Month End Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Top Tips for Passing the ECCouncil EC0-479 Exam on Your First Try

Questions 41

During the course of a corporate investigation, you find that an Employee is committing a crime. Can the Employer file a criminal complain with Police?

Options:
A.

Yes, and all evidence can be turned over to the police

B.

Yes, but only if you turn the evidence over to a federal law enforcement agency

C.

No, because the investigation was conducted without following standard police procedures

D.

No, because the investigation was conducted without warrant

ECCouncil EC0-479 Premium Access
Questions 42

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

Options:
A.

The X509 Address

B.

The SMTP reply Address

C.

The E-mail Header

D.

The Host Domain Name

Questions 43

Software firewalls work at which layer of the OSI model?

Options:
A.

Transport

B.

Application

C.

Network

D.

Data Link

Questions 44

What does ICMP Type 3/Code 13 mean?

Options:
A.

Host Unreachable

B.

Port Unreachable

C.

Protocol Unreachable

D.

Administratively Blocked

Questions 45

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers:

http://172.168.4.131/level/99/exec/show/config

After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

Options:
A.

URL Obfuscation Arbitrary Administrative Access Vulnerability

B.

Cisco IOS Arbitrary Administrative Access Online Vulnerability

C.

HTTP Configuration Arbitrary Administrative Access Vulnerability

D.

HTML Configuration Arbitrary Administrative Access Vulnerability

Questions 46

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?

Options:
A.

Enable BGP

B.

Disable BGP

C.

Enable direct broadcasts

D.

Disable direct broadcasts

Questions 47

Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?

Options:
A.

SDW Encryption

B.

EFS Encryption

C.

DFS Encryption

D.

IPS Encryption

Questions 48

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

Options:
A.

Open

B.

Stealth

C.

Closed

D.

Filtered

Questions 49

What will the following command produce on a website login page?

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'someone@somehwere.com'; DROP TABLE members; --'

Options:
A.

Inserts the Error! Reference source not found. email address into the members table

B.

Retrieves the password for the first user in the members table

C.

Deletes the entire members table

D.

This command will not produce anything since the syntax is incorrect

Questions 50

Software firewalls work at which layer of the OSI model?

Options:
A.

Data Link

B.

Network

C.

Transport

D.

Application

Exam Code: EC0-479
Certification Provider: ECCouncil
Exam Name: EC-Council Certified Security Analyst (ECSA)
Last Update: Jan 24, 2025
Questions: 232