Pass the ECCouncil ECSA 412-79 Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack against your external firewall. The firewall quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?

Options:

A.

The firewall failed-open


B.

The firewall failed-bypass


C.

The firewall failed-closed


D.

The firewall ACL has been purged


Expert Solution
Questions # 2:

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity.

George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network. What filter should George use in Ethereal?

Options:

A.

src port 22 and dst port 22


B.

src port 23 and dst port 23


C.

net port 22


D.

udp port 22 and host 172.16.28.1/24


Expert Solution
Questions # 3:

You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so quickly?

Options:

A.

Networks using Active Directory never use SAM databases so the SAM database pulled was empty


B.

Passwords of 14 characters or less are broken up into two 7-character hashes


C.

The passwords that were cracked are local accounts on the Domain Controller


D.

A password Group Policy change takes at least 3 weeks to completely replicate throughout a network


Expert Solution
Questions # 4:

Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

Options:

A.

Fuzzing


B.

Tailgating


C.

Man trap attack


D.

Backtrapping


Expert Solution
Questions # 5:

What will the following URL produce in an unpatched IIS Web Server? http://www.thetargetsite.com/scripts/..%co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\

Options:

A.

Execute a buffer flow in the C: drive of the web server


B.

Insert a Trojan horse into the C: drive of the web server


C.

Directory listing of the C:\windows\system32 folder on the web server


D.

Directory listing of C: drive on the web server


Expert Solution
Questions # 6:

Software firewalls work at which layer of the OSI model?

Options:

A.

Transport


B.

Application


C.

Network


D.

Data Link


Expert Solution
Questions # 7:

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

Options:

A.

Service account passwords in plain text


B.

Cached password hashes for the past 20 users


C.

IAS account names and passwords


D.

Local store PKI Kerberos certificates


Expert Solution
Questions # 8:

You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls (Select 2)

Options:

A.

162


B.

160


C.

161


D.

163


Expert Solution
Questions # 9:

What is the target host IP in the following command?

Question # 9

Options:

A.

Firewalk does not scan target hosts


B.

172.16.28.95


C.

This command is using FIN packets, which cannot scan target hosts


D.

10.10.150.1


Expert Solution
Questions # 10:

Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

Options:

A.

RIPE


B.

CVE


C.

IANA


D.

APIPA


Expert Solution
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions