REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Hogard
 
 

 

Braindumps of SC0-402
Network Defense and Countermeasures

Exam Questions, Answers, Braindumps (SC0-402)

This braindumps is provided with ratings from different students. I used www.examcheats.net study material and the exam was not a problem for me.

QUESTION 1
It has come to your attention that some host on the web has tried to do some reconnaissance on your network and send a VRFY command to try and steal user names. What type of attack was used against your network?
A. SMTP attack
B. Web browser attack
C. IMAP attack
D. IP Spoofing
E. Account scan
Answer: A

QUESTION 2
What technology is being employed to resist SYN floods by having each side of the connection attempt create its own sequence number (This sequence number contains a synopsis of the connection so that if/when the connection attempt is finalized the fist part of the attempt can be re-created from the sequence number)?
A. SYN cookie
B. SYN floodgate
C. SYN gate
D. SYN damn
E. SYN flood break
Answer: A

QUESTION 3
The main reason you have been hired at a company is to bring the network security of the organization up to current standards. A high priority is to have a full security audit of the network as soon as possible. You have chosen an Independent Audit and are describing it to your coworkers.
Which of the following best describes an Independent Audit?
A. An independent audit is usually conducted by external or outside resources and may be a review or audit of detailed audit logs.
B. The independent audit is usually done by the current network administrators who ensure the security measures are up to international standards.
C. The independent audit is typically done by an internal team who ensures the security measures are up to international standards.
D. The independent audit is usually done by internal resources to examine the current daily and on-going activities within a network system for compliance with an established security policy.
E. The independent audit is typically done by a contracted outside team of security experts who check for policy compliance.
Answer: A

QUESTION 4
The main reason you have been hired at a company is to bring the network security of the organization up to current standards. A high priority is to have a full security audit of the network as soon as possible. You have chosen an Operational Audit and are describing it to your coworkers.
Which of the following best describes an Operational audit?
A. This type of audit is typically done by a contracted external team of security experts who check for policy compliance.
B. This type of audit is usually done by internal resources to examine the current daily and on-going activities within a network system for compliance with an established security policy.
C. This type of audit is typically done by an internal team who ensures the security measures are up to international standards.
D. This type of audit is usually done by the current network administrators who ensure the security measures are up to international standards.
E. This type of audit is usually conducted by external resources and may be a review or audit of detailed audit logs.
Answer: B

QUESTION 5
Which of the following best describes the Insurance Model?
A. Before incurring the cost for insuring an inoperative asset, check for maintenance agreements that may include the cost of insurance itself.
B. The insurance model is the transference of risk to an insurance company that covers the costs of replacing the critical assets within your network. The drawbacks are increase in premiums after making a claim, high premiums anyway, down time while the insurance company is processing the claim, and claim may not pay what replacement costs are today.
C. The insurance model makes use of preventive measures and regular service as well as updates such as Service Packs, maintenance updates, and patches. Preventive measures can also improve the chances of the insurance model working better than if the system had no preventive measures ever taken.
D. The insurance model makes use of the acknowledged skills and abilities of the existing personnel. Knowing that assets have very specific dollar values assigned to them, the choice on how to manage the asset is based on the experience of the personnel.
E. Assets will typically cost much more than the original capital outlay that it took to purchase it long ago. Insurance costs can be very high and a decision to exercise this model should not be made in haste. There are also depreciation issues to deal with as well.
Answer: B

SC0-402


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend