   certification SC0-501   SC0-501 examen   certification SC0-501

NO.30 What are the two primary types of token system?
A.Time-based
B.Passive
C.Challenge/Response
D.Active
E.Seeded
Answer: AC

certification SCP   certification SC0-501   SC0-501

Nous assurons seulement le succès de test certification, mais encore la mise à jour est gratuite pour vous. Si vous ne pouvez pas passer le test, votre argent sera 100% rendu. Toutefois, cette possibilité n'est presque pas de se produire. Vous pouvez tout d'abord télécharger le démo gratuit pour prendre un essai.

2013年11月22日星期五

Guide de formation plus récente de SCP SC0-402

Dans n'importe quelle industrie, tout le monde espère une meilleure occasion de se promouvoir, surtout dans l'industrie de IT. Les professionnelles dans l'industrie IT ont envie d'une plus grande space de se développer. Le Certificat SCP SC0-402 peut réaliser ce rêve. Et Pass4Test peut vous aider à réussir le test SCP SC0-402.

Pass4Test peut offrir la facilité aux candidats qui préparent le test SCP SC0-402. Nombreux de candidats choisissent le Pass4Test à préparer le test et réussir finalement à la première fois. Les experts de Pass4Test sont expérimentés et spécialistes. Ils profitent leurs expériences riches et connaissances professionnelles à rechercher la Q&A SCP SC0-402 selon le résumé de test réel SCP SC0-402. Vous pouvez réussir le test à la première fois sans aucune doute.

Pass4Test a une grande équipe composée des experts d'expérience dans l'industrie IT. Leurs connaissances professionnelles et les recherches font une bonne Q&A, qui vous permet à passer le test SCP SC0-402. Dans Pass4Test, vous pouvez trouver une façon plus convenable à se former. Les resources de Pass4Test sont bien fiable. Choisissez Pass4Test, choisissez un raccourci à réussir le test SCP SC0-402.

Code d'Examen: SC0-402
Nom d'Examen: SCP (Network Defense and Countermeasures (NDC))
Questions et réponses: 275 Q&As

Nous croyons que pas mal de candidats voient les autres site web qui offrent les ressources de Q&A SCP SC0-402. En fait, le Pass4Test est le seul site qui puisse offrir la Q&A recherchée par les experts réputés dans l'Industrie IT. Grâce à la Q&A de Pass4Test impressionée par la bonne qualité, vous pouvez réussir le test SCP SC0-402 sans aucune doute.

SC0-402 Démo gratuit à télécharger: http://www.pass4test.fr/SC0-402.html

NO.1 Your company has decided to allow certain people to work from home. The work that they do does
not require that they be in the office for anything more than meetings and they already have
personal high-speed DSL connections at their homes. You have been given the task of figuring out
how to get your coworkers to connect to your company's network securely and reliably. What
technology can you use to solve your problem most effectively?
A. Dedicated Leased Lines (ISDN or T1)
B. Dial-Up via PSTN lines.
C. VPN
D. Firewall
E. IDS
Answer: C

SCP examen   certification SC0-402   SC0-402 examen   SC0-402 examen   SC0-402

NO.2 You are the firewall administrator for your company and you have just learned that the
Server administrators are gearing up support an L2TP based VPN solution. You are told
to be sure that your firewall rule sets will not hinder the performance of the VPN. Which
of the following ports will you have to allow through the firewall?
A. TCP 1701
B. UDP 1701
C. TCP 443
D. UDP 443
E. TCP1601
Answer: B

SCP   SC0-402   SC0-402   SC0-402

NO.3 Which of the following best describes the Insurance Model?
A. Before incurring the cost for insuring an inoperative asset, check for maintenance agreements that may
include the cost of
insurance itself.
B. The insurance model is the transference of risk to an insurance company that covers the costs of
replacing the critical assets within
your network. The drawbacks are increase in premiums after making a claim, high premiums anyway,
down time while the
insurance company is processing the claim, and claim may not pay what replacement costs are today.
C. The insurance model makes use of preventive measures and regular service as well as updates such
as
Service Packs, maintenance
updates, and patches. Preventive measures can also improve the chances of the insurance model
working
better than if the system
had no preventive measures ever taken.
D. The insurance model makes use of the acknowledged skills and abilities of the existing personnel.
Knowing that assets have very
specific dollar values assigned to them, the choice on how to manage the asset is based on the
experience
of the personnel.
E. Assets will typically cost much more than the original capital outlay that it took to purchase it long ago.
Insurance costs can be
very high and a decision to exercise this model should not be made in haste. There are also depreciation
issues to deal with as well.
Answer: B

SCP   SC0-402   SC0-402   certification SC0-402   SC0-402   SC0-402

NO.4 What technology is being employed to resist SYN floods by having each side of the connection
attempt create its own sequence number (This sequence number contains a synopsis of the
connection so that if/when the connection attempt is finalized the fist part of the attempt can be
re-created from the sequence number)?
A. SYN cookie
B. SYN floodgate
C. SYN gate
D. SYN damn
E. SYN flood break
Answer: A

SCP   SC0-402   SC0-402

NO.5 During a discussion of asset classification and protection with a coworker, you realize that your
coworker does not know the basic concepts of asset protection. You are asked to describe the types of
asset protection. Which of the following describes the concept of an infeasible protection of an asset?
A. The cost to protect the asset is greater than the cost of recovery of the asset
B. The cost to replace the asset is less than the cost of recovery of the asset
C. the cost to protect the asset is infeasible to determine
D. The cost to replace the asset is greater than the cost of recovery of the asset
E. The cost to protect the asset is less than the cost of recovery of the asset
Answer: A

SCP   SC0-402 examen   SC0-402   SC0-402   certification SC0-402   SC0-402

NO.6 During a discussion of asset classification and protection with a coworker, you realize that your
coworker does not know the basic concepts of asset protection. You are asked to describe the types of
asset protection. Which of the following describes the concept of feasible protection of an asset?
A. The cost to replace the asset is greater than the cost of recovery of the asset
B. The cost to replace the asset is less than the cost of protect the asset
C. The cost to protect the asset is greater than the cost of recovery of the asset.
D. The cost to replace the asset is less than the cost of recovery of the asset
E. The cost to protect the asset is less than the cost of recovery of the asset.
Answer: E

certification SCP   SC0-402   SC0-402

NO.7 You were recently hired as the security administrator of a small business. You are
reviewing the current state of security in the network and find that the current logging
system must be immediately modified. As the system is currently configured, auditing
has no practical value. Which of the following are the reasons that the current auditing
has little value?
A. The logs go unchecked.
B. The logs are automatically deleted after three months.
C. The logs are deleted using FIFO and capped at 500Kb.
D. The only auditing is successful file access events.
E. The logs are deleted using FIFO and capped at 5000Kb.
Answer: AD

SCP   certification SC0-402   SC0-402 examen   certification SC0-402   SC0-402 examen   SC0-402 examen

NO.8 You have been hired at a large company to manage the network security issues. Prior to your
arrival, there was no one dedicated to security, so you are starting at the beginning. You hold a
meeting and are discussing the main functions and features of network security. One of your
assistants asks what the function of Authentication in network security is. Which of the following
best describes Authentication?
A. Data communications as well as emails need to be protected for privacy and Authentication.
Authentication ensures the privacy of
data on the network system.
B. Authentication is a security principle that ensures the continuous accuracy of data and information
stored within network systems.
Upon receiving the email or data communication, authentication must be verified to ensure that the
message has not been altered,
modified, or added to or subtracted from in transit by unauthorized users.
C. The security must limit user privileges to minimize the risk of unauthorized access to sensitive
information and areas of the
network that only authorized users should only be allowed to access.
D. Security must be established to prevent parties in a data transaction from denying their participation
after the business transaction
has occurred. This establishes authentication for the transaction itself for all parties involved in the
transaction.
E. Authentication verifies users to be who they say they are. In data communications, authenticating the
sender is necessary to verify
that the data came from the right source. The receiver is authenticated as well to verify that the data is
going to the right
destination.
Answer: E

certification SCP   SC0-402   SC0-402   SC0-402 examen

NO.9 Signatures are generally divided into what three categories?
A. Corruptions
B. Exploits
C. Accesses
D. DoS attacks
E. Reconnaissance
Answer: BDE

SCP   certification SC0-402   SC0-402   SC0-402

NO.10 You are considering adding layers to your existing authentication system. Reading through some of
the vendor literature on logon solutions, it frequently mentions two and three factor authentication.
Your assistant asks you to describe the difference between the two. Select the options that correctly
describe two-factor and three-factor authentication:
A. Two-factor authentication is the process providing something you have along with something you
know.
B. Two-factor authentication is the process of providing two forms of authentication, such as a username
and a password.
C. Two-factor authentication is the process of authenticating twice during the login sequence to verify user
identity.
D. Three-factor authentication is the process of providing something you have along with something you
know and something you are.
E. Three-factor authentication is the process of providing three forms of authentication, such as
username,
password, and sitting at
the physical machine to login.
F. Three-factor authentication is the process of authenticating three times during the login sequence to
verify user identity.
Answer: AD

SCP   SC0-402 examen   SC0-402   certification SC0-402   SC0-402

NO.11 The main reason you have been hired at a company is to bring the network security of the
organization up to current standards. A high priority is to have a full security audit of the network
as soon as possible. You have chosen an Operational Audit and are describing it to your coworkers.
Which of the following best describes an Operational audit?
A. This type of audit is typically done by a contracted external team of security experts who check for
policy compliance.
B. This type of audit is usually done by internal resources to examine the current daily and on-going
activities within a network
system for compliance with an established security policy.
C. This type of audit is typically done by an internal team who ensures the security measures are up to
international standards.
D. This type of audit is usually done by the current network administrators who ensure the security
measures are up to international
standards.
E. This type of audit is usually conducted by external resources and may be a review or audit of detailed
audit logs.
Answer: B

SCP   certification SC0-402   certification SC0-402   SC0-402 examen   certification SC0-402

NO.12 You are the firewall administrator at your company and the network administrators have
decided to implement a VPN solution that will use L2TP. Which port or ports would you
need to allow through the firewall to allow the L2TP traffic to reach the VPN server
inside your network from a remote client?
A. TCP 1723
B. UDP 47
C. UDP 1701
D. TCP 443
E. UDP 500
Answer: C

SCP   SC0-402 examen   SC0-402

NO.13 The main reason you have been hired at a company is to bring the network security of the
organization up to current standards. A high priority is to have a full security audit of the network
as soon as possible. You have chosen an Independent Audit and are describing it to your coworkers.
Which of the following best describes an Independent Audit?
A. An independent audit is usually conducted by external or outside resources and may be a review or
audit of detailed audit logs.
B. The independent audit is usually done by the current network administrators who ensure the security
measures are up to
international standards.
C. The independent audit is typically done by an internal team who ensures the security measures are up
to
international standards.
D. The independent audit is usually done by internal resources to examine the current daily and on-going
activities within a network
system for compliance with an established security policy.
E. The independent audit is typically done by a contracted outside team of security experts who check for
policy compliance.
Answer: A

SCP   SC0-402   SC0-402   certification SC0-402   SC0-402 examen

NO.14 Which of the following best describes the Repair Model?
A. The model makes use of preventive measures and regular service as well as updates such as Service
Packs, maintenance updates,
and patches. Preventive measures can also improve the chances of the repair model working better than
if
the system had no
preventive measures ever taken.
B. The repair model is the transference of risk to an insurance company that covers the costs of replacing
the critical assets within
your network. The drawbacks are increase in premiums after making a claim, high premiums anyway,
down time while the
insurance company is processing the claim, and claim may not pay what replacement costs are today.
C. Assets will typically cost much more than the original capital outlay that it took to purchase it long ago.
Repair costs can be very
high and a decision to exercise this model should not be made in haste. There are also depreciation
issues
to deal with as well. In
any case, this model should be the last resort because of cost and may be the most time consuming.
D. The repair model makes use of the acknowledged skills and abilities of the existing personnel.
Knowing that assets have very
specific dollar values assigned to them, the choice on how to manage the asset is based on the
experience
of the personnel.
E. Before incurring the cost for repair of an inoperative asset, check for maintenance agreements that
may
include the cost of repair
or the actual repair itself. Nevertheless, the repair model should focus on the restoration of the downed
asset to its working status
within the network infrastructure. Keep in mind that after hardware costs, costs for the reloading or
replacement of software can
be a large cost factor as well.
Answer: E

SCP   SC0-402   certification SC0-402   SC0-402   SC0-402

NO.15 Which of the following best describes the Total Replacement Model?
A. The total replacement model makes use of the acknowledged skills and abilities of the existing
personnel. Knowing that assets
have very specific dollar values assigned to them, the choice on how to manage the asset is based on the
experience of the
personnel.
B. Before incurring the cost for replacing of an inoperative asset, check for maintenance agreements that
may include the cost of
repair or the actual repair itself. Nevertheless, the total replacement model should focus on the repairing
of
the downed asset to its
working status within the network infrastructure. Keep in mind that after hardware costs, costs for the
reloading or replacement of
software can be a large cost factor as well.
C. Assets will typically cost much more than the original capital outlay that it took to purchase it long ago.
Replacement costs can be
very high and a decision to exercise this model should not be made in haste. There are also depreciation
issues to deal with as well.
In any case, this model should be the last resort because of cost and may be the most time consuming.
D. The total replacement model is the transference of risk to an insurance company that covers the costs
of
replacing the critical
assets within your network. The drawbacks are increase in premiums after making a claim, high
premiums
anyway, down time
while the insurance company is processing the claim, and claim may not pay what replacement costs are
today.
E. The total replacement model makes use of preventive measures and regular service as well as
updates
such as Service Packs,
maintenance updates, and patches, before deciding to replace the asset. Preventive measures can also
improve the chances of the
replacement model working better than if the system had no preventive measures ever taken.
Answer: C

SCP   SC0-402 examen   SC0-402   certification SC0-402   certification SC0-402

NO.16 Your company has decided to allow certain people to work from home. The work that
they do, does not require that they be in the office for anything more than meetings. In
addition, they already have high-speed DSL connections at their homes for personal use.
You have been given the task of figuring out how to get your coworkers to connect to
your company's network securely and reliably. What technology can you use to solve
your problem most effectively?
A. Dedicated Leased Lines (ISDN or T1)
B. Dial-Up via PSTN lines.
C. VPN
D. IPChains
E. IDS
Answer: C

SCP   SC0-402   SC0-402 examen   SC0-402   SC0-402

NO.17 It has come to your attention that some host on the web has tried to do some reconnaissance on your
network and send a VRFY command to try and steal user names. What type of attack was used
against your network?
A. SMTP attack
B. Web browser attack
C. IMAP attack
D. IP Spoofing
E. Account scan
Answer: A

SCP   SC0-402   SC0-402

NO.18 You are the firewall administrator at your company and the network administrators have decided to
implement a PPTP VPN solution, which of these ports would you need to allow through the firewall
to allow these VPN sessions into your network?
A. 1723
B. 2317
C. 1273
D. 1372
E. 7132
Answer: A

SCP   SC0-402 examen   SC0-402 examen   SC0-402 examen   certification SC0-402

NO.19 You have been hired at a large company to manage network. Prior to your arrival, there
was no one dedicated to security, so you are starting at the beginning. You hold a
meeting and are discussing the main functions and features of network security. One of
your assistants asks what the function of Integrity in network security is. Which of the
following best describes Integrity?
A. The security must limit user privileges to minimize the risk of unauthorized access to sensitive
information and areas of the
network that only authorized users should only be allowed to access.
B. Integrity verifies users to be who they say they are. In data communications, the integrity of the sender
is necessary to verify that
the data came from the right source. The receiver is authenticated as well to verify that the data is going
to
the right destination.
C. Data communications as well as emails need to be protected for privacy and Integrity. Integrity ensures
the privacy of data on the
network system.
D. Integrity is a security principle that ensures the continuous accuracy of data and information stored
within network systems. Data
must be kept from unauthorized modification, forgery, or any other form of corruption either from
malicious threats or corruption
that is accidental in nature. Upon receiving the email or data communication, integrity must be verified to
ensure that the message
has not been altered, modified, or added to or subtracted from in transit by unauthorized users.
E. Security must be established to prevent parties in a data transaction from denying their participation
after the business transaction
has occurred. This establishes integrity for the transaction itself for all parties involved in the transaction.
Answer: D

SCP   SC0-402 examen   SC0-402

NO.20 You have been hired at a large company to manage network security. Prior to your arrival, there
was no one dedicated to security, so you are starting at the beginning. You hold a meeting and are
discussing the main functions and features of network security. One of your assistants asks what the
function of Confidentiality in network security is. Which of the following best describes
Confidentiality?
A. Confidentiality verifies users to be who they say they are. In data communications, authenticating the
sender is necessary to verify
that the data came from the right source. The receiver is authenticated as well to verify that the data is
going to the right
destination.
B. Data communications as well as emails need to be protected in order to maintain appropriate levels of
privacy and confidentiality.
Network security must provide a secure channel for the transmission of data and email that does not allow
eavesdropping by
unauthorized users. Data confidentiality ensures the privacy of data on the network system.
C. The security must limit user privileges to minimize the risk of unauthorized access to sensitive
information and areas of the
network that only authorized users should only be allowed to access.
D. Security must be established to prevent parties in a data transaction from denying their participation
after the business transaction
has occurred. This establishes Confidentiality for the transaction itself for all parties involved in the
transaction.
E. Confidentiality is a security principle that ensures the continuous accuracy of data and information
stored within network systems.
Data must be kept from unauthorized modification, forgery, or any other form of corruption either from
malicious threats or
corruption that is accidental in nature.
Answer: B

certification SCP   SC0-402   certification SC0-402

Participer au test SCP SC0-402 est un bon choix, parce que dans l'Industire IT, beaucoup de gens tirent un point de vue que le Certificat SCP SC0-402 symbole bien la professionnalité d'un travailleur dans cette industrie.

2013年10月25日星期五

SCP SCP-500 examen pratique questions et réponses

Selon les anciens test SCP SCP-500, la Q&A offerte par Pass4Test est bien liée avec le test réel.

La partie plus nouvelle de test Certification SCP SCP-500 est disponible à télécharger gratuitement dans le site de Pass4Test. Les exercices de Pass4Test sont bien proches de test réel SCP SCP-500. En comparaison les Q&As dans les autres sites, vous trouverez que les nôtres sont beaucoup plus complets. Les Q&As de Pass4Test sont tout recherchés par les experts de Pass4Test, y compris le test simulation.

Quand vous hésitez même à choisir Pass4Test, le démo gratuit dans le site Pass4Test est disponible pour vous à essayer avant d'acheter. Nos démos vous feront confiant à choisir Pass4Test. Pass4Test est votre meilleur choix à passer l'examen de Certification SCP SCP-500, et aussi une meilleure assurance du succès du test SCP-500. Vous choisissez Pass4Test, vous choisissez le succès.

Pass4Test vous offre un choix meilleur pour faire votre préparation de test SCP SCP-500 plus éfficace. Si vous voulez réussir le test plus tôt, il ne faut que ajouter la Q&A de SCP SCP-500 à votre cahier. Pass4Test serait votre guide pendant la préparation et vous permet à réussir le test SCP SCP-500 sans aucun doute. Vous pouvez obtenir le Certificat comme vous voulez.

Le produit de Pass4Test est réputée par une bonne qualité et fiabilité. Vous pouvez télécharger le démo grantuit pour prendre un essai, nons avons la confiance que vous seriez satisfait. Vous n'aurez plus de raison à s'hésiter en face d'un aussi bon produit. Ajoutez notre Q&A au panier, vous aurez une meilleure préparation avant le test.

La Q&A SCP SCP-500 est étudiée par les experts de Pass4Test qui font tous effort en profitant leurs connaissances professionnelles. La Q&A de Pass4Test est ciblée aux candidats de test IT Certification. Vous voyez peut-être les Q&As similaires dansn les autres site web, mais il n'y a que Pass4Test d'avoir le guide d'étude plus complet. C'est le meilleur choix à s'assurer le succès de test Certification SCP SCP-500.

Les experts de Pass4Test profitent de leurs expériences et connaissances à augmenter successivement la qualité des docmentations pour répondre une grande demande des candidats, juste pour que les candidats soient permis à réussir le test SCP SCP-500 par une seule fois. Vous allez avoir les infos plus proches de test réel à travers d'acheter le produti de Pass4Test. Notre confiance sont venue de la grande couverture et la haute précision de nos Q&As. 100% précision des réponses vous donnent une confiance 100%. Vous n'auriez pas aucun soucis avant de participer le test.

Code d'Examen: SCP-500
Nom d'Examen: SCP (SolarWinds Certified Professional Exam)
Questions et réponses: 145 Q&As

SCP-500 Démo gratuit à télécharger: http://www.pass4test.fr/SCP-500.html

NO.1 Orion NPM is monitoring the performance of DS-3 utilizing standard MIBs in the ifTable. Occasionally,
the reported traffic rates for this interface spike well above45 Mbps.
What is the most likely cause?
A.heavy network traffic
B.carrier misconfiguration
C.counter rollovers
D.database issues
Answer:C

SCP   SCP-500 examen   SCP-500   SCP-500

NO.2 What is an advantage of using SNMPv2c over using SNMPv1?
A.username parameter
B.get bulk command
C.get next command
D.32 bit counters
E.authentication and encryption
Answer:B

SCP   SCP-500   SCP-500

NO.3 Which network protocols are used by SolarWinds products during network discoveries?
A.ICMP and SMTP
B.DHCP and TFTP
C.PPTP and IMAP
D.ICMP and SNMP
Answer:D

SCP   SCP-500 examen   SCP-500   SCP-500

NO.4 How does the Orion Universal Device Poller (UnDP) monitor a device's statistics that are notincludedin
the standard Orion NPM MIB database?
A.by manually associatingthe device'sOID to Orion
B.by keeping a copy of the device's MIB on the Orion NPM Server
C.by automatically searching the common MIB repositories and updating Orion
D.bymanually compiling the MIB into the Orion MIB database
E.bymanually compiling the OID into the Orion MIB database
Answer:A

SCP   SCP-500 examen   SCP-500   SCP-500

NO.5 Which two performance metrics can be affected by proper QoS implementation? (Choose two.)
A.jitter
B.shaping
C.marking
D.queuing
E.latency
Answer:AE

SCP examen   SCP-500 examen   SCP-500 examen   certification SCP-500   SCP-500

NO.6 Which protocol should a network engineer enable on routers and switches to collectutilization
statistics?
A.ICMP
B.SNMP
C.SMTP
D.WMI
Answer:B

SCP examen   SCP-500 examen   SCP-500

NO.7 Users are complaining that a network connection is slow.
How should SNMP be used to verify performance of the interface?
A.verify bandwidth usage via ifInOctets
B.verify status via the ifTable
C.verify that SNMP agent is responding
D.verify the performance via ifSpeed
Answer:A

SCP   certification SCP-500   certification SCP-500   SCP-500

NO.8 Orion NPM is using SNMP to poll a routerand track interface traffic rates. The data are collected every
5 minutes, and the most recent values collected for a specific interfaceare 1,000,000 and 2,000,000
octets.
What is the approximate average rate of traffic for this interface?
A.1 Kbps
B.3 Kbps
C.16 Kbps
D.26 Kbps
Answer:D

SCP   SCP-500   certification SCP-500   certification SCP-500

NO.9 A network engineer notices the Syslog server's database is growingsignificantly in sizedue to thelarge
number of devices sending Syslog messages.
What should the engineer do to control database growth?
A.configure the Syslog server to discard unwanted messages
B.configure the devices and the Syslog server to use TCP-based Syslog
C.configure the devices and the Syslog server to use SNMPv3
D.configure the Syslog server to capture SNMP traps instead of Syslog
Answer:A

SCP   certification SCP-500   SCP-500

NO.10 When using a network management system (NMS) to monitor network interfaces on a router, you
notice that statistics are wrong after an interface card is physically removed from the device.
What has most likely caused this problem?
A.interface re-indexing
B.device configuration
C.counter rollovers
D.access lists
Answer:A

SCP examen   certification SCP-500   SCP-500 examen   SCP-500

NO.11 The data center teamrequires that they be alerted if any of the servers in a remote site go
down.However, they do NOT want to receive alerts when the remote site connection goes down.
Which two configuration steps should you take within your network management system (NMS) to meet
these requirements? (Choose two.)
A.set up alerts on server status
B.set up alerts on the remote connection status
C.set each of the servers as dependencies for each other
D.set up the remote connection as a dependency for each of the servers
E.set up alerts on the remote router status
Answer:AD

certification SCP   SCP-500   SCP-500   certification SCP-500

NO.12 A network engineer is enabling SNMP on their network devices and needs to ensureit will use message
integrity.
Which version of SNMP should they use?
A.SNMPv1
B.SNMPv2c
C.SNMPv3
D.SNMPv4
Answer:C

SCP   certification SCP-500   SCP-500   SCP-500

NO.13 Whichtwo variables are used in the calculation of Percent Utilization? (Choose two.)
A.configured bandwidth
B.packets per second
C.buffer overruns
D.interface discards
E.bits per second
Answer:AE

SCP   SCP-500   certification SCP-500

NO.14 You have recently implemented a VoIP infrastructure within the company network. You are receiving
trouble tickets indicating calls are dropping between their New York and San Francisco offices.
Which two IP service level agreement (SLA) measurements should you use to identify the cause of the
issue?
A.latency
B.SIP
C.NetFlow
D.available bandwidth
E.jitter
Answer:AE

SCP   SCP-500 examen   certification SCP-500   SCP-500

NO.15 Which two reporting requirements should you consider when specifying data roll-up settings for a
network management system (NMS)? (Choose two.)
A.dataencryption
B.data format
C.data granularity
D.monitoring coverage
E.data retention
Answer:CE

certification SCP   SCP-500 examen   certification SCP-500   certification SCP-500   SCP-500 examen

NO.16 Your current deployment has multiple Orion NPM serversmonitoring multiplelocationsfrom a single site.
This is producing inaccurate dataandhigh WAN bandwidth utilization.
Whatare the twomost efficientways to address this issue? (Choose two.)
A.deploy Orion NPMat each remote location
B.deploy Orion Enterprise Operations Console
C.deploy an additional Orion Poller
D.deploy an additional Orion Web Server
E.deploy an Orion Hot Standby
Answer:AB

SCP   SCP-500   SCP-500

NO.17 You are monitoring your Internet connection, and your ISP has guaranteed512 Kbps. Historical data
shows that your connection speedholds at 256 Kbps for long periods of time, but never exceeds this
speed.
What does this indicate?
A.The ISP has misconfigured the link.
B.The WAN router is misconfigured.
C.The NAT table is overloaded.
D.QoS is dropping low priority traffic.
Answer:A

certification SCP   SCP-500   certification SCP-500   SCP-500 examen   certification SCP-500   certification SCP-500

NO.18 Due to a server crash, you had to moveOrion to a new server with a new IP address.
Which two changes should you make to ensure thatOrion functions properly from the new server and IP
address? (Choose two.)
A.update the access control lists (ACLs) thatrestrict management protocols
B.change the IP address specified in the snmpd.conf file on the Orion server
C.update the source address for NetFlow packets exported to Orion
D.notify ARIN of the Orion server's new IP address
E.update the destination IP address for Syslog and SNMP traps on your managed devices
Answer:AE

certification SCP   SCP-500   SCP-500 examen

NO.19 Which management protocol should you use to analyze network traffic in and out of a router
interface?
A.WMI
B.Syslog
C.IP service level agreement (SLA)
D.sFlow
Answer:D

SCP examen   SCP-500 examen   certification SCP-500

NO.20 Which two management protocols should you use to measure the effectiveness of your QoS
implementation? (Choose two.)
A.Syslog
B.SNMP
C.NetFlow
D.WMI
E.SSHv2
Answer:BC

SCP   SCP-500   SCP-500 examen   SCP-500   SCP-500

Vous n'avez besoin que de faire les exercices à propos du test SCP SCP-500 offertes par Pass4Test, vous pouvez réussir le test sans aucune doute. Et ensuite, vous aurez plus de chances de promouvoir avec le Certificat. Si vous ajoutez le produit au panier, nous vous offrirons le service 24h en ligne.

2013年9月25日星期三

Dernières SCP SC0-502 de la pratique de l'examen questions et réponses téléchargement gratuit

Pass4Test a de formations plus nouvelles pour le test SCP SC0-502. Les experts dans l'industrie IT de Pass4Test profitant leurs expériences et connaissances professionnelles à lancer les Q&As plus chaudes pour faciliter la préparation du test SCP SC0-502 à tous les candidats qui nous choisissent. L'importance de Certification SCP SC0-502 est de plus en plus claire, c'est aussi pourquoi il y a de plus en plus de gens qui ont envie de participer ce test. Parmi tous ces candidats, pas mal de gens ont réussi grâce à Pass4Test. Ces feedbacks peuvent bien prouver nos produits essentiels pour votre réussite de test Certification.

Vous pouvez tout d'abord télécharger le démo SCP SC0-502 gratuit dans le site Pass4Test. Une fois que vous décidez à choisir le Pass4Test, Pass4Test va faire tous efforts à vous permettre de réussir le test. Si malheureusement, vous ne passez pas le test, nous allons rendre tout votre argent.

Dans l'Industrie IT, le certificat IT peut vous permet d'une space plus grande de se promouvoir. Généralement, la promotion de l'entreprise repose sur ce que vous avec la certification. Le Certificat SCP SC0-502 est bien autorisé. Avec le certificat SCP SC0-502, vous aurez une meilleure carrière dans le future. Vous pouvez télécharger tout d'abord la partie gratuite de Q&A SCP SC0-502.

Code d'Examen: SC0-502
Nom d'Examen: SCP (Security Certified Program (SCP))
Questions et réponses: 40 Q&As

Vous avez aussi la possibilité à réussir le test SCP SC0-502. Pass4Test offre la service de la mise à jour gratuite pendant un an. Si vous échouez le test, votre argent sera tout rendu. Maintenant, vous pouvez télécharger la partie gratuite prendre examinser la qualité des produits de Pass4Test.

SC0-502 Démo gratuit à télécharger: http://www.pass4test.fr/SC0-502.html

NO.1 Evaluate the rollout, test, and modify as needed to improve the overall security of the
Certkiller trusted network.
C. You design the plan for two weeks, and then you present it to Blue. Your plan follows
these critical steps:
1. Draft a Certificate Policy (CP) document to define what users will be allowed to do
with their certificates, and a Certification Practice Statement (CPS) document to define
the technology used to ensure the users are able to use their certificates as per the CPS.
2. Draft a Certificate Practices Framework (CPF) document based on RFC 2527,
including every primary component.
3. Design the system to be a full hierarchy, with the Root CA located in the executive
building. Every remote office will have a subordinate CA, and every other building on
the campus in Testbed will have a subordinate CA.
4. Design the hierarchy with each remote office and building having it's own enrollment
CA.
5. Build a small test pilot program, to test the hierarchy, and integration with the existing
network.
6. Implement the CA hierarchy in the executive office, and get all users acclimated to the
system.
7. Implement the CA hierarchy in each other campus building in Testbed, and get all
users acclimated to the system.
8. One at a time, implement the CA hierarchy in each remote office; again getting all
users acclimated to the system.
9. Test the team in each location on proper use and understanding of the overall PKI and
their portion of the trusted network.
10. Evaluate the rollout, test, and modify as needed to improve the overall security of the
Certkiller trusted network.
D. You design the plan for two weeks, and then you present it to Blue. Your plan follows
these critical steps:
1. Draft a Certificate Policy (CP) document to define what users will be allowed to do
with their certificates, and a Certification Practice Statement (CPS) document to define
the technology used to ensure the users are able to use their certificates as per the CPS.
2. Draft a Certificate Practices Framework (CPF) document based on RFC 2527,
including every primary component.
3. Design the system to be a full mesh, with the Root CA located in the executive
building.
4. Design the mesh with each remote office and building having it's own Root CA.
5. Build a small test pilot program, to test the hierarchy, and integration with the existing
network.
6. Implement the CA mesh in the executive office, and get all users acclimated to the
system.
7. Implement the CA mesh in each other campus building in Testbed, and get all users
acclimated to the system.
8. One at a time, implement the CA mesh in each remote office; again getting all users
acclimated to the system.
9. Test the team in each location on proper use and understanding of the overall PKI and
their portion of the trusted network.
10. Evaluate the rollout, test, and modify as needed to improve the overall security of the
Certkiller trusted network.
E. You design the plan for two weeks, and then you present it to Blue. Your plan follows
these critical steps:
1. Draft a Certification Practice Statement (CPS) to define what users will be allowed to
do with their certificates, and a Certificate Policy (CP) to define the technology used to
ensure the users are able to use their certificates as per the CPS.
2. Draft a CPF based on your own guidelines, including physical and technology
controls.
3. Design the system to be a full mesh, with the Root CA located in the executive
building.
4. Design the mesh with each remote office and building having it's own Root CA.
5. Build a small test pilot program, to test the hierarchy, and integration with the existing
network.
6. Implement the CA mesh in the executive office, and get all users acclimated to the
system.
7. Implement the CA mesh in each other campus building in Testbed, and get all users
acclimated to the system.
8. One at a time, implement the CA mesh in each remote office; again getting all users
acclimated to the system.
9. Test the team in each location on proper use and understanding of the overall PKI and
their portion of the trusted network.
10. Evaluate the rollout, test, and modify as needed to improve the overall security of the
Certkiller trusted network.
Answer: C

certification SCP   SC0-502 examen   SC0-502   SC0-502 examen   SC0-502 examen   certification SC0-502
5.Blue thanks you for your plan and design and took it into consideration. You are
then informed that Blue has gone ahead and made a new plan, which will
incorporate some of your suggestions, but is going to build the network a bit
differently. In Testbed and in each remote office there will be a single self-sufficient
CA hierarchy, one that is designed to directly integrate with the existing network.
Blue mentions that the hierarchy is only to go two-levels deep, you are not to make
an extensive hierarchy in any location. This means a distinct CA hierarchy in six
locations, inclusive of the Testbed headquarters.
Using this information, choose the solution that will provide for the proper rollout
of the Certificate Authorities in the network.}
A. In each location, you recommend the following steps:
1. Harden a system to function as the Root CA
2. Harden a system to function as the Registration Authority
3. Configure CATool on the Root CA
4. Configure CATool on the Registration Authority, as a subordinate to the Root CA
5. Once the Subordinate CA is active, take the Root CA offline
6. Configure users for the CAs
7. Configure each Root CA to trust each other Root CA via cross certification
8. Test the CA hierarchy
9. Have the local administrative staff inform and train each user how to connect to the
Registration Authority through their browser and request a certificate
B. In each location, you recommend the following steps:
1. Harden a system to function as the Root CA
2. Harden a system to function as a Registration Authority
3. Configure a Windows Enterprise Root CA
4. Configure each Enterprise Root CA to trust each other Enterprise Root CA via cross
certification
5. Configure a Windows Stand-Alone Subordinate Enrollment Authority to function as
the Registration Authority
6. Once the Stand-Alone Subordinate is installed, take the Enterprise Root CA offline
7. Test the CA hierarchy
8. Have the local administrative staff inform and train each user how to connect to the
Registration Authority through their browser and request a certificate
C. In each location, you recommend the following steps:
1. Harden a system to function as the Root CA
2. Harden a system to function as the Registration Authority
3. Configure a Windows Enterprise Root CA
4. Configure each Enterprise Root CA to trust each other Enterprise Root CA via cross
certification
5. Configure a Windows Enterprise Registration Authority, as a subordinate to the
Enterprise Root CA
6. Once the Subordinate CA is active, take the Enterprise Root CA offline
7. Test the CA hierarchy
8. Have the local administrative staff inform and train each user how to connect to the
Registration Authority through their browser and request a certificate
D. In each location, you recommend the following steps:
1. Harden a system to function as the Root CA
2. Harden a system to function as the Registration Authority
3. Configure CATool on the Root CA
4. Configure CATool on the Registration Authority, as a subordinate to the Root CA
5. Configure users for the CAs
6. Configure each Root CA to trust each other Root CA via cross certification
7. Test the CA hierarchy
8. Have the local administrative staff inform and train each user how to connect to the
Registration Authority through their browser and request a certificate
E. In each location, you recommend the following steps:
1. Harden a system to function as the Root CA
2. Harden a system to function as the Registration Authority
3. Configure a Windows Enterprise Root CA
4. Configure each Enterprise Root CA to trust each other Enterprise Root CA via cross
certification
5. Configure a Windows Registration Authority, as a subordinate to the Enterprise Root
CA
6. Test the CA hierarchy
7. Have the local administrative staff inform and train each user how to connect to the
Registration Authority through their browser and request a certificate
Answer: E

SCP examen   SC0-502 examen   SC0-502 examen   SC0-502
6.Now that you have a fully functioning CA hierarchy in each location, and that the
trusted network is well underway, you are called in to meet with Blue. Blue comes
into the room, and you talk to one another for a while. It seems that now with the
CA hierarchy in place, you need to plan the certificate rollout for the individual
users and computers in the network.
Since this is the executive building, Blue places higher security requirements here
than on the other buildings. Certificates need to be issued to all the entities,
computers and users, in the network. Blue has decided that for all senior level
management, the process for certificate issuance should be even more secure than
the rest of the deployment.
Based on this information, and you understanding of the Certkiller environment,
choose the best solution to assigning certificates to the computers and users of the
trusted network in the Executive building:}
A. You meet with the other administrators of the executive building and let them know
what you are working on, and how they can help. You will first assign certificates to the
computers in the network, followed by assigning certificates to the users in the network.
For this task, you divide the other administrators into four teams, one per floor of the
building. Each team will be responsible for the assigning of certificates to the computers
and users on the corresponding floor. To make the process faster, you have decided to
install a new CA for each floor. The team leader on each floor will install and configure
the CA, and you will oversee the process.
With the new CAs installed, one administrator from each team goes to each desk on the
floor and makes a request for a certificate for the computer using Internet Explorer. Once
the machine certificate is installed, the administrator has each user log on to their
machine and the administrator walks the user through the process of connecting to the
CA_SERVER\certsrv on their floor to request a user certificate.
To ensure the security of the senior level management, you lead the team on the fourth
floor. You install the new CA yourself, and oversee the configuration of the certificates
for every machine and user on the floor.
B. You meet with the other administrators of the executive building and let them know
what you are working on, and how they can help. You will first assign certificates to the
computers in the network. To make the process easier, you have decided to configure the
network so that the computers will request certificates automatically. In order to do this
you perform the following steps:
1. You open Active Directory Users and Computers
2. You use Group Policy to edit the domain policy that is controlling the executive
building.
3. You expand Computer Configuration to Public Key Policies, and you click the
Automatic Certificate request option.
4. In the template list, you select computer, and define CA as the location to send the
request.
5. You restart the computers that you can, and wait for the policy to refresh on the
systems you cannot restart.
Once you finishing setting up the computers to be assigned certificates, you shift your
focus to all the users in the executive building. In order to have each user obtain a
certificate you issue a memo (the actual memo goes into extreme detail on each step,
even listing common questions and answers) to all users that instructs them to perform
the following steps:
1. Log on to your computer as your normal user account
2. Open Internet Explorer, and to connect to the CA_SERVER\certsrv.
3. Select the option to Request A Certificate, and to choose a User Certificate Request
type, then submit the request.
4. When the certificate is issued, click the Install This Certificate hyperlink on screen.
Finally, you address the senior level management. For these people, you want the
security to be higher, so you select a stronger algorithm for their certificates. With all the
other certificates, you used the default key strength and algorithms. However, the senior
level management needs higher security. Therefore, you personally walk each person
through the process of requesting a certificate; only you ensure that they select 1024-bit
AES as their encryption algorithm.
C. You meet with the other administrators of the executive building and let them know
what you are working on, and how they can help. You will first assign certificates to the
computers in the network. To make the process easier, you have decided to configure the
network so that the computers will request certificates automatically. In order to do this
you perform the following steps:
1. You open Active Directory Users and Computers
2. You use Group Policy to edit the domain policy that is controlling the executive
building.
3. You expand Computer Configuration to Public Key Policies, and you click the
Automatic Certificate request option.
4. In the template list, you select computer, and define CA as the location to send the
request.
5. You restart the computers that you can, and wait for the policy to refresh on the
systems you cannot restart.
Once you finishing setting up the computers to be assigned certificates, you shift your
focus to all the users in the executive building. In order to have each user obtain a
certificate you issue a memo (the actual memo goes into extreme detail on each step,
even listing common questions and answers) to all users that instructs them to perform
the following steps:
1. Log on to your computer as your normal user account
2. Open Internet Explorer, and to connect to the CA_SERVER\certsrv.
3. Select the option to Request A Certificate, and to choose a User Certificate Request
type, then submit the request.
4. When the certificate is issued, click the Install This Certificate hyperlink on screen.
Finally, you address the senior level management. For these people, you want the
security to be higher, so you select a different certificate scheme. By using a different
scheme, you ensure that there will be no possibility of other people in the building
gaining access to the senior level management accounts. For these accounts you utilize
licensed PGP digital certificates that can be used for both authentication and secure
email. You personally show each manager how to create and use their key ring, providing
for very secure communication.
D. You meet with the other administrators of the executive building and let them know
what you are working on, and how they can help. You will first assign certificates to the
computers in the network. To make the process easier, you have decided to configure the
network so that the computers will request certificates automatically. In order to do this
you perform the following steps:
1. You open Active Directory Users and Computers
2. You use Group Policy to edit the domain policy that is controlling the executive
building.
3. You expand Computer Configuration to Public Key Policies, and you click the
Automatic Certificate request option.
4. In the template list, you select computer, and define CA as the location to send the
request.
5. You restart the computers that you can, and wait for the policy to refresh on the
systems you cannot restart.
Once you finishing setting up the computers to be assigned certificates, you shift your
focus to the users, except for the senior management, in the executive building. In order
to have each user obtain a certificate you issue a memo (the actual memo goes into
extreme detail on each step, even listing common questions and answers) to all users that
instructs them to perform the following steps:
1. Log on to your computer as your normal user account
2. Open Internet Explorer, and to connect to the CA_SERVER\certsrv.
3. Select the option to Request A Certificate, and to choose a User Certificate Request
type, then submit the request.
4. When the certificate is issued, click the Install This Certificate hyperlink on screen.
Finally, you address the senior level management in the building. For these people, you
personally go into their office and walk through the steps with each person.
1. The user logs on to the computer with their normal user account
2. You open the MMC and add the personal certificates snap-in
3. You right-click certificates and Request A New Certificate
4. The user fills in the requested information, and you verify this information.
5. You put the certificate request onto a USB drive, and take the request back to the CA.
6. You put the USB drive into the CA, manually process the request, and put the issued
certificate onto the USB drive.
7. You bring the USB drive back to each person, and manually import their new
certificate
E. You meet with the other administrators of the executive building and let them know
what you are working on, and how they can help. You will first assign certificates to the
computers in the network. To make the process easier, you have decided to configure the
network so that the computers will request certificates automatically. In order to do this
you perform the following steps:
1. You open Active Directory Users and Computers
2. You use Group Policy to edit the domain policy that is controlling the executive
building.
3. You expand Computer Configuration to Public Key Policies, and you click the
Automatic Certificate request option.
4. In the template list, you select computer, and define CA as the location to send the
request.
5. You restart the computers that you can, and wait for the policy to refresh on the
systems you cannot restart.
Once you finishing setting up the computers to be assigned certificates, you shift your
focus to all the users in the executive building. In order to have each user obtain a
certificate you issue a memo (the actual memo goes into extreme detail on each step,
even listing common questions and answers) to all users that instructs them to perform
the following steps:
1. Log on to your computer as your normal user account
2. Open Internet Explorer, and to connect to the CA_SERVER\certsrv.
3. Select the option to Request A Certificate, and to choose a User Certificate Request
type, then submit the request.
4. When the certificate is issued, click the Install This Certificate hyperlink on screen.
Answer: D

SCP   certification SC0-502   SC0-502 examen
7.Now that the network is moving towards a trusted network, you are preparing for
the specific new implementations in Certkiller . Just as you wrap up some paperwork
for the morning, Blue calls you and lets you know that you are going to be needed in
a meeting this afternoon.
You get to Blue's office and sit down at the desk. Blue begins the conversation, "You
know we have some solid fundamental issues addressed in our new trusted network,
but I have yet to feel that we have addressed any serious concerns."
"I've been thinking about some similar issues," you reply.
"Good, then I'm sure you have been thinking about our email. Right now, I cannot
guarantee the integrity of any email, and I cannot guarantee the confidentiality of
any email. We have reasonable controls towards guaranteeing the availability of our
email, but what's the point if there is no confidentiality or integrity?"
"I agree. I think that addressing this issue should be an immediate priority."
"One concern is that whatever the system is that we put in place, it must be very
user-friendly. As we roll out these new systems, anything that will significantly
increase the calls into the help desk is something we need to minimize. A second
concern is that it not be too costly. We already have this new investment in the
trusted network, we need to be sure that we utilize what are building to the fullest
extent possible."
"I think we should be able to do that without much difficulty. I already have some
solid ideas," you reply.
"OK, take a few days on this. For the moment, just concern yourself with the
executive building; the others can follow the plan in their own buildings. Let's meet
again this coming Monday and you can describe your suggestion then."
Based on this conversation, and your knowledge of Certkiller , select the best solution
to the email problems in the network.}
A. After careful consideration you decide that you will implement secure email in a test
group using PGP. You will use a full licensed version of PGP. You will go to each
computer and you will install the full PGP on each system.
Once installed, you will show each user how to create a PGP certificate by requesting the
certificate from the CATool CA server you installed specifically for secure email. After
the user has received a certificate, you associate that PGP certificate with their Windows
domain user account.
With the PGP certificate associated with the user account, you show each user how to
manage their key ring. You show them how to generate their key, and you configure all
user's key strength to be 2048 bits. Now that the user has a strong key and a PGP
certificate, you configure the email client of each user.
You explain that each user will have to install the public key of each other user in the
network. You test this by sending an email from your laptop with your PGP certificate
attached, and you have the user save the attachment to their Outlook folder. With the
certificate saved, you show them how to send secure email to you. You receive the email
on your laptop, and double-click the lock to show the user that the secure email message
was successfully sent and received.
B. After careful consideration you decide that you will implement secure email in a test
group using X.509v3 digital certificates. You choose this since every user received their
certificate during an earlier phase, and those certificates included the ability to be used
for secure email.
Using the X.509v3 certificates, you will configure each machine to use S\MIME. You go
to each computer and open Outlook Express, which is the default client email program in
the test group. You go to the Tools and Account option, selecting the Mail tab, and the
properties for the email account.
You select he Security Tab and in the submenu for the Signing Certificate you configure
the certificate for the user's account. You select 3DES as the algorithm to use. You then
check the Encrypt Contents And Attachments For All Outgoing Messages check box and
the Digitally Sign All Outgoing Messages check box. You accept the default of including
the digital id when sending signed messages and the default to add sender's certificates to
the user's address book, and close the properties the email account.
You show the user how to send and receive email, showing the red ribbon that indicates a
signed message and the blue lock that indicates an encrypted message.
C. After careful consideration you decide that you will implement secure email in a test
group using GPG. You have decided to use GPG to avoid any licensing conflicts that
might occur if any user requires secure email exchange with another individual that is in
a country with different cryptography laws. You will go to each computer and you will
install GPG on each system.
Once installed, you will show each user how to create the required directory structure, by
typing the command: gpg --gen-key Once the directory structure is created, you will
show each user how to generate the required files, by typing the command: gpg --gen-key
Since you want very secure email, you configure each system to use 2048 bit key
strength and you select DSA and ElGamal encryption.
With GPG installed and configured, you show each user how to use their new secure
email. You have them open Outlook and create a new message to you. Once the message
is created, you have them select the Security drop-down list and choose both GPG Sign
and GPG Encrypt, and then press send.
You show them on your laptop that you receive the message. You press Reply, and on
your laptop also select the Security drop-down menu, where you choose both GPG Sign
and GPG Encrypt. The user receives the message, and you show that secure email was
successfully sent and received.
D. After careful consideration you decide that you will implement secure email in a test
group using PGP. You will use a full licensed version of PGP. You will go to each
computer and you will install the full PGP on each system.
Once installed, you will show each user how to create a PGP certificate by requesting the
certificate from the MS Enterprise Root CA server you installed, and configured
specifically for secure email certificates. After the user has received a certificate, you
associate that PGP certificate with their Windows domain user account.
With the PGP certificate associated with the user account, you show each user how to
manage their key ring. You show them how to generate their key, and you configure all
user's key strength to be 2048 bits. Now that the user has a strong key and a PGP
certificate, you configure the email client of each user.
You explain that each user will have to install the public key of each other user in the
network. You test this by sending an email from your laptop with your PGP certificate
attached, and you have the user save the attachment to their Outlook folder. With the
certificate saved, you show them how to send secure email to you. You receive the email
on your laptop, and double-click the lock to show the user that the secure email message
was successfully sent and received.
E. After careful consideration you decide that you will implement secure email in a test
group using X.509v3 digital certificates. You choose this since every user received their
certificate during an earlier phase, and those certificates included the ability to be used
for secure email.
You will configure each machine to use PGP, with the X.509v3 certificates option. You
go to each computer and open Outlook Express, which is the default client email program
in the test group. You go to the Tools and Account option, selecting the Mail tab, and the
properties for the email account.
You select he Security Tab and in the submenu for the Signing Certificate you configure
the certificate for the user's account. You select DSA and ElGamal as the cryptosystem to
use. You then check the Encrypt Contents And Attachments For All Outgoing Messages
check box and the Digitally Sign All Outgoing Messages check box. You accept the
default of including the digital id when sending signed messages and the default to add
sender's certificates to the user's address book, and close the properties the email account.
You show the user how to send and receive email, showing the red ribbon that indicates a
signed message and the blue lock that indicates an encrypted message.
Answer: B

SCP   SC0-502   SC0-502
8.You have now been involved in several major changes in the security of Certkiller ,
and specifically the Testbed campus. You have worked on the planning and design
of the trusted network, you have worked on the initial rollout of the CA hierarchy,
you have worked on assigning certificates to the end users and computers in the
Executive building of the Testbed campus, and you have managed the
implementation of secure email - a critical service for Certkiller .
Blue has asked you to meet with the other administrative staff of the Testbed
campus and discuss how the certificates will impact the organization. There are a
total of about 40 people in the meeting, and you have decided that your primary
focus during this meeting will be on encryption\cryptography.
Choose the best solution for providing the correct information to your
administrative staff on how encryption\cryptography and digital certificates will be
properly used in the network:}
A. You gather the administrative staff together in the conference room to discuss
cryptography in the network. You begin your talk with the function of cryptography, in
general, and then you move towards specific implementations in the Certkiller network.
You explain that public key cryptography is founded on math, and that the big picture
fundamental point is that UserA has a pair of keys and UserB has a pair of keys. You
explain that one key of each key pair is made available to the other users in the network.
You illustrate this with an example of sending an encrypted message from UserA to
UserB.
"We know, for example, that UserA wishes to send a message to UserB and wants that
message to be secure. UserB will use the public key that UserA has made available to
encrypt the message. Once encrypted, UserB will send the message over the network to
User
A. UserA will then use the other key of the pair, the private key to decrypt the
message," you explain to the group.
You further explain some of the common algorithms used in the network. You tell them
that Diffie-Hellman was the first widely used private key algorithm, and that
Diffie-Hellman itself is not used to secure messages, rather to exchange a symmetric key.
You explain that RSA was another breakthrough in that it was a private key algorithm
that was able to secure messages.
You then describe digital certificates and some of their features. You tell the group that
digital certificates can be assigned to different entities, including users and computers.
You state that these digital certificates include many options, for example an Issuer Field
that holds the distinguished name of the entity that issued the certificate, and a Subject
Field that holds the distinguished name of the person who has the private key that
corresponds to the public key in the certificate.
B. You gather the administrative staff together in the conference room to discuss
cryptography in the network. You begin your talk with the function of cryptography, in
general, and then you move towards specific implementations in the Certkiller network.
You explain that public key cryptography is founded on math, and that the big picture
fundamental point is that UserA has a pair of keys and UserB has a pair of keys. You
explain that one key of each key pair is made available to the other users in the network.
You illustrate this with an example of sending an encrypted message from UserA to
UserB.
"We know, for example, that UserA wishes to send a message to UserB and wants that
message to be secure. UserA will use the public key that UserB has made available to
encrypt the message. Once encrypted, UserA will send the message over the network to
UserB. UserB will then use the other key of the pair, called the private key, to decrypt the
message," you explain to the group.
You further explain some of the common algorithms used in the network. You tell them
that Diffie-Hellman was the first widely used public key algorithm, and that
Diffie-Hellman itself is not used to secure messages, rather to exchange a symmetric key.
You explain that RSA was another breakthrough in that it was a public key algorithm that
was able to secure messages.
You then describe digital certificates and some of their features. You tell the group that
digital certificates can be assigned to different entities, including users and computers.
You state that these digital certificates include many options, for example an Issuer Field
that holds the distinguished name of the entity that issued the certificate, and a Subject
Field that holds the distinguished name of the person who has the private key that
corresponds to the public key in the certificate.
C. You gather the administrative staff together in the conference room to discuss
cryptography in the network. You begin your talk with the function of cryptography, in
general, and then you move towards specific implementations in the Certkiller network.
You explain that public key cryptography is founded on math, and that the big picture
fundamental point is that UserA and UserB have a set of mathematically linked keys.
You explain that one key of each key pair is made available to the other users in the
network. You illustrate this with an example of sending an encrypted message from
UserA to UserB.
"We know, for example, that UserA wishes to send a message to UserB and wants that
message to be secure. UserA will use the public key that UserB has made available to
encrypt the message. Once encrypted, UserA will send the message over the network to
UserB. UserB will then use the other key of the pair, the private key to decrypt the
message," you explain to the group.
You further explain some of the common algorithms used in the network. You tell them
that RSA was the first widely used private key algorithm, and that RSA itself is not used
to secure messages, rather to exchange a symmetric key. You explain that Diffie-Hellman
was another breakthrough in that it was a private key algorithm that was able to secure
messages.
You then describe digital certificates and some of their features. You tell the group that
digital certificates can be assigned to different entities, including users and computers.
You state that these digital certificates include many options, for example an Issuer Field
that holds the distinguished name of the entity that issued the certificate, and a Subject
Field that holds the distinguished name of the person who has the private key that
corresponds to the public key in the certificate.
D. You gather the administrative staff together in the conference room to discuss
cryptography in the network. You begin your talk with the function of cryptography, in
general, and then you move towards specific implementations in the Certkiller network.
You explain that public key cryptography is founded on math, and that the big picture
fundamental point is that UserA and UserB have a set of mathematically linked keys.
You explain that one key of each key pair is made available to the other users in the
network. You illustrate this with an example of sending an encrypted message from
UserA to UserB.
"We know, for example, that UserA wishes to send a message to UserB and wants that
message to be secure. UserA will use the private key that UserB has made available to
encrypt the message. Once encrypted, UserA will send the message over the network to
UserB. UserB will then use the other key of the pair, the public key to decrypt the
message," you explain to the group.
You further explain some of the common algorithms used in the network. You tell them
that RSA was the first widely used private key algorithm, and that RSA itself is not used
to secure messages, rather to exchange a symmetric key. You explain that Diffie-Hellman
was another breakthrough in that it was a private key algorithm that was able to secure
messages.
You then describe digital certificates and some of their features. You tell the group that
digital certificates can be assigned to different entities, including users and computers.
You state that these digital certificates include many options, for example an Issuer Field
that holds the distinguished name of the entity that issued the certificate, and a Subject
Field that holds the distinguished name of the person who has the private key that
corresponds to the public key in the certificate.
E. You gather the administrative staff together in the conference room to discuss
cryptography in the network. You begin your talk with the function of cryptography, in
general, and then you move towards specific implementations in the Certkiller network.
You explain that public key cryptography is founded on math, and that the big picture
fundamental point is that UserA and UserB have a set of mathematically linked keys.
You explain that one key of each key pair is made available to the other users in the
network. You illustrate this with an example of sending an encrypted message from
UserA to UserB.
"We know, for example, that UserA wishes to send a message to UserB and wants that
message to be secure. UserA will use the private key that UserB has made available to
encrypt the message. Once encrypted, UserA will send the message over the network to
UserB. UserB will then use the other key of the pair, the public key to decrypt the
message," you explain to the group.
You further explain some of the common algorithms used in the network. You tell them
that RSA was the first widely used private key algorithm, and that RSA itself is not used
to secure messages, rather to exchange a symmetric key. You explain that Diffie-Hellman
was another breakthrough in that it was a private key algorithm that was able to secure
messages.
You then describe digital certificates and some of their features. You tell the group that
digital certificates can be assigned to different entities, including users and computers.
You state that these digital certificates include many options, for example an Issuer Field
that holds the distinguished name of the person who issued the certificate, and a Subject
Field that holds the full OIDs describing the use of the certificate by the holder of the
certificate.
Answer: B

SCP examen   SC0-502 examen   certification SC0-502   SC0-502   SC0-502
9.You have now seen to it that all end users and computers in the Testbed office have
received their certificates. The administrative staff has been trained on their use
and function in the network. The following day, you meet with Blue to discuss the
progress.
"So far so good," starts Blue, "all the users have their certificates, all the computers
have their certificates. I think we are moving forward at a solid pace. We have
talked about the ways we will use our certificates, and we need to move towards
securing our network traffic."
"I agree," you reply, "last week I ran a scheduled scan, and we still have
vulnerability in our network traffic. The folks from MassiveCorp would love to
have a sniffer running in here, I'm sure of that."
"That's exactly the point. We need a system in place that will ensure that our
network traffic is not so vulnerable to sniffing. We have to get some protection for
our packets. I'd like you to design the system and then we can review it together."
The meeting ends a few minutes later, and you are back in your office working on
the design.
Choose the best solution for protecting the network traffic in the executive office of
the Testbed campus:}
A. After further analysis on the situation, you decide that you will need to block traffic in
a more complete way at the border firewalls. You have decided that by implementing
stricter border control, you will be able to manage the security risk of the packets that
enter and leave the network better.
You implement a new firewall at each border crossing point. You will configure half of
the firewalls with Checkpoint FW-1 NG and the other half with Microsoft IS
A. By using
two different firewalls, you are confident that you will be minimizing any mass
vulnerability.
At each firewall you implement a new digital certificate for server authentication, and
you configure the firewall to require every user to authenticate all user connections. You
block all unauthorized traffic and run remote test scans to ensure that no information is
leaking through.
Once the test scans are complete, you verify that all users are required to authenticate
with the new firewall before their traffic is allowed to pass, and everything works as you
planned.
B. You spend time analyzing the network and decide that the best solution is to take
advantage of VPN technology. You will create one VPN endpoint in each building. Your
plan is to create a unique tunnel between each building.
You first install a new Microsoft machine, and configure it to perform the functions of
Routing and Remote Access. You then create a tunnel endpoint, and configure each
machine to use L2TP to create the tunnel.
To increase security, you will implement full 256-bit encryption on each tunnel, and you
will use 3DES on one half of the tunnels and AES on the other half of the tunnels. You
will be sure that each tunnel uses the same algorithm on both ends, but by using two
algorithms you are sure that you have increased the security of the network in a
significant way.
C. You decide that you will implement an IPSec solution, using the built-in functionality
of Windows. You decide that you wish for there to be maximum strength, and therefore
you choose to implement IPSec using both AH and ESP.
First, you configure each server in the network with a new IPSec policy. You choose to
implement the default Server IPSec Policy. Using this policy you are sure that all
communication both to and from the server will utilize IPSec. You reboot the servers that
you can and use secedit to force the others to refresh their policy.
Next, with the help of the administrative staff, you will configure each client in the
network. For the clients, you use the default Client IPSec Policy. You reboot the client
machines that you can and use secedit to force the others to refresh their policy.
D. You decide that you will implement an IPSec solution, using custom IPSec settings.
You wish to utilize the digital certificates that are available in the network. You decide
that you wish for there to be maximum strength, and therefore you choose to implement
IPSec using both AH and ESP.
First, you configure a custom policy for the servers in the network. You verify that none
of the default policies are currently implemented, and you create a new policy. Your new
policy will use SHA for AH and SHA+3DES for ESP. You make sure that the policy is
to include all IP traffic, and for Authentication Method, you use the certificate that is
assigned to each server. You reboot the servers that you can and use secedit to force the
others to refresh their policy.
Next, with the help of the administrative staff, you will configure each client in the
network. For the clients, you verify that no default policy is enabled, and you create a
policy that uses SHA for AH and SHA+3DES for ESP. You make sure that the policy is
to include all IP traffic, and for Authentication Method, you use the certificate that is
assigned to each server. You reboot the client machines that you can and use secedit to
force the others to refresh their policy.
E. You decide that you will implement an IPSec solution, using custom IPSec settings.
You wish to utilize the digital certificates that are available in the network. You decide
that you wish for there to be maximum strength, and therefore you choose to implement
IPSec using both AH and ESP.
First, you configure a custom policy for the servers in the network. To increase strength,
you will implement your custom policy on top of the default Server IPSec Policy. You
verify that the policy is running, and then you create a new policy. Your new policy will
use SHA+3DES for AH and SHA for ESP. You make sure that the policy is to include all
IP traffic, and for Authentication Method, you use the certificate that is assigned to each
server. You reboot the servers that you can and use secedit to force the others to refresh
the two policies.
Next, with the help of the administrative staff, you will configure each client in the
network. For the clients you also need the highest in security, so you will use a custom
policy on the default policy. You verify that the default Client IPSec policy is enabled,
and then you create a policy that uses SHA+3DES for AH and SHA for ESP. You make
sure that the policy is to include all IP traffic, and for Authentication Method, you use the
certificate that is assigned to each server. You reboot the client machines that you can
and use secedit to force the others to refresh the two policies.
Answer: D

SCP examen   SC0-502   certification SC0-502   certification SC0-502   SC0-502
10.You had been taking a short vacation, and when you come into work on Monday
morning, Blue is already at your door, waiting to talk to you.
"We've got a problem," Blue says, "It seems that the password used by our Vice
President of Engineering has been compromised. Over the weekend, we found this
account had logged into the network 25 times. The Vice President was not even in
the office over the weekend."
"Did we get the source of the compromise yet?"
"No, but it won't surprise me if it is our new neighbors at MassiveCorp. I need to
you to come up with a realistic plan and bring it to me tomorrow afternoon. This
problem must be resolved, and like everything else we do not have unlimited funds -
so keep that in mind."
Based on this information, choose the best solution to the password local
authentication problem in the Executive building.}
A. Since you are aware of the significance of the password problems, you plan to address
the problem using technology. You write up a plan for Blue that includes the following
points:
1. For all executives you recommend no longer using passwords, and instead migrating to
a token-based authentication system.
2. You will install the RSA SecurID time-based token system.
3. You will create SecurID user records for each user to match their domain accounts.
4. You will assign each user record a unique token.
5. You will hand deliver the tokens to the correct executive.
6. Users will be allowed to create their own PIN, which will be 4 characters long.
7. The tokens will replace all passwords for authentication into each user's Windows
system.
B. Since you are aware of the significance of the password problems, and since you do
not have unlimited funds, you plan to address this problem through education and
through awareness. You write up a plan for Blue that includes the following points:
1. All end users are to be trained on the methods of making strong passwords
2. All end users are instructed that they are to change their password at a minimum of
every 30 days.
3. The administrative staff is to run password-checking utilities on all passwords every
30 days.
4. All end users are to be trained on the importance of never disclosing their password to
any other individual.
5. All end users are to be trained on the importance of never writing down their
passwords where they are clearly visible.
C. Since you are aware of the significance of the password problems, you plan to address
the problem using technology. You write up a plan for Blue that includes the following
points:
1. You will reconfigure the Testbed. Certkiller .org domain to control the password
problem.
2. You will configure AD in this domain so that complex password policies are required.
3. The complex password policies will include:
a. Password length of at least 8 characters
b. Passwords must be alphanumeric
c. Passwords must meet Gold Standard of complexity
d. Passwords must be changed every 30 days
e. Passwords cannot be reused
D. Since you are aware of the significance of the password problems, you plan to address
the problem using technology. You write up a plan for Blue that includes the following
points:
1. For all executives you recommend no longer using passwords, and instead migrating to
a token-based authentication system.
2. You will install the RSA SecurID challenge-response token system.
3. You will create SecurID user records for each user to match their domain accounts.
4. You will assign each user record a unique token.
5. You will hand deliver the tokens to the correct executive.
6. Users will be required to use tokencodes from the One-Time tokencode list. The
tokencodes will be alphanumeric and will be 4 characters long.
7. The tokens will replace all passwords for authentication into each user's Windows
system.
E. Since you are aware of the significance of the password problems, plan to address the
problem using technology. You write up a plan for Blue that includes the following
points:
1. For all executives you recommend no longer using passwords, and instead migrating to
a biometric solution.
2. You will install retinal scanners at every user's desktop in the executive building.
3. You will personally enroll each user at each desktop.
4. You will instruct each user on the proper positioning and use of the scanner.
5. The biometric system will replace all passwords for authentication into each user's
Windows system.
Answer: A

SCP   SC0-502 examen   certification SC0-502   SC0-502

NO.2 Build a small test pilot program, to test the hierarchy, and integration with the existing
network.

NO.3 Now that you have Certkiller somewhat under control, you are getting ready to go
home for the night. You have made good progress on the network recently, and
things seem to be going smoothly. On your way out, you stop by the CEO's office
and say good night. You are told that you will be meeting in the morning, so try to
get in a few minutes early.
The next morning, you get to the office 20 minutes earlier than normal, and the
CEO stops by your office, "Thanks for coming in a bit early. No problem really, I
just wanted to discuss with you a current need we have with the network."
"OK, go right ahead." You know the network pretty well by now, and are ready for
whatever is thrown your way.
"We are hiring 5 new salespeople, and they will all be working from home or on the
road. I want to be sure that the network stays safe, and that they can get access no
matter where they are."
"Not a problem," you reply. "I'll get the plan for this done right away."
"Thanks a lot, if you have any questions for me, just let me know."
You are relieved that there was not a major problem and do some background work
for integrating the new remote users. After talking with the CEO more, you find out
that the users will be working from there home nearly all the time, with very little
access from on the road locations.
The remote users are all using Windows 2000 Professional, and will be part of the
domain. The CEO has purchased all the remote users brand new Compaq laptops,
just like the one used in the CEO's office, and which the CEO takes home each
night; complete with DVD\CD-burner drives, built-in WNICs, 17" LCD widescreen
displays, oversized hard drives, a gig of memory, and fast processing. 'I wish I was
on the road to get one of those,' you think.
You start planning and decide that you will implement a new VPN Server next to
the Web and FTP Server. You are going to assign the remote users IP Addresses:
10.10.60.100~10.10.60.105, and will configure the systems to run Windows 2000
Professional.
Based on this information, and your knowledge of the Certkiller network up to this
point, choose the best solution for the secure remote user needs:}
A. You begin with configuring the VPN server, which is running Windows 2000 Server.
You create five new accounts on that system, granting each of them the Allow Virtual
Private Connections right in Active Directory Users and Computers. You then configure
the range of IP Addresses to provide to the clients as: 10.10.60.100 through 10.10.60.105.
Next, you configure five IPSec Tunnel endpoints on the server, each to use L2TP as the
protocol.
Then, you configure the clients. On each system, you configure a shortcut on the desktop
to use to connect to the VPN. The shortcut is configured to create an L2TP IPSec tunnel
to the VPN server. The connection itself is configured to exchange keys with the user's
ISP to create a tunnel between the user's ISP endpoint and the Certkiller VPN Server.
B. To start the project, you first work on the laptops you have been given. On each
laptop, you configure the system to make a single Internet connection to the user's ISP.
Next, you configure a shortcut on the desktop for the VPN connection. You design the
connection to use L2TP, with port filtering on outbound UDP 500 and UDP 1701. When
a user double-clicks the desktop icon you have it configured to make an automatic tunnel
to the VPN server.
On the VPN server, you configure the system to use L2TP with port filtering on inbound
UDP 500 and UDP 1701. You create a static pool of assigned IP Address reservations for
the five remote clients. You configure automatic redirection on the VPN server in the
routing and remote access MMC, so once the client has connected to the VPN server, he
or she will automatically be redirected to the inside network, with all resources available
in his or her Network Neighborhood.
C. You configure the VPN clients first, by installing the VPN High Encryption Service
Pack. With this installed, you configure the clients to use RSA, with 1024-bit keys. You
configure a shortcut on the desktop that automatically uses the private\public key pair to
communicate with the VPN Server, regardless of where the user is locally connected.
On the VPN Server, you also install the VPN High Encryption Service Pack, and
configure 1024-bit RSA encryption. You create five new user accounts, and grant them
all remote access rights, using Active Directory Sites and Services. You configure the
VPN service to send the server's public key to the remote users upon the request to
configure the tunnel. Once the request is made, the VPN server will build the tunnel,
from the server side, to the client.
D. You decide to start the configuration on the VPN clients. You create a shortcut on the
desktop to connect to the VPN Server. Your design is such that the user will simply
double-click the shortcut and the client will make the VPN connection to the server,
using PPTP. You do not configure any filters on the VPN client systems.
On the VPN Server, you first configure routing and remote access for the new accounts
and allow them to have Dial-In access. You then configure a static IP Address pool for
the five remote users. Next, you configure the remote access policy to grant remote
access, and you implement the following PPTP filtering:
¨´Inbound Protocol 47 (GRE) allowed
¨´Inbound TCP source port 0, detination port 1723 allowed
¨´Inbound TCP source port 520, destination port 520 allowed
¨´Outbound Protocol 47 (GRE) allowed
¨´Outbound TCP source port 1723, destination port 0 allowed
¨´Outbound TCP source port 520, destination port 520 allowed
E. You choose to configure the VPN server first, by installing the VPN High Encryption
Service Pack and the HISECVPN.INF built-in security template through the Security
Configuration and Analysis Snap-In. Once the Service pack and template are installed,
you configure five user accounts and a static pool of IP Addresses for each account.
You then configure the PPTP service on the VPN server, without using inbound or
outbound filters - due to the protection of the Service Pack. You grant each user the right
to dial into the server remotely, and move on to the laptops.
On each laptop, you install the VPN High Encryption Service Pack, to bring the security
level of the laptops up to the same level as the VPN server. You then configure a shortcut
on each desktop that controls the direct transport VPN connection from the client to the
server.
Answer: D

SCP examen   SC0-502   certification SC0-502   SC0-502

NO.4 It has been quite some time since you were called in to address the network and
security needs of Certkiller . You feel good in what you have accomplished so far.
You have been able to get Certkiller to deal with their Security Policy issue, you have
secured the router, added a firewall, added intrusion detection, hardened the
Operating Systems, and more.
One thing you have not done however, is run active testing against the network from
the outside. This next level of testing is the final step, you decide, in wrapping up
this first stage of the new Certkiller network and security system. You setup a
meeting with the CEO to discuss.
"We have only one significant issue left to deal with here at Certkiller ," you begin.
"We need some really solid testing of our network and our security systems."
"Sounds fine to me, don't you do that all the time anyway? I mean, why meet about
this?"
"Well, in this case, I'd like to ask to bring in outside help. Folks who specialize in
this sort of thing. I can do some of it, but it is not my specialty, and the outside look
in will be better and more independent from an outside team."
"What does that kind of thing cost, how long will it take?"
"It will cost a bit of money, it won't be free, and with a network of our size, I think it
can be done pretty quick. Once this is done and wrapped up, I will be resigning as
the full time security and network pro here. I need to get back to my consulting
company full time. Remember, this was not to be a permanent deal. I can help you
with the interview, and this is the perfect time to wrap up that transition."
"All right, fair enough. Get me your initial project estimates, and then I can make a
more complete decision. And, I'll get HR on hiring a new person right away."
Later that afternoon you talk to the CEO and determine a budget for the testing.
Once you get back to your office, you are calling different firms and consultants,
and eventually you find a consulting group that you will work with.
A few days later you meet with the group in their office, and you describe what you
are looking for, and that their contact and person to report to is you. They ask what
is off limits, and your response is only that they cannot do anything illegal, to which
they agree and point out is written in their agreement as well.
With this outside consulting group and your knowledge of the network and
company, review and select the solution that will best provide for a complete test of
the security of Certkiller .}
A. The consulting group has identified the steps it will follow in testing the network. You
have asked to be kept up to date, and given an approximate schedule of events. You
intend to follow along with the test, with weekly reports.
The first thing the consultants will do is dumpster diving and physical surveillance,
looking for clues as to user information and other secret data that should not be outside of
the network. Once they have identified several targets through the dumpster diving, they
will run scans to match up and identify the workstations for those users.
After identifying the user workstations, they will run vulnerability checks on the systems,
to find holes, and if a hole is found they have been given permission to exploit the hole
and gain access of the system.
They will attempt to gain access to the firewall and router remotely, via password
guessing, and will test the response of the network to Denial of Service attacks. Finally,
they will call into Certkiller to see what information they can learn via social engineering.
B. The consulting group has identified the steps it will follow in testing the network. You
have asked to be kept up to date, and given an approximate schedule of events. You
intend to follow along with the test, with weekly reports.
The consultants will first run remote network surveillance to identify hosts, followed by
port scans and both passive and active fingerprinting. They will then run vulnerability
scanners on the identified systems, and attempt to exploit any found vulnerabilities. They
will next scan and test the router and firewall, followed by testing of the IDS rules.
They will then perform physical surveillance and dumpster diving to learn additional
information. This will be followed by password sniffing and cracking. Finally, they will
call into Certkiller to see what information they can learn via social engineering.
C. The consulting group has identified the steps it will follow in testing the network. You
have asked to be kept up to date, and given an approximate schedule of events. You
intend to follow along with the test, with weekly reports.
The consultants surprise you with their initial strategy. They intend to spend nearly 100%
of their efforts over the first week on social engineering and other physical techniques,
using little to no technology. They have gained access to the building as a maintenance
crew, and will be coming into the office every night when employees are wrapping up for
the day.
All of their testing will be done through physical contact and informal questioning of the
employees. Once they finish that stage, they will run short and direct vulnerability
scanners on the systems that they feel will present weakness.
D. The consulting group has identified the steps it will follow in testing the network. You
have asked to be kept up to date, and given an approximate schedule of events. You
intend to follow along with the test, with weekly reports.
The consultants have decided on a direct strategy. They will work inside the Certkiller
office, with the group introducing themselves to the employees. They will directly
interview each employee, and perform extensive physical security checks of the network.
They will review and provide analysis on the security policy, and follow that with
electronic testing. They will run a single very robust vulnerability scanner on every
single client and server in the network, and document the findings of the scan.
E. The consulting group has identified the steps it will follow in testing the network. You
have asked to be kept up to date, and given an approximate schedule of events. You
intend to follow along with the test, with weekly reports.
The consultants will start the process with remote network surveillance, checking to see
what systems and services are available remotely. They will run both passive and active
fingerprinting on any identified system. They will run customized vulnerability scanners
on the identified systems, and follow that through with exploits, including new zero-day
exploits they have written themselves.
They will next run scans on the router, firewall, and intrusion detection, looking to
identify operating systems and configurations of these devices. Once identified, they will
run customized scripts to gain access to these devices. Once they complete the testing on
the systems, they will dumpster dive to identify any leaked information.
Answer: B

certification SCP   SC0-502   SC0-502   SC0-502 examen   SC0-502

NO.5 Evaluate the rollout, test, and modify as needed to improve the overall security of the
Certkiller trusted network.
B. You design the plan for two weeks, and then you present it to Blue. Your plan follows
these critical steps:
1. Draft a Certification Practice Statement (CPS) to define what users will be allowed to
do with their certificates, and a Certificate Policy (CP) to define the technology used to
ensure the users are able to use their certificates as per the CPS.
2. Draft a CPF based on your own guidelines, including physical and technology
controls.
3. Design the system, outside of the executive office, to be a full hierarchy, with the Root
CA for the hierarchy located in the executive building. Every remote office will have a
subordinate CA, and every other building on the campus in Testbed will have a
subordinate CA.
4. In the executive building, you design the system to be a mesh CA structure, with one
CA per floor of the building.
5. Design the hierarchy with each remote office and building having it's own enrollment
CA.
6. Build a small test pilot program, to test the hierarchy, and integration with the existing
network.
7. Implement the CA hierarchy in the executive office, and get all users acclimated to the
system.
8. Implement the CA hierarchy in each other campus building in Testbed, and get all
users acclimated to the system.
9. One at a time, implement the CA hierarchy in each remote office; again getting all
users acclimated to the system.
10. Test the team in each location on proper use and understanding of the overall PKI and
their portion of the trusted network.

NO.6 One at a time, implement the CA hierarchy in each remote office; again getting all
users acclimated to the system.

NO.7 Implement the CA hierarchy in the executive office, and get all users acclimated to the
system.

NO.8 Test the team in each location on proper use and understanding of the overall PKI and
their portion of the trusted network.

NO.9 For three years you have worked with Certkiller doing occasional network and
security consulting. Certkiller is a small business that provides real estate listings
and data to realtors in several of the surrounding states. The company is open for
business Monday through Friday from 9 am to 6 pm, closed all evenings and
weekends. Your work there has largely consisted of advice and planning, and you
have been frequently disappointed by the lack of execution and follow through from
the full time staff.
On Tuesday, you received a call from Certkiller 's HR director, "Hello, I'd like to
inform you that Red (the full time senior network administrator) is no longer with
us, and we would like to know if you are interested in working with us full time."
You currently have no other main clients, so you reply, "Sure, when do you need me
to get going?"
"Today," comes the fast and direct response. Too fast, you think.
"What is the urgency, why can't this wait until tomorrow?"
"Red was let go, and he was not happy about it. We are worried that he might have
done something to our network on the way out."
"OK, let me get some things ready, and I'll be over there shortly."
You knew this would be messy when you came in, but you did have some advantage
in that you already knew the network. You had recommended many changes in the
past, none of which would be implemented by Red. While pulling together your
laptop and other tools, you grab your notes which have an overview of the network:
Certkiller network notes: Single Internet access point, T1, connected to Certkiller
Cisco router. Router has E1 to a private web and ftp server and E0 to the LAN
switch. LAN switch has four servers, four printers, and 100 client machines. All the
machines are running Windows 2000. Currently, they are having their primary web
site and email hosted by an ISP in Illinois.
When you get to Certkiller , the HR Director and the CEO, both of whom you
already know, greet you. The CEO informs you that Red was let go due to difficult
personality conflicts, among other reasons, and the termination was not cordial.
You are to sign the proper employment papers, and get right on the job. You are
given the rest of the day to get setup and running, but the company is quite
concerned about the security of their network. Rightly so, you think, 'If these guys
had implemented even half of my recommendations this would sure be easier.' You
get your equipment setup in your new oversized office space, and get started. For
the time you are working here, your IP Address is 10.10.50.23 with a mask of \16.
One of your first tasks is to examine the router's configuration. You console into the
router, issue a show running-config command, and get the following output:
MegaOne#show running-config
Building configuration...
Current configuration:
!
version 12.1
service udp-small-servers
service tcp-small-servers
!
hostname MegaOne
!
enable secret 5 $1$7BSK3$H394yewhJ45JAFEWU73747.
enable password clever
!
no ip name-server
no ip domain-lookup
ip routing
!
interface Ethernet0
no shutdown
ip address 2.3.57.50 255.255.255.0
no ip directed-broadcast
!
interface Ethernet1
no shutdown
ip 10.10.40.101 255.255.0.0
no ip directed-broadcast
!
interface Serial0
no shutdown
ip 1.20.30.23 255.255.255.0
no ip directed-broadcast
clockrate 1024000
bandwidth 1024
encapsulation hdlc
!
ip route 0.0.0.0 0.0.0.0 1.20.30.45
!
line console 0
exec-timeout 0 0
transport input all
line vty 0 4
password remote
login
!
end
After analysis of the network, you recommend that the router have a new
configuration. Your goal is to make the router become part of your layered defense,
and to be a system configured to help secure the network.
You talk to the CEO to get an idea of what the goals of the router should be in the
new configuration. All your conversations are to go through the CEO; this is whom
you also are to report to.
"OK, I suggest that the employees be strictly restricted to only the services that they
must access on the Internet." You begin.
"I can understand that, but we have always had an open policy. I like the employees
to feel comfortable, and not feel like we are watching over them all the time. Please
leave the connection open so they can get to whatever they need to get to. We can
always reevaluate this in an ongoing basis."
"OK, if you insist, but for the record I am opposed to that policy."
"Noted," responds the CEO, somewhat bluntly.
"All right, let's see, the private web and ftp server have to be accessed by the
Internet, restricted to the accounts on the server. We will continue to use the Illinois
ISP to host our main web site and to host our email. What else, is there anything
else that needs to be accessed from the Internet?"
"No, I think that's it. We have a pretty simple network, we do everything in house."
"All right, we need to get a plan in place as well right away for a security policy.
Can we set something up for tomorrow?" you ask.
"Let me see, I'll get back to you later." With that the CEO leaves and you get to
work.
Based on the information you have from Certkiller ; knowing that the router must be
an integral part of the security of the organization, select the best solution to the
organization's router problem:}
A. You backup the current router config to a temp location on your laptop. Friday night,
you come in to build the new router configuration. Using your knowledge of the network,
and your conversation with the CEO, you build and implement the following router
configuration:
MegaOne#configure terminal
MegaOne(config)#no cdp run
MegaOne(config)#no ip source-route
MegaOne(config)#no ip finger
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 80
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 20
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 21
MegaOne(config)#access-list 175 permit tcp any 10.10.0.0 0.0.255.255 established
MegaOne(config)#access-list 175 deny ip 0.0.0.0 255.255.255.255 any
MegaOne(config)#access-list 175 deny ip 10.0.0.0 0.255.255.255 any
MegaOne(config)#access-list 175 deny ip 127.0.0.0 0.255.255.255 any
MegaOne(config)#access-list 175 deny ip 172.16.0.0 0.0.255.255 any
MegaOne(config)#access-list 175 deny ip 192.168.0.0 0.0.255.255 any
MegaOne(config)#access-list 175 permit ip any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 permit udp any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 permit icmp any 10.10.0.0 0.0.255.255
MegaOne(config)#interface serial 0
MegaOne(config-if)#ip access-group 175 in
MegaOne(config-if)#no ip directed broadcast
MegaOne(config-if)#no ip unreachables
MegaOne(config-if)#Z
MegaOne#
B. You backup the current router config to a temp location on your laptop. Sunday night,
you come in to build the new router configuration. Using your knowledge of the network,
and your conversation with the CEO, you build and implement the following router
configuration:
MegaOne#configure terminal
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 80
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 20
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 21
MegaOne(config)#access-list 175 permit tcp any 10.10.0.0 0.0.255.255 established
MegaOne(config)#access-list 175 permit ip any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 permit udp any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 permit icmp any 10.10.0.0 0.0.255.255
MegaOne(config)#interface Ethernet 0
MegaOne(config-if)#ip access-group 175 in
MegaOne(config-if)#no cdp enable
MegaOne(config)#interface Ethernet 1
MegaOne(config-if)#ip access-group 175 in
MegaOne(config-if)#no cdp enable
MegaOne(config-if)#Z
MegaOne#
C. You backup the current router config to a temp location on your laptop. Early Monday
morning, you come in to build the new router configuration. Using your knowledge of
the network, and your conversation with the CEO, you build and implement the
following router configuration:
MegaOne#configure terminal
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 80
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 20
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 21
MegaOne(config)#access-list 175 permit tcp any 10.10.0.0 0.0.255.255 established
MegaOne(config)#access-list 175 permit ip any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 permit udp any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 permit icmp any 10.10.0.0 0.0.255.255
MegaOne(config)#interface Serial 0
MegaOne(config-if)#ip access-group 175 in
MegaOne(config-if)#no cdp enable
MegaOne(config-if)#no ip directed broadcast
MegaOne(config-if)#no ip unreachables
MegaOne(config-if)#Z
MegaOne#
D. As soon as the office closes Friday, you get to work on the new router configuration.
Using your knowledge of the network, and your conversation with the CEO, you build
and implement the following router configuration:
MegaOne#configure terminal
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 80
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 20
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 21
MegaOne(config)#access-list 175 permit tcp any 10.10.0.0 0.0.255.255 established
MegaOne(config)#access-list 175 permit ip any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 permit udp any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 permit icmp any 10.10.0.0 0.0.255.255
MegaOne(config)#interface Ethernet 0
MegaOne(config-if)#ip access-group 175 in
MegaOne(config)#interface Ethernet 1
MegaOne(config-if)#ip access-group 175 in
MegaOne(config-if)#Z
MegaOne#
E. With the office closed, you decide to build the new router configuration on Saturday.
Using your knowledge of the network, and your conversation with the CEO, you build
and implement the following router configuration:
MegaOne#configure terminal
MegaOne(config)#no cdp run
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 80
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 20
MegaOne(config)#access-list 175 permit tcp any 2.3.57.60 0.0.0.0 eq 21
MegaOne(config)#access-list 175 permit tcp any 10.10.0.0 0.0.255.255 established
MegaOne(config)#access-list 175 permit ip any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 permit udp any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 permit icmp any 10.10.0.0 0.0.255.255
MegaOne(config)#access-list 175 deny ip 0.0.0.0 255.255.255.255 any
MegaOne(config)#access-list 175 deny ip 10.0.0.0 0.255.255.255 any
MegaOne(config)#access-list 175 deny ip 127.0.0.0 0.255.255.255 any
MegaOne(config)#access-list 175 deny ip 172.16.0.0 0.0.255.255 any
MegaOne(config)#access-list 175 deny ip 192.168.0.0 0.0.255.255 any
MegaOne(config)#no ip source-route
MegaOne(config)#no ip finger
MegaOne(config)#interface serial 0
MegaOne(config-if)#ip access-group 175 in
MegaOne(config-if)#no ip directed broadcast
MegaOne(config-if)#no ip unreachables
MegaOne(config-if)#Z
MegaOne#
Answer: A

SCP   SC0-502   SC0-502 examen   certification SC0-502   SC0-502

NO.10 Implement the CA hierarchy in each other campus building in Testbed, and get all
users acclimated to the system.

NO.11 Certkiller is a company that makes state of the art aircraft for commercial and
government use. Recently Certkiller has been working on the next generation of low
orbit space vehicles, again for both commercial and governmental markets.
Certkiller has corporate headquarters in Testbed, Nevada, US
A. Testbed is a small
town, with a population of less than 50,000 people. Certkiller is the largest company
in town, where most families have at least one family member working there.
The corporate office in Testbed has 4,000 total employees, on a 40-acre campus
environment. The largest buildings are the manufacturing plants, which are right
next to the Research and Development labs. The manufacturing plants employee
approximately 1,000 people and the R&D labs employ 500 people. There is one
executive building, where approximately 500 people work. The rest of the employees
work in Marketing, Accounting, Press and Investor Relations, and so on. The entire
complex has a vast underground complex of tunnels that connect each building.
All critical functions are run from the Testbed office, with remote offices around the
world. The remote offices are involved in marketing and sales of Certkiller products.
These offices also perform maintenance on the Certkiller aircraft and will
occasionally perform R&D and on-site manufacturing.
There are 5 remote offices, located in: New York, California, Japan, India, and
England. Each of the remote offices has a dedicated T3 line to the Certkiller HQ,
and all network traffic is routed through the Testbed office - the remote offices do
not have direct Internet connections.
You had been working for two years in the New York office, and have been
interviewing for the lead security architect position in Testbed. The lead security
architect reports directly to the Chief Security Officer (CSO), who calls you to let
you know that you got the job. You are to report to Testbed in one month, just in
time for the annual meeting, and in the meantime you review the overview of the
Certkiller network.
Your first day in Certkiller Testbed, you get your office setup, move your things in
place, and about the time you turn on your laptop, there is a knock on your door. It
is Blue, the Chief Security Officer, who informs you that there is a meeting that you
need to attend in a half an hour.
With your laptop in hand, you come to the meeting, and are introduced to everyone.
Blue begins the meeting with a discussion on the current state of security in
Certkiller .
"For several years now, we have constantly been spending more and more money
on our network defense, and I feel confident that we are currently well defended."
Blue, puts a picture on the wall projecting the image of the network, and then
continues, "We have firewalls at each critical point, we have separate Internet
access for our public systems, and all traffic is routed through our controlled access
points. So, with all this, you might be wondering why I have concern."
At this point a few people seem to nod in agreement. For years, Certkiller has been
at the forefront of perimeter defense and security. Most in the meeting are not
aware that there is much else that could be done.
Blue continues, "Some of you know this, for the rest it is new news: MassiveCorp is
moving their offices to the town right next to us here. Now, as you all know,
MassiveCorp has been trying to build their orbital systems up to our standards for
years and have never been able to do so. So, from a security point of view, I am
concerned."
This is news to most people, Green, the Vice President of Research asks, "We have
the best in firewalls, we have the best in you and your systems, what are you
suggesting?"
Blue responds, "I suggest trust. Not with MassiveCorp, but in our own systems. We
must build trusted networks. We must migrate our network from one that is
well-defended to one that is well-defended and one that allows us to trust all the
network traffic."
The meeting continues for some time, with Blue leading the discussion on a whole
new set of technologies currently not used in the network. After some time, it is
agreed upon that Certkiller will migrate to a trusted networking environment.
The following week, Blue informs you that you will be working directly together on
the development of the planning and design of the trusted network. The network is
going to run a full PKI, with all clients and servers in the network using digital
certificates. You are grateful that in the past two years, Blue has had all the systems
changed to be running only Windows 2000, both server and professional systems,
running Active Directory. You think the consistent platform will make the PKI roll
out easier.
The entire Certkiller network is running Active Directory, with the domain
structure as in the following list:
Testbed. Certkiller .org
Newyork. Certkiller .org
California. Certkiller .org
Japan. Certkiller .org
India. Certkiller .org
England. Certkiller .org
Although you will be working in the Testbed office, the plan you develop will need
to include the entire Certkiller organization.
Based on this information, select the solution that describes the best plan for the
new trusted network of Certkiller :}
A. You design the plan for two weeks, and then you present it to Blue. Your plan follows
these critical steps:
1. Draft a Certification Practice Statement (CPS) to define what users will be allowed to
do with their certificates, and a Certificate Policy (CP) to define the technology used to
ensure the users are able to use their certificates as per the CPS.
2. Draft a CPF based on your own guidelines, including physical and technology
controls.
3. Design the system to be a full hierarchy, with the Root CA located in the executive
building. Every remote office will have a subordinate CA, and every other building on
the campus in Testbed will have a subordinate CA.
4. Design the hierarchy with each remote office and building having it's own enrollment
CA.

Pass4Test est un site d'offrir l'outil de formation convenable pour les candidats de test Certification IT. Le produit de Pass4Test peut aider les candidats à économiser les temps et les efforts. L'outil de formation est bien proche que test réel. Vous allez réussir le test 100% avec l'aide de test simulation de Pass4Test. C'est une bonne affaire à prendre le Certificat IT en coûtant un peu d'argent. N'hésitez plus d'ajouter l'outil de formation au panier.