Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
EC0-479 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Dumpsleader ECCouncil EC0-479 Dumps with VCE and PDF 61-70

September 23, 2017

EnsurePass
2017 Sep ECCouncil Official New Released EC0-479
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC0-479.html

EC-Council Certified Security Analyst (ECSA)

Question No: 61 – (Topic 2)

After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a lage organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts responds to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

  1. A switched network will not respond to packets sent to the broadcast address

  2. Only IBM AS/400 will reply to this scan

  3. Only Unix and Unix-like systems will reply to this scan

  4. Only Windows systems will reply to this scan

Answer: C

Question No: 62 – (Topic 2)

Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?

  1. SDW Encryption

  2. EFS Encryption

  3. DFS Encryption

  4. IPS Encryption

Answer: B

Question No: 63 – (Topic 2)

How many possible sequence number combinations are there in TCP/IP protocol?

  1. 320 billion

  2. 32 million

  3. 4 billion

  4. 1 billion

Answer: C

Question No: 64 – (Topic 2)

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity.

George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network. What filter should George use in Ethereal?

  1. src port 22 and dst port 22

  2. src port 23 and dst port 23

  3. net port 22

  4. udp port 22 and host 172.16.28.1/24

Answer: A

Question No: 65 – (Topic 2)

Software firewalls work at which layer of the OSI model?

  1. Transport

  2. Application

  3. Network

  4. Data Link

Answer: D

Question No: 66 – (Topic 2)

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good.

Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company#39;s main office in Iowa. She states that she needs the receptionist#39;s network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for.

What principal of social engineering did Julia use?

  1. Reciprocation

  2. Friendship/Liking

  3. Social Validation

  4. Scarcity

Answer: A

Question No: 67 – (Topic 2)

Jessica works as systems administrator for a large electronics firm. She wants to scan her

network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

  1. Ping trace

  2. Tracert

  3. Smurf scan

  4. ICMP ping sweep

Answer: D

Question No: 68 – (Topic 2)

John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?

  1. Firewalk sets all packets with a TTL of zero

  2. Firewalk cannot pass through Cisco firewalls

  3. Firewalk sets all packets with a TTL of one

  4. Firewalk cannot be detected by network sniffers

Answer: C

Question No: 69 – (Topic 2)

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

  1. NIPS

  2. Passive IDS

  3. Progressive IDS

  4. Active IDS

Answer: D

Question No: 70 – (Topic 2)

As a security analyst you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?

  1. The employees network usernames and passwords

  2. The MAC address of the employees?computers

  3. The IP address of the employees computers

  4. Bank account numbers and the corresponding routing numbers

Answer: A

100% Free Download!
Download Free Demo:EC0-479 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass EC0-479 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE