Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ECSA Verified Questions & Answer ( 2022/2023)

Beoordeling
-
Verkocht
-
Pagina's
63
Cijfer
A+
Geüpload op
22-06-2023
Geschreven in
2022/2023

ECSA Verified Questions & Answer ( 2022/2023) Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that

Instelling
Vak

Voorbeeld van de inhoud

ECSA Verified Questions & Answer
( 2022/2023)

Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your
network is secure, but there are some areas that needs improvement. The major area was SNMP
security. The audit company recommended turning off SNMP, but that is not an option since you have so
many remote nodes to keep track of. What step could you take to help secure SNMP on your network?

A. Change the default community string names

B. Block all internal MAC address from using SNMP

C. Block access to UDP port 171

D. Block access to TCP port 171 - <answer> -A



At what layer of the OSI model do routers function on?

A. 3

B. 4

C. 5

D. 1 - <answer> -A



An "idle" system is also referred to as what?

A. Zombie

B. PC not being used

C. Bot

D. PC not connected to the Internet - <answer> -A



What operating system would respond to the following command?

A. Mac OS X

,B. Windows XP

C. Windows 95

D. FreeBSD - <answer> -D



Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

A. Windows computers will not respond to idle scans

B. Linux/Unix computers are constantly talking

C. Linux/Unix computers are easier to compromise

D. Windows computers are constantly talking - <answer> -D



How many bits is Source Port Number in TCP Header packet?

A. 48

B. 32

C. 64

D. 16 - <answer> -D



Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

A. Windows computers are constantly talking

B. Linux/Unix computers are constantly talking

C. Linux/Unix computers are easier to compromise

D. Windows computers will not respond to idle scans - <answer> -A



Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack
into his former company's network. Since Simon remembers some of the server names, he attempts to
run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?

A. Enumerate all the users in the domain

B. Perform DNS poisoning

C. Send DOS commands to crash the DNS servers

D. Perform a zone transfer - <answer> -D

,After attending a CEH security seminar, you make a list of changes you would like to perform on your
network to increase its security. One of the first things you change is to switch the RestrictAnonymous
setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from
establishing a null session on the server. Using Userinfo tool mentioned at

the seminar, you succeed in establishing a null session with one of the servers. Why is that?

A. RestrictAnonymous must be set to "2" for complete security

B. RestrictAnonymous must be set to "3" for complete security

C. There is no way to always prevent an anonymous null session from establishing

D. RestrictAnonymous must be set to "10" for complete security - <answer> -A



What will the following command accomplish?

A. Test ability of a router to handle over-sized packets

B. Test the ability of a router to handle fragmented packets

C. Test the ability of a WLAN to handle fragmented packets

D. Test the ability of a router to handle under-sized packets - <answer> -A



What are the security risks of running a "repair" installation for Windows XP?

A. There are no security risks when running the "repair" installation for Windows XP

B. Pressing Shift+F1 gives the user administrative rights

C. Pressing Ctrl+F10 gives the user administrative rights

D. Pressing Shift+F10 gives the user administrative rights - <answer> -D



You are the security analyst working for a private company out of France. Your current assignment is to
obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance,
you discover that the bank security defenses are very strong and would take too long to penetrate. You
decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in
London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You
want to sniff the traffic and extract usernames and passwords. What

tool could you use to get this information?

A. RaidSniff

B. Snort

, C. Ettercap

D. Airsnort - <answer> -C



George is the network administrator of a large Internet company on the west coast. Per corporate policy,
none of the employees in the company are allowed to use FTP or SFTP programs without obtaining
approval from the IT department. Few managers are using SFTP program on their computers. Before
talking to his boss, George wants to have some proof of their activity.

George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?

A. net port 22

B. udp port 22 and host 172.16.28.1/24

C. src port 22 and dst port 22

D. src port 23 and dst port 23 - <answer> -C



You are assisting a Department of Defense contract company to become compliant with the stringent
security policies set by the DoD. One such strict rule is that firewalls must only allow incoming
connections that were first initiated by internal computers. What type of firewall must you implement to
abide by this policy?

A. Circuit-level proxy firewall

B. Packet filtering firewall

C. Application-level proxy firewall

D. Statefull firewall - <answer> -D



You are running known exploits against your network to test for possible vulnerabilities. To test the
strength of your virus software, you load a test network to mimic your production network. Your
software successfully blocks some simple macro and encrypted viruses. You decide to really test the
software by using virus code where the code rewrites itself entirely and the signatures change from child
to child, but the functionality stays the same. What type of virus is this that you are testing?

A. Metamorphic

B. Oligomorhic

C. Polymorphic

D. Transmorphic - <answer> -A

Geschreven voor

Vak

Documentinformatie

Geüpload op
22 juni 2023
Aantal pagina's
63
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
Certifiedacademics

Maak kennis met de verkoper

Seller avatar
Certifiedacademics Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
3
Lid sinds
2 jaar
Aantal volgers
1
Documenten
327
Laatst verkocht
2 maanden geleden
Online library

Get all your study sets here from exam elaboration, thesis to homeworks.

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen