Free Download Lastest Pass4sure EC-Council ECSA EC0-479 Exam Questions

EC-Council Certified Security Analyst (ECSA): EC0-479 Exam
EC0-479 Questions & Answers
Exam Code: EC0-479
Exam Name: EC-Council Certified Security Analyst (ECSA)
Q & A: 112 Q&As

Part: A
1: When you are running a vulnerability scan on a network and the IDS cuts off your connection,
what type of IDS is being used?
A.Passive IDS
B.Active IDS
C.Progressive IDS
Correct Answers: B

2: Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and
wants to hack into his former company’s network. Since Simon remembers some of the server
names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to
accomplish here?
A.Send DOS commands to crash the DNS servers
B.Perform DNS poisoning
C.Perform a zone transfer
D.Enumerate all the users in the domain
Correct Answers: C

3: What will the following command produce on a website login page?
SELECT email, passwd, login_id, full_name
FROM members
WHERE email = ‘[email protected]’; DROP TABLE members; –‘
A.Deletes the entire members table
B.Inserts the Error! Reference source not found. email address into the members table
C.Retrieves the password for the first user in the members table
D.This command will not produce anything since the syntax is incorrect
Correct Answers: A

4: You setup SNMP in multiple offices of your company. Your SNMP software manager is not
receiving data from other offices like it is for your main office. You suspect that firewall changes
are to blame. What ports should you open for SNMP to work through Firewalls (Select 2)
Correct Answers: A B

5: You are carrying out the last round of testing for your new website before it goes live. The
website has many dynamic pages and connects to a SQL backend that accesses your product
inventory in a database. You come across a web security site that recommends inputting the
following code into a search field on web pages to check for vulnerabilities:
<script>alert(“This is a test.”)</script> When you type this and click on search, you receive a pop-up window that says:
“This is a test.”
What is the result of this test?
A.Your website is vulnerable to CSS
B.Your website is not vulnerable
C.Your website is vulnerable to SQL injection
D.Your website is vulnerable to web bugs
Correct Answers: A

6: If an attacker’s computer sends an IPID of 31400 to a zombie computer on an open port in
IDLE scanning, what will be the response?
A.The zombie will not send a response
Correct Answers: D

7: Michael works for Kimball Construction Company as senior security analyst. As part of
yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael
conducts XMAS scan and most of the ports scanned do not give a response. In what state are
these ports?
Correct Answers: B

8: You are assisting a Department of Defense contract company to become compliant with the
stringent security policies set by the DoD. One such strict rule is that firewalls must only allow
incoming connections that were first initiated by internal computers. What type of firewall must
you implement to abide by this policy?
A.Packet filtering firewall
B.Circuit-level proxy firewall
C.Application-level proxy firewall
D.Statefull firewall
Correct Answers: D

9: Jessica works as systems administrator for a large electronics firm. She wants to scan her
network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is
Jessica going to perform?
B.Smurf scan
C.Ping trace
D.ICMP ping sweep
Correct Answers: D

10: You work as an IT security auditor hired by a law firm in Boston to test whether you can gain
access to sensitive information about the company clients. You have rummaged through their
trash and found very little information. You do not want to set off any alarms on their network,
so you plan on performing passive footprinting against their Web servers. What tool should you
A.Ping sweep
Correct Answers: C

11: You are a security analyst performing a penetration tests for a company in the Midwest.
After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the
company. You type in the following URL that includes the IP address of one of the routers:
After typing in this URL, you are presented with the entire configuration file for that router.
What have you discovered?
A.HTTP Configuration Arbitrary Administrative Access Vulnerability
B.HTML Configuration Arbitrary Administrative Access Vulnerability
C.Cisco IOS Arbitrary Administrative Access Online Vulnerability
D.URL Obfuscation Arbitrary Administrative Access Vulnerability
Correct Answers: A

12: What is the following command trying to accomplish? C:\> nmap -sU -p445
A.Verify that UDP port 445 is open for the network
B.Verify that TCP port 445 is open for the network
C.Verify that NETBIOS is running for the network
D.Verify that UDP port 445 is closed for the network
Correct Answers: A

13: You are the network administrator for a small bank in Dallas, Texas. To ensure network
security, you enact a security policy that requires all users to have 14 character passwords. After
giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords.
A week later you dump the SAM database from the standalone server and run a
password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why
were these passwords cracked so quickly?
A.Passwords of 14 characters or less are broken up into two 7-character hashes
B.A password Group Policy change takes at least 3 weeks to completely replicate throughout a
C.Networks using Active Directory never use SAM databases so the SAM database pulled was
D.The passwords that were cracked are local accounts on the Domain Controller
Correct Answers: A

14: An “idle” system is also referred to as what?
A.PC not connected to the Internet
C.PC not being used
Correct Answers: B

15: Larry is an IT consultant who works for corporations and government agencies. Larry plans on
shutting down the city’s network using BGP devices and ombies? What type of Penetration
Testing is Larry planning to carry out?
A.Router Penetration Testing
B.DoS Penetration Testing
C.Firewall Penetration Testing
D.Internal Penetration Testing
Correct Answers: B

…go to to download the full version Q&As.


Why Choose Lead2pass?

If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back