[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-479 Dumps with VCE and PDF 51-60

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-479
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Analyst (ECSA)

Question No: 51 – (Topic 2)

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe.

What are you trying to accomplish here?

  1. Poison the DNS records with false records

  2. Enumerate MX and A records from DNS

  3. Enumerate domain user accounts and built-in groups

  4. Establish a remote connection to the Domain Controller

Answer: C

Question No: 52 – (Topic 2)

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

  1. intitle:quot;exchange serverquot;

  2. outlook:quot;searchquot;

  3. locate:quot;logon pagequot;

  4. allinurl:quot;exchange/logon.aspquot;

Answer: D

Question No: 53 – (Topic 2)

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?

  1. Enable BGP

  2. Disable BGP

  3. Enable direct broadcasts

  4. Disable direct broadcasts

Answer: D

Question No: 54 – (Topic 2)

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers:

After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

  1. URL Obfuscation Arbitrary Administrative Access Vulnerability

  2. Cisco IOS Arbitrary Administrative Access Online Vulnerability

  3. HTTP Configuration Arbitrary Administrative Access Vulnerability

  4. HTML Configuration Arbitrary Administrative Access Vulnerability

Answer: C

Question No: 55 – (Topic 2)

Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?

#include lt;stdio.hgt;

#include lt;string.hgt;

int main(int argc, char *argv[])


char buffer[10]; if (argc lt; 2)


fprintf(stderr, quot;USAGE: %s string\nquot;, argv[0]); return 1;


strcpy(buffer, argv[1]); return 0;


  1. Buffer overflow

  2. Format string bug

  3. Kernal injection

  4. SQL injection

Answer: A

Question No: 56 – (Topic 2)

Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything

related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

  1. CVE

  2. IANA

  3. RIPE

  4. APIPA

Answer: A

Question No: 57 – (Topic 2)

George is a senior security analyst working for a state agency in Florida. His state#39;s congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a quot;time- based induction machinequot; be used. What IDS feature must George implement to meet this requirement?

  1. Pattern matching

  2. Statistical-based anomaly detection

  3. Real-time anomaly detection

  4. Signature-based anomaly detection

Answer: C

Question No: 58 – (Topic 2)

Software firewalls work at which layer of the OSI model?

  1. Data Link

  2. Network

  3. Transport

  4. Application

Answer: A

Question No: 59 – (Topic 2)

The objective of this act was to protect consumers personal financial information held by financial institutions and their service providers.

  1. HIPAA

  2. Sarbanes-Oxley 2002

  3. Gramm-Leach-Bliley Act

  4. California SB 1386

Answer: C

Question No: 60 – (Topic 2)

What does ICMP Type 3/Code 13 mean?

  1. Host Unreachable

  2. Port Unreachable

  3. Protocol Unreachable

  4. Administratively Blocked

Answer: D

100% Ensurepass Free Download!
Download Free Demo:EC0-479 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-479 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.