Pass the ECCouncil ECSA 412-79 Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

Options:

A.

Windows computers will not respond to idle scans


B.

Linux/Unix computers are constantly talking


C.

Linux/Unix computers are easier to compromise


D.

Windows computers are constantly talking


Expert Solution
Questions # 32:

What is the following command trying to accomplish?

Question # 32

Options:

A.

Verify that TCP port 445 is open for the 192.168.0.0 network


B.

Verify that UDP port 445 is open for the 192.168.0.0 network


C.

Verify that UDP port 445 is closed for the 192.168.0.0 network


D.

Verify that NETBIOS is running for the 192.168.0.0 network


Expert Solution
Questions # 33:

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?

Options:

A.

Enumerate all the users in the domain


B.

Perform DNS poisoning


C.

Send DOS commands to crash the DNS servers


D.

Perform a zone transfer


Expert Solution
Questions # 34:

Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and ombies? What type of Penetration Testing is Larry planning to carry out?

Options:

A.

Internal Penetration Testing


B.

Firewall Penetration Testing


C.

DoS Penetration Testing


D.

Router Penetration Testing


Expert Solution
Questions # 35:

What will the following URL produce in an unpatched IIS Web Server? Question # 35

Options:

A.

Execute a buffer flow in the C: drive of the web server


B.

Insert a Trojan horse into the C: drive of the web server


C.

Directory listing of the C:\windows\system32 folder on the web server


D.

Directory listing of C: drive on the web server


Expert Solution
Questions # 36:

You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position:

7+ years experience in Windows Server environment

5+ years experience in Exchange 2000/2003 environment

Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are required MCSA desired,

MCSE, CEH preferred

No Unix/Linux Experience needed

What is this information posted on the job website considered?

Options:

A.

Information vulnerability


B.

Social engineering exploit


C.

Trade secret


D.

Competitive exploit


Expert Solution
Questions # 37:

After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

Options:

A.

RestrictAnonymous must be set to "2" for complete security


B.

RestrictAnonymous must be set to "3" for complete security


C.

There is no way to always prevent an anonymous null session from establishing


D.

RestrictAnonymous must be set to "10" for complete security


Expert Solution
Questions # 38:

A packet is sent to a router that does not have the packet destination address in its route table, how will the packet get to its properA packet is sent to a router that does not have the packet? destination address in its route table, how will the packet get to its proper destination?

Options:

A.

Root Internet servers


B.

Border Gateway Protocol


C.

Gateway of last resort


D.

Reverse DNS


Expert Solution
Questions # 39:

An "idle" system is also referred to as what?

Options:

A.

PC not being used


B.

PC not connected to the Internet


C.

Bot


D.

Zombie


Expert Solution
Questions # 40:

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal:

What have you found?

Options:

A.

Trojan.downloader


B.

Blind bug


C.

Web bug


D.

CGI code


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions