Pass the ECCouncil ECSA EC0-479 Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

What will the following command accomplish?

Question # 41

Options:

A.

Test ability of a router to handle over-sized packets


B.

Test the ability of a router to handle fragmented packets


C.

Test the ability of a WLAN to handle fragmented packets


D.

Test the ability of a router to handle under-sized packets


Expert Solution
Questions # 42:

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?

Options:

A.

Poison the switch's MAC address table by flooding it with ACK bits


B.

Enable tunneling feature on the switch


C.

Trick the switch into thinking it already has a session with Terri's computer


D.

Crash the switch with a DoS attack since switches cannot send ACK bits


Expert Solution
Questions # 43:

You are working in the security Department of law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?

Options:

A.

10


B.

25


C.

110


D.

135


Expert Solution
Questions # 44:

What should you do when approached by a reporter about a case that you are working on or have worked on?

Options:

A.

Refer the reporter to the attorney that retained you


B.

Say, “no comment”


C.

Answer all the reporters questions as completely as possible


D.

Answer only the questions that help your case


Expert Solution
Questions # 45:

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

Options:

A.

The manufacturer of the system compromised


B.

The logic, formatting and elegance of the code used in the attack


C.

The nature of the attack


D.

The vulnerability exploited in the incident


Expert Solution
Questions # 46:

During the course of a corporate investigation, you find that an Employee is committing a crime. Can the Employer file a criminal complain with Police?

Options:

A.

Yes, and all evidence can be turned over to the police


B.

Yes, but only if you turn the evidence over to a federal law enforcement agency


C.

No, because the investigation was conducted without following standard police procedures


D.

No, because the investigation was conducted without warrant


Expert Solution
Questions # 47:

Diskcopy is:

Options:

A.

a utility byAccessData


B.

a standard MS-DOS command


C.

Digital Intelligence utility


D.

dd copying tool


Expert Solution
Questions # 48:

The use of warning banners helps a company avoid litigation by overcoming an employees assumed

____________ When connecting to the company‟s intranet, network or Virtual Private Network(VPN) and will allow the company‟s investigators to monitor, search and retrieve information stored within the network.

Options:

A.

Right to work


B.

Right of free speech


C.

Right to Internet Access


D.

Right of Privacy


Expert Solution
Questions # 49:

One way to identify the presence of hidden partitions on a suspect‟s hard drive is to:

Options:

A.

Add up the total size of all known partitions and compare it to the total size of the hard drive


B.

Examine the FAT and identify hidden partitions by noting an H in the partition Type field


C.

Examine the LILO and note an H in the partition Type field


D.

It is not possible to have hidden partitions on a hard drive


Expert Solution
Questions # 50:

A state department site was recently attacked and all the servers had their disks eraseD. The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally eraseD. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?

Options:

A.

They examined the actual evidence on an unrelated system


B.

They attempted to implicate personnel without proof


C.

They tampered with evidence by using it


D.

They called in the FBI without correlating with the fingerprint data


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions