SCNS-EN.pdf - Exin SCNS-EN SCNS Tactical Perimeter Defense...

This preview shows page 1 - 4 out of 7 pages.

SCNS-EN Exin SCNS Tactical Perimeter Defense
A. The MAC Address, the IP Address and the IP Protocol ID B. The IP Address, the IP Protocol ID and a Port number C. The MAC Address and the IP Protocol ID D. The MAC Address, the IP Protocol ID and a Port number E. The Ethertype and a Port number Answer: B QUESTION: 224 In an ICMP Message, what is the function of the first eight bits? B
QUESTION: 225 You are introducing a co-worker to the security systems in place in your organization. Early in the discussion you begin talking about the network, and how it is implemented. You decide to run a packet capture to identify different aspects of network traffic for your co-worker. In the packet capture you are able to identify Protocol IDs. Which of the following is the IP Protocol ID for UDP? D
QUESTION: 226 94
In order to properly manage the network traffic in your organization, you need a complete understanding of protocols and networking models. In regards to the 7-layer OSI model, what is the function of the Network Layer?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture