Free EC0-479 Exam Braindumps (page: 9)

Page 8 of 26

Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort.
Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?

  1. Border Gateway Protocol
  2. Cisco Discovery Protocol
  3. Broadcast System Protocol
  4. Simple Network Management Protocol

Answer(s): B



In Linux, what is the smallest possible shellcode?

  1. 24 bytes
  2. 8 bytes
  3. 800 bytes
  4. 80 bytes

Answer(s): A



Jim performed a vulnerability analysis on his network and found no potentiaI problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable.
What kind of results did Jim receive from his vulnerability analysis?

  1. False negatives
  2. False positives
  3. True negatives
  4. True positives

Answer(s): A



You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network.
Why would you want to initiate a DoS attack on a system you are testing?

  1. Show outdated equipment so it can be replaced
  2. List weak points on their network
  3. Use attack as a launching point to penetrate deeper into the network
  4. Demonstrate that no system can be protected against DoS attacks

Answer(s): B






Post your Comments and Discuss EC-Council EC0-479 exam with other Community members:

EC0-479 Discussions & Posts