Pass the ECCouncil ECSA EC0-479 Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?

Options:

A.

Enumerate domain user accounts and built-in groups


B.

Establish a remote connection to the Domain Controller


C.

Poison the DNS records with false records


D.

Enumerate MX and A records from DNS


Expert Solution
Questions # 32:

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

Options:

A.

Smurf scan


B.

Tracert


C.

Ping trace


D.

ICMP ping sweep


Expert Solution
Questions # 33:

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

Options:

A.

Avoid cross talk


B.

Avoid over-saturation of wireless signals


C.

So that the access points will work on different frequencies


D.

Multiple access points can be set up on the same channel without any issues


Expert Solution
Questions # 34:

You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position:

7+ years experience in Windows Server environment

5+ years experience in Exchange 2000/2003 environment

Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are required MCSA desired,

MCSE, CEH preferred

No Unix/Linux Experience needed

What is this information posted on the job website considered?

Options:

A.

Information vulnerability


B.

Social engineering exploit


C.

Trade secret


D.

Competitive exploit


Expert Solution
Questions # 35:

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?

Options:

A.

Intruding into a honeypot is not illegal


B.

Entrapment


C.

Intruding into a DMZ is not illegal


D.

Enticement


Expert Solution
Questions # 36:

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?

Options:

A.

Perform a zone transfer


B.

Perform DNS poisoning


C.

Send DOS commands to crash the DNS servers


D.

Enumerate all the users in the domain


Expert Solution
Questions # 37:

What is the following command trying to accomplish?

Question # 37

Options:

A.

Verify that TCP port 445 is open for the 192.168.0.0 network


B.

Verify that UDP port 445 is open for the 192.168.0.0 network


C.

Verify that UDP port 445 is closed for the 192.168.0.0 network


D.

Verify that NETBIOS is running for the 192.168.0.0 network


Expert Solution
Questions # 38:

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal:

What have you found?

Options:

A.

Trojan.downloader


B.

Blind bug


C.

Web bug


D.

CGI code


Expert Solution
Questions # 39:

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

Options:

A.

Windows computers are constantly talking


B.

Linux/Unix computers are constantly talking


C.

Linux/Unix computers are easier to compromise


D.

Windows computers will not respond to idle scans


Expert Solution
Questions # 40:

In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

Options:

A.

More RESET packets to the affected router to get it to power back up


B.

RESTART packets to the affected router to get it to power back up


C.

The change in the routing fabric to bypass the affected router


D.

STOP packets to all other routers warning of where the attack originated


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions