vineri, 22 martie 2013

SCP SC0-502 Test Download - Computers - Certification


Security Certified Program SC0-502 Test

SC0-502

QUESTION 1Now that you possess Certkiller to some extent below control, that you're becoming willing to gohome for the night. You include made excellent develop within the multi-level recently, andthings look going smoothly. On on your path out, you halt from the CEO's officeand state great night. You are usually told in which you might often be interacting with in the morning, consequently try toget in a little while early.The next morning, you become towards the workplace 20 mins sooner than normal, and also theCEO stops by way of your office, "Thanks for coming in rather early. No trouble really, Ijust wanted to discuss using everyone a current have we've found with the network.""OK, choose appropriate ahead." You realize the particular community pretty effectively by simply now, and they are geared up forwhatever is cast ones way."We are using the services of 5 various innovative salespeople, and so they could just about all often be doing work from residence and also upon theroad. I desire to be sure which the circle continues safe, and the they'll have access nomatter exactly where many people are.""Not some sort of problem," you reply. "I'll get the approach in this done proper away.""Thanks a lot, if you have every questions with regard to me, just well then , i'll know."You tend to be done with the effort that will there were not really a significant dilemma and do some qualifications workfor helping the new remote users. After speaking along with the actual CEO more, you find outthat the particular clients will be doing work after that residence as a rule the actual time, with quite littleaccess from traveling locations.The remote pc help customers are generally most implementing Windows 2000 Professional, and is going to be portion of thedomain. The CEO features bought many of the remote clients brand brand-new Compaq laptops,just such as just one applied within the CEO's office, and also which the CEO takes property eachnight; ful l of DVDCD-burner drives,built-in WNICs, 17"LCD widescreendisplays, oversized hard drives, a gig regarding memory, as well as rapidly processing. 'I want I wason this street to obtain certainly one of those,' you think.You start out preparing as well as choose that you implement a fresh VPN Server up coming tothe Web and FTP Server. You are going to assign the remote computer support people IP Addresses:10.10.60.100~10.10.60.105, and definately will configure your models to own Windows 2000Professional.Based on this information, as well as a person's knowledge with the Certkiller system as long as thispoint, select the top answer with regard to that protect remote pc help user needs:}

A. You start out with configuring your VPN server, that's going Windows 2000 Server.You generate five brand-new company accounts on that system, approving everyone the actual Allow VirtualPrivate Connections proper around Active Directory Users plus Computers. You and then configurethe collection of IP Addresses to deliver towards purchasers as: 10.10.60.100 through 10.10.60.105.Next, a person configure five IPSec Tunnel endpoints to the server, each one make use of L2TP seeing that theprotocol.Then, a person configure the actual clients. On each one system, anyone configure some sort of shortcut on the desktopto use to connect into the VPN. The shortcut is configured to generate a great L2TP IPSec tunnelto your VPN server. The connection alone is definitely designed for you to alternate secrets while using user'sISP in order to make a tunnel in between the particular user's ISP endpoint and the Certkiller VPN Server.B. To get started your project, anyone earliest work wit hin the laptops you have happen to be given. On eachlaptop, people configure your program for making a particular Internet link with your user's ISP. SC0-502

Next, you configure your shortcut on the actual desktop for the VPN connection. You layout theconnection make use of L2TP, along with convey blocking with outbound UDP five hundred plus UDP 1701. Whena user double-clicks this desktop icon you could have them configured to produce an intelligent tunnelto the particular VPN server.On that VPN server, everyone configure the particular method to use L2TP together with vent blocking on inboundUDP 500 along with UDP 1701. You develop some sort of static beach connected with designated IP Address booking forthe personal training online computer repair clients. You configure automated redirection around the VPN machine with therouting and rural admittance MMC, thus as soon as the client has connected towards the VPN server, heor she will routinely always be redirected towards inside network, with most of assets availablein their own Network Neighborhood.C. You configure the VPN people first, by simply adding that VPN High Encrypti on ServicePack. With the following installed, a person configure the particular consumers to work with RSA, along with 1024-bit keys. Youconfigure a shortcut about the desktop that on auto-pilot employs the particular privatepublic essential set of two tocommunicate along with that VPN Server, no matter exactly where the user will be in your area connected.On that VPN Server, you additionally install that VPN High Encryption Service Pack, andconfigure 1024-bit RSA encryption. You create personal training brand new person accounts, along with scholarhip themall remote computer support access rights, using Active Directory Sites as well as Services. You configure theVPN support to mail your server's court critical towards the remote users when the actual request toconfigure your tunnel. Once the ask for is actually made, the VPN device will probably construct that tunnel,from this server side, towards the client.D. You get out there and begin your configuration about the VPN c lients. You create a shortcut on thedesktop to connect to the VPN Server. Your pattern is these that the end user will simplydouble-click the shortcut along with the client could make that VPN interconnection in order to the server,using PPTP. You do not configure any filters within the VPN consumer systems.On the VPN Server, anyone first configure routing and remote computer repair access for the brand new accountsand permit them to obtain Dial-In access. You after that configure a static IP Address pool forthe personal training online computer repair users. Next, a person configure that remote computer support access insurance plan that will scholarship remoteaccess, also , you implement the examples below PPTP filtering:Inbound Protocol 47 (GRE) allowedInbound TCP source port 0, destination convey 1723 allowedInbound TCP source port 520, vacation spot opening 520 allowedOutbound Protocol 47 (GRE) allowedOutbound TCP source interface 1723, getaway opening 0 allowedOutbound TCP origin port 520, destination port 520 allowedE. You choose to configure this VPN server first, by means of installing the actual VPN High EncryptionService Pack along with the HISECVPN.INF built-in protection theme throughout the SecurityConfiguration as well as Analysis Snap-In. Once the Service load up and structure usually are installed,you configure personal training person balances as well as a static collection with IP Addresses for every single account.You subsequently configure the particular PPTP company within the VPN server, without having utilizing incoming oroutbound filters - due to the defense with the Service Pack. You grant each individual that rightto dial towards the actual server remotely, along with move on for the laptops.On every laptop, a person installation this VPN High Encryption Service Pack, to help take the securitylevel involving that laptop computers approximately the same level as the actual VPN server. You then configure a new shortcuto n each desktop computer of which handles the actual primary transport VPN network in the consumer to help theserver. SC0-502

Answer: D

QUESTION 2For three years you've got worked with Certkiller doing unexpected multilevel andsecurity consulting. Certkiller may be a business to provide serious property listingsand data to be able to agents in a number regarding the adjoining states. The organization is definitely amenable forbusiness Monday through Friday from hunting for am that will 6 pm, shut many evenings andweekends. Your do the job generally there has mostly consisted with guidance as well as planning, and youhave been frequently disillusioned from the not enough delivery and also stick to by way of fromthe entire moment staff.On Tuesday, anyone been given a call from Certkiller 's HR director, "Hello, I'd like toinform everyone in which Red (the entire time older person system administrator) is usually not anymore withus, along with we'd plan to learn in case you are considering using the services of individuals total time."You presently posess zero various other most important clients, so a person reply, "Sure, while do you really need meto get going?""Today," shows up this quick plus lead response. Too fast, a person think."What could be the urgency, the reason why can not this wait right until tomorrow?""Red seemed to be let go, plus he / she was not happy regarding it. We tend to be anxious this he or she might havedone one thing to our community on how out.""OK, allow me to find some good stuff ready, along with I'll become about generally there shortly."You believed this could be unpleasant when you came in, however you have have got many advantagein that you just already realized the actual network. You acquired proposed countless changes inside thepast, none that can be executed through Red. While tugging mutually yourlaptop and also other tools, anyone snap up ones information that have a summary associated with that network:Certkiller multi-level notes: Single Internet access point, T1, associated with CertkillerCisco router. Router provides E1 to some priva te website and also file transfer protocol node and also E0 towards the LANswitch. LAN swap has three servers, several printers, plus hundred customer machines. All themachines usually are working Windows 2000. Currently, there're acquiring their primary website along with e mail hosted by a strong ISP inside Illinois.When you get to be able to Certkiller , the particular HR Director and the CEO, each regarding to whom youalready know, greet you. The CEO updates you that Red was make it possible for proceed as a result of difficultpersonality conflicts, among other reasons, as well as the termination has not been cordial.You will be to be able to signal appropriate business papers, plus get right within the job. You aregiven that remaining evening in order to get startup in addition to running, however the provider is actually quiteconcerned about the protection of the network. Rightly so, you think, 'If these guyshad integrated possibly half associated with my referrals thi s specific might certain end up being easier.' Youget your current equipment launch inside your brand-new oversized office space, and obtain started. Forthe time period you're operating here, your IP Address will be 10.10.50.23 that has a hide connected with 16.One of one's primary responsibilities is usually to study that router's configuration. You gaming system towards therouter, matter a display running-config command, and have the pursuing output:MegaOne#show running-configBuilding configuration...Current configuration:!version 12.1 SC0-502

service udp-small-serversservice tcp-small-servers!hostname MegaOne!enable secret 5 $1$7BSK3$H394yewhJ45JAFEWU73747.enable password clever!no ip name-serverno ip domain-lookupip routing!interface Ethernet0no shutdownip address 2.3.57.50 255.255.255.0no ip directed-broadcast!interface Ethernet1no shutdownip 10.10.40.101 255.255.0.0no ip directed-broadcast!interface Serial0no shutdownip 1.20.30.23 255.255.255.0no ip directed-broadcastclockrate 1024000bandwidth 1024encapsulation hdlc!ip road 0.0.0.0 0.0.0.0 1.20.30.45!line unit 0exec-timeout 0 0transport feedback allline vty 0 4password remotelogin!endAfter analysis with the network, people advise that your router include a newconfiguration. Your goal is definitely to generate your router grow to be component of your own split defense,and to become a technique configured to support safe your network.You speak to this CEO for you to acquire an idea of what the ambitions belonging to the router ought to be in thenew configurati on.All your talks are usually to go through your CEO;this is whomyou are also to help review to. SC0-502

"OK, I suggest which the particular staff often be firmly minimal that will only the assistance of which theymust gain access to about the Internet." You begin."I can easily comprehend that, however we now have continually have an wide open policy. I including the employeesto look comfortable, and not feel for instance we're reviewing around all those meals your time. Pleaseleave the actual link open up so they really will get in order to no matter what they want for getting to. We canalways reevaluate this specific in a continuous basis.""OK, if you ever insist, nevertheless with the file I am averse to in which policy.""Noted," takes action this CEO, somewhat bluntly."All right, let's see, the non-public web as well as file transfer protocol equipment ought to be looked at by means of theInternet, restricted towards balances with the actual server. We will keep utilize the IllinoisISP that will intended for some of our main web page in addition to to be able to sponsor s ome of our email. What else, there has to be anythingelse that needs to often be seen coming from the particular Internet?""No, I think that may be it. We have a quite simple network, most of us do every little thing throughout house.""All right, most people should get an agenda in place also without delay for your safety policy.Can most people set a thing up for tomorrow?" an individual ask."Let me see, I'll get back to an individual later." With how the CEO leaves so you find towork.Based within the tips you could have through Certkiller;knowing in which router should bean essential a part of the protection on the organization, decide on one of the best method for theorganization's router problem:}

A. You stop-gap existing router config to somewhat of a temp spot on your laptop. Friday night,you appear in to make the fresh router configuration. Using your awareness of this network,and a person's conversation while using CEO, anyone build and implement this particular routerconfiguration:MegaOne#configure terminalMegaOne(config)#no cdp runMegaOne(config)#no ip source-routeMegaOne(config)#no ip fingerMegaOne(config)#access-list 175 permit tcp almost any 2.3.57.60 0.0.0.0 eq 80MegaOne(config)#access-list 175 grant tcp just about any 2.3.57.60 0.0.0.0 eq 20MegaOne(config)#access-list 175 allow tcp any 2.3.57.60 0.0.0.0 eq 21MegaOne(config)#access-list 175 allow tcp just about any 10.10.0.0 0.0.255.255 establishedMegaOne(config)#access-list 175 refuse ip 0.0.0.0 255.255.255.255 anyMegaOne(config)#access-list 175 not think ip 10.0.0.0 0.255.255.255 anyMegaOne(config)#access-list 175 not allow ip 127.0.0.0 0.255.255.255 anyMegaOne(config)#access-list 175 not allow ip 172.16 .0.0 0.0.255.255 anyMegaOne(config)#access-list 175 refuse ip 192.168.0.0 0.0.255.255 anyMegaOne(config)#access-list 175 permit ip any 10.10.0.0 0.0.255.255MegaOne(config)#access-list 175 enable udp any kind of 10.10.0.0 0.0.255.255MegaOne(config)#access-list 175 grant icmp any 10.10.0.0 0.0.255.255MegaOne(config)#interface serial 0MegaOne(config-if)#ip access-group 175 inMegaOne(config-if)#no ip aimed broadcastMegaOne(config-if)#no ip unreachablesMegaOne(config-if)#Z

Original Resource :

Visit SC0-502 Link : SC0-502 Download PDF Link : SC0-502



access point vs router

Niciun comentariu:

Trimiteți un comentariu