Pass the ECCouncil ECSA EC0-479 Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following filesystem is used by Mac OS X?

Options:

A.

EFS


B.

HFS+


C.

EXT2


D.

NFS


Expert Solution
Questions # 12:

What TCP/UDP port does the toolkit program netstat use?

Options:

A.

Port 7


B.

Port 15


C.

Port 23


D.

Port 69


Expert Solution
Questions # 13:

What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

Options:

A.

ICMP header field


B.

TCP header field


C.

IP header field


D.

UDP header field


Expert Solution
Questions # 14:

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the ______________ in order to track the emails back to the suspect.

Options:

A.

Routing Table


B.

Firewall log


C.

Configuration files


D.

Email Header


Expert Solution
Questions # 15:

Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?

#include

#include

int main(int argc, char *argv[])

{

char buffer[10];

if (argc < 2)

{

fprintf(stderr, "USAGE: %s string\n", argv[0]);

return 1;

}

strcpy(buffer, argv[1]);

return 0;

}

Options:

A.

Buffer overflow


B.

Format string bug


C.

Kernal injection


D.

SQL injection


Expert Solution
Questions # 16:

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?

Options:

A.

Statefull firewalls do not work with packet filtering firewalls


B.

NAT does not work with statefull firewalls


C.

NAT does not work with IPSEC


D.

IPSEC does not work with packet filtering firewalls


Expert Solution
Questions # 17:

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

Options:

A.

outlook:"search"


B.

allinurl:"exchange/logon.asp"


C.

locate:"logon page"


D.

intitle:"exchange server"


Expert Solution
Questions # 18:

What will the following command produce on a website login page?What will the following command produce on a website? login page?

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'someone@somehwere.com'; DROP TABLE members; --'

Options:

A.

This command will not produce anything since the syntax is incorrect


B.

Inserts the Error! Reference source not found. email address into the members table


C.

Retrieves the password for the first user in the members table


D.

Deletes the entire members table


Expert Solution
Questions # 19:

Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

Options:

A.

Fuzzing


B.

Tailgating


C.

Man trap attack


D.

Backtrapping


Expert Solution
Questions # 20:

What does ICMP Type 3/Code 13 mean?

Options:

A.

Host Unreachable


B.

Port Unreachable


C.

Protocol Unreachable


D.

Administratively Blocked


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions