Latest 412-79v10 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : 412-79v10
Exam Name : Certified Security Analyst (ECSA) V10
Vendor Name : "EC-COUNCIL"







412-79v10 Dumps

412-79v10 Braindumps 412-79v10 Real Questions 412-79v10 Practice Test

412-79v10 Actual Questions


killexams.com


EC-COUNCIL


412-79v10


Certified Security Analyst (ECSA) V10


https://killexams.com/pass4sure/exam-detail/412-79v10



Question: 52


Which of the following defines the details of services to be provided for the client’s organization and the list of services required for performing the test in the organization?

A . Draft B . Report

C . Requirement list D . Quotation




Answer: D



Question: 53


Which of the following methods is used to perform server discovery? A . Banner Grabbing

B . Who is Lookup C . SQL Injection

D . Session Hijacking




Answer: B



Question: 54

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?

A . %systemroot%LSA

B . %systemroot%repair

C . %systemroot%system32driversetc

D . %systemroot%system32LSA




Answer: B



Question: 55


What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?

A . Server Side Includes B . Sort Server Includes C . Server Sort Includes D . Slide Server Includes




Answer: A



Question: 56


Which of the following will not handle routing protocols properly? A . “Internet-router-firewall-net architecture”

B . “Internet-firewall-router-net architecture” C . “Internet-firewall -net architecture”

D . “Internet-firewall/router(edge device)-net architecture”




Answer: B



Question: 57


Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism? A . AES

B . DES (ECB mode) C . MD5

D . RC5




Answer: C



Question: 58


Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs.


He looks up the behavior on the Internet, but cannot find anything related.


What organization should Frank submit the log to find out if it is a new vulnerability or not? A . CVE

B . IANA C . RIPE D . APIPA




Answer: A



Question: 59


Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram.


Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs) are identified by a TYPE field.


If the destination is not reachable, which one of the following are generated? A . Type 8 ICMP codes

B . Type 12 ICMP codes C . Type 3 ICMP codes D . Type 7 ICMP codes




Answer: C



Question: 60


War Driving is the act of moving around a specific area, mapping the population of wireless access points for statistical purposes. These statistics are then used to raise awareness of the security problems associated with these types of networks.


Which one of the following is a Linux based program that exploits the weak IV (Initialization Vector) problem documented with static WEP?

A . Airsnort B . Aircrack

C . WEPCrack D . Airpwn




Answer: A