Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

EC0-479 EC-Council Certified Security Analyst (ECSA) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

EC0-479 Practice Questions

EC-Council Certified Security Analyst (ECSA)

Last Update 22 hours ago
Total Questions : 232

Dive into our fully updated and stable EC0-479 practice test platform, featuring all the latest ECSA exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free ECSA practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about EC0-479. Use this test to pinpoint which areas you need to focus your study on.

EC0-479 PDF

EC0-479 PDF (Printable)
$43.75
$124.99

EC0-479 Testing Engine

EC0-479 PDF (Printable)
$50.75
$144.99

EC0-479 PDF + Testing Engine

EC0-479 PDF (Printable)
$63.7
$181.99
Question # 21

Paula works as the primary help desk contact for her company.Paula has just received a call from a user reporting that his computer just displayed a Blue Screen of Death screen and he can no longer work.Paula

walks over to the user‟s computer and sees the Blue Screen of Death screen.The user‟s computer is running

Windows XP, but the Blue Screen looks like a familiar one that Paula had seen on Windows 2000 computers periodically. The user said he stepped away from his computer for only 15 minutes and when he got back, the Blue Screen was there.Paula also noticed that the hard drive activity light was flashing, meaning that the computer was processing something.Paula knew this should not be the case since the computer should be completely frozen during a Blue Screen. She checks the network IDS live log entries and notices numerous nmap scan alerts.

What is Paula seeing happen on this computer?

Options:

A.  

Paula‟s network was scanned using Floppyscan

B.  

There was IRQ conflict in Paula‟s PC

C.  

Paula‟s network was scanned using Dumpsec

D.  

Tools like Nessus will cause BSOD

Discussion 0
Question # 22

A law enforcement officer may only search for and seize criminal evidence with _____________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists at the place to be searche

D.  

Options:

A.  

Mere Suspicion

B.  

A preponderance of the evidence

C.  

Probable cause

D.  

Beyond a reasonable doubt

Discussion 0
Question # 23

A state department site was recently attacked and all the servers had their disks erase

D.  

The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally erase

D.  

They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?

Options:

A.  

They examined the actual evidence on an unrelated system

B.  

They attempted to implicate personnel without proof

C.  

They tampered with evidence by using it

D.  

They called in the FBI without correlating with the fingerprint data

Discussion 0
Question # 24

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

Options:

A.  

The X509 Address

B.  

The SMTP reply Address

C.  

The E-mail Header

D.  

The Host Domain Name

Discussion 0
Question # 25

What does mactime, an essential part of the coroner‟s toolkit do?

Options:

A.  

It traverses the file system and produces a listing of all files based on the modification, access and change timestamps

B.  

It can recover deleted file space and search it for dat

A.  

However, it does not allow the investigator t preview them

C.  

The tools scans for i-node information, which is used by other tools in the tool kit

D.  

It is tool specific to the MAC OS and forms a core component of the toolkit

Discussion 0
Question # 26

You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have foun

D.  

The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subjects computer. You inform the officer that you will not be able to comply with that request because doing so would:

Options:

A.  

Violate your contract

B.  

Cause network congestion

C.  

Make you an agent of law enforcement

D.  

Write information to the subjects hard drive

Discussion 0
Question # 27

The police believe that Mevin Mattew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing, copying and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?

Options:

A.  

The Fourth Amendment

B.  

The USA patriot Act

C.  

The Good Samaritan Laws

D.  

The Federal Rules of Evidence

Discussion 0
Question # 28

The use of warning banners helps a company avoid litigation by overcoming an employees assumed

____________ When connecting to the company‟s intranet, network or Virtual Private Network(VPN) and will allow the company‟s investigators to monitor, search and retrieve information stored within the network.

Options:

A.  

Right to work

B.  

Right of free speech

C.  

Right to Internet Access

D.  

Right of Privacy

Discussion 0
Question # 29

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorize

D.  

You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been save

D.  

What should you examine next in this case?

Options:

A.  

The registry

B.  

Theswapfile

C.  

The recycle bin

D.  

The metadata

Discussion 0
Question # 30

You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?

Options:

A.  

ARP Poisoning

B.  

DNS Poisoning

C.  

HTTP redirect attack

D.  

IP Spoofing

Discussion 0
Get EC0-479 dumps and pass your exam in 24 hours!

Free Exams Sample Questions