SCNP IACRB Scns Tactical Perimeter Defense Practice Test - Set 1

Test your knowledge with this SCNP IACRB Scns Tactical Perimeter Defense mock exam. Get real-world IT questions and prepare for certification success.

SCNS: SCNS Tactical Perimeter Defense - Exam Information

Exam Information

Exam Code

SCNP IACRB Scns Tactical Perimeter Defense

Exam Title

SCNS: SCNS Tactical Perimeter Defense

Vendor

SCNP

Difficulty

Advanced

Duration

3 Hours

Question Format

Multiple Choice

Last Updated

March 7, 2025

Focuses on tactical security perimeter defense techniques.

Practice Test

Shop Best SCNS: SCNS Tactical Perimeter Defense Resources Worldwide Amazon

1. What is the goal of tactical perimeter defense?

Protecting the perimeter from attacks
Eliminating all network vulnerabilities
Focusing only on server security
Eliminating all external threats

2. Which security control is commonly used to protect the network perimeter?

Firewalls
Packet sniffers
Load balancers
Data warehouses

3. What is the purpose of an intrusion detection system (IDS)?

Monitoring network traffic for suspicious activity
Blocking all incoming traffic
Managing encryption keys
Optimizing network speed

4. Which network security device actively blocks threats?

Intrusion Prevention System (IPS)
Packet analyzer
Network switch
Honeypot

5. What is the main function of a demilitarized zone (DMZ)?

Isolating public-facing services from internal networks
Encrypting all network traffic
Replacing the need for a firewall
Blocking all external traffic

6. Which protocol is commonly used for secure remote access?

SSH
Telnet
HTTP
SNMP

7. What is the primary role of a honeypot in network security?

Attracting and analyzing malicious activity
Blocking all incoming network traffic
Encrypting sensitive data
Optimizing bandwidth usage

8. Which technique helps prevent unauthorized access to wireless networks?

Implementing WPA3 encryption
Using open Wi-Fi networks
Disabling firewalls
Lowering signal strength

9. What is the primary purpose of network segmentation?

Limiting lateral movement of attackers
Increasing network speed
Replacing antivirus software
Eliminating the need for firewalls

10. Which security measure verifies the identity of users before granting access?

Authentication
Encryption
Patching
Load balancing

11. Which technology provides secure communication over an untrusted network?

VPN
NAT
Proxy server
Load balancer

12. Which security model enforces the principle of least privilege?

Role-Based Access Control (RBAC)
Open Access Policy
Bring Your Own Device (BYOD)
Peer-to-Peer Networking

13. What is a zero-day attack?

An exploit targeting an undisclosed vulnerability
A cyberattack that lasts for 24 hours
A type of phishing attack
A security patch released immediately

14. Which type of firewall operates at the application layer?

Web Application Firewall (WAF)
Packet-filtering firewall
Stateful firewall
Circuit-level gateway

15. What is the primary function of a Security Information and Event Management (SIEM) system?

Centralized collection and analysis of security events
Blocking all unauthorized connections
Managing software development processes
Optimizing server performance

16. Which security measure can help prevent SQL injection attacks?

Input validation
Disabling firewalls
Allowing all incoming traffic
Using plaintext passwords

17. Which attack involves overwhelming a target system with excessive traffic?

Denial-of-Service (DoS)
Man-in-the-Middle
Phishing
DNS Spoofing

18. What is the main advantage of using Multi-Factor Authentication (MFA)?

Enhancing security by requiring multiple authentication methods
Eliminating the need for passwords
Speeding up the login process
Allowing anonymous access

19. What is the purpose of an access control list (ACL)?

Defining rules for network traffic permissions
Encrypting stored passwords
Blocking all internet access
Preventing phishing attacks

20. Which security control ensures that data remains confidential during transmission?

Encryption
Redundancy
Compression
Virtualization

21. What is the primary purpose of a next-generation firewall (NGFW)?

Provide application-aware security controls
Only filter packets based on IP/port
Replace all IDS systems
Manage user passwords

22. Which protocol is most vulnerable to eavesdropping attacks?

FTP
HTTPS
SSH
IPSec

23. What is the primary security benefit of implementing VLANs?

Logical separation of network segments
Increased network speed
Eliminates need for firewalls
Automatically encrypts all traffic

24. Which technique helps prevent MAC flooding attacks on switches?

Port security
VLAN hopping
ARP spoofing
DNS poisoning

25. What is the primary purpose of a security gateway?

Control traffic between networks with different security levels
Replace all routers
Only monitor internal traffic
Manage user workstations

26. Which wireless security protocol is considered most secure?

WPA3
WEP
WPA
WPA2

27. What is the primary purpose of network access control (NAC)?

Enforce security policies on devices before granting network access
Replace all firewalls
Only monitor outgoing traffic
Manage cloud storage

28. Which technique helps prevent ARP spoofing attacks?

Dynamic ARP inspection
Port mirroring
MAC flooding
VLAN hopping

29. What is the primary purpose of a jump box?

Secure administrative access to sensitive systems
Replace all switches
Monitor user web browsing
Manage DNS records

30. Which protocol provides secure file transfers?

SFTP
TFTP
FTP
HTTP

31. What is the primary purpose of a web application firewall (WAF)?

Protect against application-layer attacks
Replace network firewalls
Only filter email traffic
Manage user permissions

32. Which technique helps prevent DNS cache poisoning?

DNSSEC
DNS forwarding
Anycast DNS
DNS load balancing

33. What is the primary purpose of a network tap?

Monitor network traffic without affecting flow
Replace IDS systems
Block malicious traffic
Manage user accounts

34. Which protocol provides secure remote desktop access?

RDP with TLS
VNC
Telnet
SSH

35. What is the primary purpose of a packet filtering firewall?

Control traffic based on IP/port rules
Inspect application content
Replace all routers
Manage cloud services

36. Which technique helps prevent VLAN hopping attacks?

Disable dynamic trunking protocol
Enable port security
Implement MAC filtering
Use NAT

37. What is the primary purpose of a reverse proxy?

Protect internal servers from direct access
Replace load balancers
Only monitor outgoing traffic
Manage DNS records

38. Which protocol provides secure VoIP communications?

SRTP
RTP
SIP
H.323

39. What is the primary purpose of a network intrusion detection system (NIDS)?

Monitor network traffic for suspicious activity
Block all malicious traffic
Replace firewalls
Manage user permissions

40. Which technique helps prevent MAC flooding attacks?

Port security
ARP inspection
VLAN segmentation
Network access control

41. What is the primary purpose of a forward proxy?

Control outbound traffic from internal users
Replace VPNs
Monitor database activity
Manage web servers

42. Which protocol provides secure time synchronization?

NTP with authentication
SNTP
NTP
PTP

43. What is the primary purpose of a unified threat management (UTM) device?

Combine multiple security functions in one appliance
Replace all network security controls
Only monitor user behavior
Manage cloud storage

44. Which technique helps prevent STP manipulation attacks?

BPDU guard
Port security
Root guard
VLAN segmentation

45. What is the primary purpose of network behavior analysis (NBA)?

Detect anomalies in network traffic patterns
Replace IDS systems
Encrypt all communications
Manage user accounts

46. Which protocol provides secure directory services?

LDAPS
LDAP
Active Directory
Kerberos

47. What is the primary purpose of a network access control list (ACL)?

Define rules for permitted network traffic
Replace firewalls
Encrypt data in transit
Monitor user activity

48. Which technique helps prevent DNS tunneling?

DNS filtering
DNSSEC
DNS load balancing
DNS forwarding

49. What is the primary purpose of a network time protocol (NTP) server?

Synchronize time across network devices
Replace authentication servers
Encrypt network traffic
Monitor user behavior

50. Which technique helps prevent ICMP flood attacks?

Rate limiting
Port security
ARP inspection
VLAN segmentation

51. What is the primary purpose of a network segmentation gateway?

Control traffic between network segments
Replace all firewalls
Encrypt database backups
Monitor user activity

52. Which protocol provides secure SNMP communications?

SNMPv3
SNMPv2
SNMPv1
RMON

53. What is the primary purpose of a network admission control (NAC) system?

Enforce security policies before granting network access
Replace VPNs
Monitor database activity
Encrypt email communications

54. Which technique helps prevent DHCP spoofing?

DHCP snooping
Port security
ARP inspection
VLAN segmentation

55. What is the primary purpose of a network load balancer?

Distribute traffic across multiple servers
Replace firewalls
Encrypt network traffic
Monitor user behavior

56. Which protocol provides secure syslog transmissions?

Syslog over TLS
Syslog
SNMP
NetFlow

57. What is the primary purpose of a network access server (NAS)?

Handle authentication for remote users
Replace all firewalls
Encrypt database backups
Monitor network performance

58. Which technique helps prevent IP spoofing?

Ingress filtering
Egress filtering
Port security
VLAN segmentation

59. What is the primary purpose of a network time protocol (NTP) server?

Synchronize time across network devices
Replace authentication servers
Encrypt network traffic
Monitor user behavior

60. Which technique helps prevent SYN flood attacks?

SYN cookies
Port security
ARP inspection
VLAN segmentation

The SCNP IACRB Scns Tactical Perimeter Defense certification is a globally recognized credential for IT professionals. This practice test helps you prepare by covering key topics like hardware, networking, troubleshooting, and security.

Want more practice? Check out our other mock exams:

© 2025 ITCertRocket.com - Hands-On IT Lab Exercises & Certification Prep. All rights reserved.