Free EC0-479 Exam Braindumps (page: 8)

Page 7 of 26

George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan.
Why would a scanner like Nessus is not recommended in this situation?

  1. Nessus is too loud
  2. Nessus cannot perform wireless testing
  3. Nessus is not a network scanner
  4. There are no ways of performing a "stealthy" wireless scan

Answer(s): A



At what layer of the OSI model do routers function on?

  1. 4
  2. 3
  3. 1
  4. 5

Answer(s): B



Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related.
What organization should Frank submit the log to find out if it is a new vulnerability or not?

  1. APIPA
  2. IANA
  3. CVE
  4. RIPE

Answer(s): C



George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity.

George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?

  1. src port 23 and dst port 23
  2. udp port 22 and host 172.16.28.1/24
  3. net port 22
  4. src port 22 and dst port 22

Answer(s): D






Post your Comments and Discuss EC-Council EC0-479 exam with other Community members:

EC0-479 Discussions & Posts