Pass the ECCouncil ECSA EC0-479 Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

Options:

A.

intitle:"exchange server"


B.

outlook:"search"


C.

locate:"logon page"


D.

allinurl:"exchange/logon.asp"


Expert Solution
Questions # 22:

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?

Options:

A.

Enable tunneling feature on the switch


B.

Trick the switch into thinking it already has a session with Terri's computer


C.

Crash the switch with a DoS attack since switches cannot send ACK bits


D.

Poison the switch's MAC address table by flooding it with ACK bits


Expert Solution
Questions # 23:

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company's clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive footprinting against their Web servers. What tool should you use?

Options:

A.

Ping sweep


B.

Netcraft


C.

Dig


D.

Nmap


Expert Solution
Questions # 24:

You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so quickly?

Options:

A.

Networks using Active Directory never use SAM databases so the SAM database pulled was empty


B.

Passwords of 14 characters or less are broken up into two 7-character hashes


C.

The passwords that were cracked are local accounts on the Domain Controller


D.

A password Group Policy change takes at least 3 weeks to completely replicate throughout a network


Expert Solution
Questions # 25:

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers. Bill protects the PDF documents with a password and sends them to their intended recipients. Why PDF passwords do not offer maximum protection?

Options:

A.

PDF passwords can easily be cracked by software brute force tools


B.

PDF passwords are not considered safe by Sarbanes-Oxley


C.

PDF passwords are converted to clear text when sent through E-mail


D.

When sent through E-mail, PDF passwords are stripped from the document completely


Expert Solution
Questions # 26:

What will the following URL produce in an unpatched IIS Web Server? http://www.thetargetsite.com/scripts/..%co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\

Options:

A.

Execute a buffer flow in the C: drive of the web server


B.

Insert a Trojan horse into the C: drive of the web server


C.

Directory listing of the C:\windows\system32 folder on the web server


D.

Directory listing of C: drive on the web server


Expert Solution
Questions # 27:

After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a lage organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts responds to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

Options:

A.

A switched network will not respond to packets sent to the broadcast address


B.

Only IBM AS/400 will reply to this scan


C.

Only Unix and Unix-like systems will reply to this scan


D.

Only Windows systems will reply to this scan


Expert Solution
Questions # 28:

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

Options:

A.

Fraggle


B.

SYN flood


C.

Trinoo


D.

Smurf


Expert Solution
Questions # 29:

Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?

Options:

A.

Only an HTTPS session can be hijacked


B.

Only DNS traffic can be hijacked


C.

Only FTP traffic can be hijacked


D.

HTTP protocol does not maintain session


Expert Solution
Questions # 30:

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities:

<script>alert("This is a test.")</script>

When you type this and click on search, you receive a pop-up window that says:

"This is a test."

What is the result of this test?

Options:

A.

Your website is vulnerable to web bugs


B.

Your website is vulnerable to CSS


C.

Your website is not vulnerable


D.

Your website is vulnerable to SQL injection


Expert Solution
Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions