[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-479 Dumps with VCE and PDF 71-80

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-479
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Analyst (ECSA)

Question No: 71 – (Topic 2)

On Linux/Unix based Web servers, what privilege should the daemon service be run under?

  1. You cannot determine what privilege runs the daemon service

  2. Guest

  3. Root

  4. Something other than root

Answer: D

Question No: 72 – (Topic 2)

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri#39;s duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company#39;s switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?

  1. Enable tunneling feature on the switch

  2. Trick the switch into thinking it already has a session with Terri#39;s computer

  3. Crash the switch with a DoS attack since switches cannot send ACK bits

  4. Poison the switch#39;s MAC address table by flooding it with ACK bits

Answer: B

Question No: 73 – (Topic 2)

You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack against your external firewall. The firewall quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?

  1. The firewall failed-open

  2. The firewall failed-bypass

  3. The firewall failed-closed

  4. The firewall ACL has been purged

Answer: A

Question No: 74 – (Topic 2)

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

  1. OSPF

  2. BPG

  3. ATM

  4. UDP

Answer: A

Question No: 75 – (Topic 2)

Paul#39;s company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

  1. Fuzzing

  2. Tailgating

  3. Man trap attack

  4. Backtrapping

Answer: B

Question No: 76 – (Topic 2)

John and Hillary works at the same department in the company. John wants to find out Hillary#39;s network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found.

What information will he be able to gather from this?

  1. The SAM file from Hillary computer

  2. Hillary network username and password hash

  3. The SID of Hillary network account

  4. The network shares that Hillary has permissions

Answer: B

Question No: 77 – (Topic 2)

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

  1. Fraggle

  2. SYN flood

  3. Trinoo

  4. Smurf

Answer: D

Question No: 78 – (Topic 2)

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

  1. NIPS

  2. Passive IDS

  3. Progressive IDS

  4. Active IDS

Answer: D

Question No: 79 – (Topic 2)

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company#39;s clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive footprinting against their Web servers. What tool should you use?

  1. Ping sweep

  2. Netcraft

  3. Dig

  4. Nmap

Answer: B

Question No: 80 – (Topic 2)

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?

  1. %systemroot%\LSA

  2. %systemroot%\repair

  3. %systemroot%\system32\drivers\etc

  4. %systemroot%\system32\LSA

Answer: B

100% Ensurepass Free Download!
Download Free Demo:EC0-479 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-479 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.