Article by testkingworld.org
ECCouncil EC0-479 Real Questions ? Education ? Special Education
Search by Author, Title or Content
Article ContentAuthor NameArticle Title
Home
Submit Articles
Author Guidelines
Publisher Guidelines
Content Feeds
RSS Feeds
FAQ
Contact Us
EC-Council Certified Security Analyst (ECSA) EC0-479 Test
EC0-479
QUESTION: 1When you are running a vulnerability scan on a network and the IDS cuts off yourconnection, what type of IDS is being used?
A. Passive IDSB. Active IDSC. Progressive IDSD. NIPS
Answer: B
QUESTION: 2Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated andwants to hack into his former company?s network. Since Simon remembers some of the servernames, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying toaccomplish here?
A. Send DOS commands to crash the DNS serversB. Perform DNS poisoningC. Perform a zone transferD. Enumerate all the users in the domain
Answer: C
QUESTION: 3What will the following command produce on a website login page?SELECT email, passwd, login_id, full_nameFROM membersWHERE email = ?someone@somehwere.net?; DROP TABLE members; ??
A. Deletes the entire members tableB. Inserts the Error! Reference source not found. email address into the members tableC. Retrieves the password for the first user in the members tableD. This command will not produce anything since the syntax is incorrect
Answer: A
QUESTION: 4You setup SNMP in multiple offices of your company. Your SNMP software manager is notreceiving data from other offices like it is for your main office. You suspect that firewall EC0-479
changes are to blame. What ports should you open for SNMP to work through Firewalls(Select 2)
A. 162B. 161C. 163D. 160
Answer: A, B
QUESTION: 5You are carrying out the last round of testing for your new website before it goes live. Thewebsite has many dynamic pages and connects to a SQL backend that accesses your productinventory in a database. You come across a web security site that recommends inputting thefollowing code into a search field on web pages to check for vulnerabilities: .When you type this and click on search, you receivea pop-up window that says: ?This is a test.? What is the result of this test?
A. Your website is vulnerable to CSSB. Your website is not vulnerableC. Your website is vulnerable to SQL injectionD. Your website is vulnerable to web bugs
Answer: A
QUESTION: 6If an attacker?s computer sends an IPID of 31400 to a zombie computer on an open port inIDLE scanning, what will be the response?
A. The zombie will not send a responseB. 31402C. 31399D. 31401
Answer: D
QUESTION: 7Michael works for Kimball Construction Company as senior security analyst. As part ofyearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michaelconducts XMAS scan and most of the ports scanned do not give a response. In what state EC0-479
are these ports?
A. ClosedB. OpenC. StealthD. Filtered
Answer: B
QUESTION: 8You are assisting a Department of Defense contract company to become compliant with thestringent security policies set by the DoD. One such strict rule is that firewalls must onlyallow incoming connections that were first initiated by internal computers. What type offirewall must you implement to abide by this policy?
A. Packet filtering firewallB. Circuit-level proxy firewallC. Application-level proxy firewallD. Statefull firewall
Answer: D
QUESTION: 9Jessica works as systems administrator for a large electronics firm. She wants to scan hernetwork quickly to detect live hosts by using ICMP ECHO Requests. What type of scan isJessica going to perform?
A. TracertB. Smurf scanC. Ping traceD. ICMP ping sweep
Answer: D
QUESTION: 10You work as an IT security auditor hired by a law firm in Boston to test whether you cangain access to sensitive information about the company clients. You have rummagedthrough their trash and found very little information. You do not want to set off any alarmson their network, so you plan on performing passive footprinting against their Web servers.What tool should you use?
QUESTION: 6If an attacker?s computer sends an IPID of 31400 to a zombie computer on an open port inIDLE scanning, what will be the response?
A. The zombie will not send a responseB. 31402C. 31399D. 31401
Answer: D
QUESTION: 7Michael works for Kimball Construction Company as senior security analyst. As part ofyearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michaelconducts XMAS scan and most of the ports scanned do not give a response. In what state EC0-479
are these ports?
A. ClosedB. OpenC. StealthD. Filtered
Answer: B
QUESTION: 8You are assisting a Department of Defense contract company to become compliant with thestringent security policies set by the DoD. One such strict rule is that firewalls must onlyallow incoming connections that were first initiated by internal computers. What type offirewall must you implement to abide by this policy?
A. Packet filtering firewallB. Circuit-level proxy firewallC. Application-level proxy firewallD. Statefull firewall
Answer: D
QUESTION: 9Jessica works as systems administrator for a large electronics firm. She wants to scan hernetwork quickly to detect live hosts by using ICMP ECHO Requests. What type of scan isJessica going to perform?
A. TracertB. Smurf scanC. Ping traceD. ICMP ping sweep
Answer: D
QUESTION: 10You work as an IT security auditor hired by a law firm in Boston to test whether you cangain access to sensitive information about the company clients. You have rummagedthrough their trash and found very little information. You do not want to set off any alarmson their network, so you plan on performing passive footprinting against their Web servers.What tool should you use?
Original Resource : http://www.testkingworld.org
Visit EC0-479 Link : EC0-479 Download PDF Link : EC0-479
About the Author
Original Resource : http://www.testkingworld.org
Visit EC0-479 Link : EC0-479
ECCouncil 212-77 DownloadECCouncil 312-49 DownloadECCouncil 312-50 DownloadECCouncil EC0-232 DownloadECCouncil EC0-349 DownloadECCouncil EC0-350 DownloadECCouncil EC0-479 Download
Use and distribution of this article is subject to our Publisher Guidelines
whereby the original author?s information and copyright must be included.
testkingworld.org
RSS Feed
Report Article
Publish Article
Print Article
Add to Favorites
Article Directory
About
FAQ
Contact Us
Advanced Search
Privacy Statement
Disclaimer
GoArticles.com ? 2012, All Rights Reserved.
Source: http://artofwarcentral.com/game-server-blog/eccouncil-ec0-479-real-questions/
jarhead montrose marshawn lynch earthquake bay area clear channel drexel dale
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.