Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

EC-Council Certified Security Analyst (ECSA) Question and Answers

EC-Council Certified Security Analyst (ECSA)

Last Update May 1, 2024
Total Questions : 232

We are offering FREE EC0-479 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare EC0-479 free exam questions and then go for complete pool of EC-Council Certified Security Analyst (ECSA) test questions that will help you more.

EC0-479 pdf

EC0-479 PDF

$35  $99.99
EC0-479 Engine

EC0-479 Testing Engine

$42  $119.99
EC0-479 PDF + Engine

EC0-479 PDF + Testing Engine

$56  $159.99
Questions 1

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?

Options:

A.  

Enable tunneling feature on the switch

B.  

Trick the switch into thinking it already has a session with Terri's computer

C.  

Crash the switch with a DoS attack since switches cannot send ACK bits

D.  

Poison the switch's MAC address table by flooding it with ACK bits

Discussion 0
Questions 2

You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls (Select 2)

Options:

A.  

162

B.  

160

C.  

161

D.  

163

Discussion 0
Questions 3

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive footprinting against their Web servers. What tool should you use?

Options:

A.  

Nmap

B.  

Netcraft

C.  

Ping sweep

D.  

Dig

Discussion 0
Questions 4

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

Options:

A.  

Windows computers are constantly talking

B.  

Linux/Unix computers are constantly talking

C.  

Linux/Unix computers are easier to compromise

D.  

Windows computers will not respond to idle scans

Discussion 0
Questions 5

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?

Options:

A.  

IPSEC does not work with packet filtering firewalls

B.  

NAT does not work with IPSEC

C.  

NAT does not work with statefull firewalls

D.  

Statefull firewalls do not work with packet filtering firewalls

Discussion 0
Questions 6

What are the security risks of running a "repair" installation for Windows XP?

Options:

A.  

There are no security risks when running the "repair" installation for Windows XP

B.  

Pressing Shift+F1 gives the user administrative rights

C.  

Pressing Ctrl+F10 gives the user administrative rights

D.  

Pressing Shift+F10 gives the user administrative rights

Discussion 0
Questions 7

What is a good security method to prevent unauthorized users from "tailgating"?

Options:

A.  

Electronic key systems

B.  

Man trap

C.  

Pick-resistant locks

D.  

Electronic combination locks

Discussion 0
Questions 8

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold? needs?

Options:

A.  

Application-level proxy firewall

B.  

Data link layer firewall

C.  

Packet filtering firewall

D.  

Circuit-level proxy firewall

Discussion 0
Questions 9

What will the following command accomplish?

Options:

A.  

Test ability of a router to handle over-sized packets

B.  

Test the ability of a router to handle fragmented packets

C.  

Test the ability of a WLAN to handle fragmented packets

D.  

Test the ability of a router to handle under-sized packets

Discussion 0
Questions 10

A (n) ____________ is one that‟s performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

Options:

A.  

blackout attack

B.  

automated attack

C.  

distributed attack

D.  

central processing attack

Discussion 0
Questions 11

In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?

Options:

A.  

rules of evidence

B.  

law of probability

C.  

chain of custody

D.  

policy of separation

Discussion 0
Questions 12

When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:

Options:

A.  

Recycle Bin

B.  

MSDOS.sys

C.  

BIOS D.

Case files

Discussion 0
Questions 13

When you carve an image, recovering the image depends on which of the following skills?

Options:

A.  

Recognizing the pattern of the header content

B.  

Recovering the image from a tape backup

C.  

Recognizing the pattern of a corrupt file

D.  

Recovering the image from the tape backup

Discussion 0
Questions 14

In General, ______________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the datA.

Options:

A.  

Network Forensics

B.  

Data Recovery

C.  

Disaster Recovery

D.  

Computer Forensics

Discussion 0
Questions 15

You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protecteD. What are two common methods used by password cracking software that you can use to obtain the password?

Options:

A.  

Limited force and library attack

B.  

Brute Force and dictionary Attack

C.  

Maximum force and thesaurus Attack

D.  

Minimum force and appendix Attack

Discussion 0
Questions 16

This is original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.

Options:

A.  

Master Boot Record (MBR)

B.  

Master File Table (MFT)

C.  

File Allocation Table (FAT)

D.  

Disk Operating System (DOS)

Discussion 0
Questions 17

What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?

Options:

A.  

mcopy

B.  

image

C.  

MD5

D.  

dd

Discussion 0
Questions 18

One way to identify the presence of hidden partitions on a suspect‟s hard drive is to:

Options:

A.  

Add up the total size of all known partitions and compare it to the total size of the hard drive

B.  

Examine the FAT and identify hidden partitions by noting an H in the partition Type field

C.  

Examine the LILO and note an H in the partition Type field

D.  

It is not possible to have hidden partitions on a hard drive

Discussion 0
Questions 19

Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?

Options:

A.  

Use Vmware to be able to capture the data in memory and examine it

B.  

Give the Operating System a minimal amount of memory, forcing it to use a swap file

C.  

Create a Separate partition of several hundred megabytes and place the swap file there

D.  

Use intrusion forensic techniques to study memory resident infections

Discussion 0
Questions 20

What does mactime, an essential part of the coroner‟s toolkit do?

Options:

A.  

It traverses the file system and produces a listing of all files based on the modification, access and change timestamps

B.  

It can recover deleted file space and search it for datA. However, it does not allow the investigator t preview them

C.  

The tools scans for i-node information, which is used by other tools in the tool kit

D.  

It is tool specific to the MAC OS and forms a core component of the toolkit

Discussion 0
Questions 21

During the course of a corporate investigation, you find that an Employee is committing a crime. Can the Employer file a criminal complain with Police?

Options:

A.  

Yes, and all evidence can be turned over to the police

B.  

Yes, but only if you turn the evidence over to a federal law enforcement agency

C.  

No, because the investigation was conducted without following standard police procedures

D.  

No, because the investigation was conducted without warrant

Discussion 0
Questions 22

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

Options:

A.  

Fraggle

B.  

SYN flood

C.  

Trinoo

D.  

Smurf

Discussion 0
Questions 23

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers. Bill protects the PDF documents with a password and sends them to their intended recipients. Why PDF passwords do not offer maximum protection?

Options:

A.  

PDF passwords can easily be cracked by software brute force tools

B.  

PDF passwords are not considered safe by Sarbanes-Oxley

C.  

PDF passwords are converted to clear text when sent through E-mail

D.  

When sent through E-mail, PDF passwords are stripped from the document completely

Discussion 0
Questions 24

Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

Options:

A.  

CVE

B.  

IANA

C.  

RIPE

D.  

APIPA

Discussion 0
Questions 25

What will the following command produce on a website login page?What will the following command produce on a website? login page?

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'someone@somehwere.com'; DROP TABLE members; --'

Options:

A.  

This command will not produce anything since the syntax is incorrect

B.  

Inserts the Error! Reference source not found. email address into the members table

C.  

Retrieves the password for the first user in the members table

D.  

Deletes the entire members table

Discussion 0
Questions 26

What will the following URL produce in an unpatched IIS Web Server? http://www.thetargetsite.com/scripts/..%co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\

Options:

A.  

Execute a buffer flow in the C: drive of the web server

B.  

Insert a Trojan horse into the C: drive of the web server

C.  

Directory listing of the C:\windows\system32 folder on the web server

D.  

Directory listing of C: drive on the web server

Discussion 0
Questions 27

When conducting computer forensic analysis, you must guard against ______________ So that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expecteD.

Options:

A.  

Hard Drive Failure

B.  

Scope Creep

C.  

Unauthorized expenses

D.  

Overzealous marketing

Discussion 0
Questions 28

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker . Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt. (Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.) 03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111 TCP TTL:43 TOS:0×0 ID:29726 IpLen:20 DgmLen:52 DF ***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32 TCP Options (3) => NOP NOP TS: 23678634 2878772 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111 UDP TTL:43 TOS:0×0 ID:29733 IpLen:20 DgmLen:84 Len: 64

01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ……………. 00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ……………. 00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 …………….

00 00 00 11 00 00 00 00 ……..

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773 UDP TTL:43 TOS:0×0 ID:29781 IpLen:20 DgmLen:1104 Len: 1084 47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8

Options:

A.  

The attacker has conducted a network sweep on port 111

B.  

The attacker has scanned and exploited the system using Buffer Overflow

C.  

The attacker has used a Trojan on port 32773

D.  

The attacker has installed a backdoor

Discussion 0
Questions 29

When cataloging digital evidence, the primary goal is to:

Options:

A.  

Make bit-stream images of all hard drives

B.  

Preserve evidence integrity

C.  

Not remove the evidence from the scene

D.  

Not allow the computer to be turned off

Discussion 0
Questions 30

You are working as an independent computer forensics investigator and receive a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer laB. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a simple backup copy of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a simple backup copy will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?

Options:

A.  

Bit-stream Copy

B.  

Robust Copy

C.  

Full backup Copy

D.  

Incremental Backup Copy

Discussion 0
Questions 31

Microsoft Outlook maintains email messages in a proprietary format in what type of file?

Options:

A.  

.email

B.  

.mail

C.  

.pst

D.  

.doc

Discussion 0
Questions 32

During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore you report this evidence. This type of evidence is known as:

Options:

A.  

Inculpatory evidence

B.  

mandatory evidence

C.  

exculpatory evidence

D.  

Terrible evidence

Discussion 0
Questions 33

To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software ?

Options:

A.  

Computer Forensics Tools and Validation Committee (CFTVC)

B.  

Association of Computer Forensics Software Manufactures (ACFSM)

C.  

National Institute of Standards and Technology (NIST)

D.  

Society for Valid Forensics Tools and Testing (SVFTT)

Discussion 0
Questions 34

Jason is the security administrator of ACMA metal Corporation. One day he notices the company‟s Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report this crime to the law enforcement agencies immediately. Which organization coordinates computer crimes investigations throughout the United States?

Options:

A.  

Internet Fraud Complaint Center

B.  

Local or national office of the U.S. Secret Service

C.  

National Infrastructure Protection Center

D.  

CERT Coordination Center

Discussion 0