testonsidelyのブログ -21ページ目

testonsidelyのブログ

ブログの説明を入力します。

http://www.testonside.com/412-79.html
http://www.testonside.com/pdf/412-79.pdf
Exam Number/Code : 412-79
Exam Name : EC-Council Certified Security Analyst (ECSA)
Questions and Answers : 100 Q&As
Update Time: 2014-11-11


QUESTION NO: 1
Your company's network just finished going through a SAS 70 audit. This audit reported that
overall, your network is secure, but there are some areas that needs improvement. The major area
was SNMP security. The audit company recommended turning off SNMP, but that is not an option
since you have so many remote nodes to keep track of. What step could you take to help secure
SNMP on your network?
A. Change the default community string names
B. Block all internal MAC address from using SNMP
C. Block access to UDP port 171
D. Block access to TCP port 171
Answer: A


QUESTION NO: 2
At what layer of the OSI model do routers function on?
A. 3
B. 4
C. 5
D. 1
Answer: A


QUESTION NO: 3
An "idle" system is also referred to as what?
A. Zombie
B. PC not being used
C. Bot
D. PC not connected to the Internet
Answer: A


QUESTION NO: 4
What operating system would respond to the following command?
A. Mac OS X
B. Windows XP
C. Windows 95
D. FreeBSD
Answer: D


QUESTION NO: 5
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers will not respond to idle scans
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers are constantly talking
Answer: D


QUESTION NO: 6
How many bits is Source Port Number in TCP Header packet?
A. 48
B. 32
C. 64
D. 16
Answer: D


QUESTION NO: 7
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers are constantly talking
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers will not respond to idle scans
Answer: A


QUESTION NO: 8
Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants
to hack into his former company's network. Since Simon remembers some of the server names,
he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish
here?
A. Enumerate all the users in the domain
B. Perform DNS poisoning
C. Send DOS commands to crash the DNS servers
D. Perform a zone transfer
Answer: D