Leads4pass > EC-COUNCIL > EC-COUNCIL Certifications > 412-79 > 412-79 Online Practice Questions and Answers

412-79 Online Practice Questions and Answers

Questions 4

In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

A. More RESET packets to the affected router to get it to power back up

B. RESTART packets to the affected router to get it to power back up

C. The change in the routing fabric to bypass the affected router

D. STOP packets to all other routers warning of where the attack originated

Buy Now
Questions 5

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

A. Filtered

B. Stealth

C. Closed

D. Open

Buy Now
Questions 6

Click on the Exhibit Button

Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette's duties include logging on to all the company's network equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as possible. Paulette presents the following screenshot to her boss so he can inform the client about necessary changes need to be made. From the screenshot, what changes should the client company make?

Exhibit:

A. The banner should not state "only authorized IT personnel may proceed"

B. Remove any identifying numbers, names, or version information

C. The banner should include the Cisco tech support contact information as well

D. The banner should have more detail on the version numbers for the network equipment

Buy Now
Questions 7

The objective of this act was to protect consumers personal financial information held by financial institutions and their service providers.

A. HIPAA

B. Sarbanes-Oxley 2002

C. Gramm-Leach-Bliley Act

D. California SB 1386

Buy Now
Questions 8

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

A. outlook:"search"

B. allinurl:"exchange/logon.asp"

C. locate:"logon page"

D. intitle:"exchange server"

Buy Now
Questions 9

You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data. What method would be most efficient for you to acquire digital evidence from this network?

A. create a compressed copy of the file with DoubleSpace

B. create a sparse data copy of a folder or file

C. make a bit-stream disk-to-image file

D. make a bit-stream disk-to-disk file

Buy Now
Questions 10

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

A. digital attack

B. denial of service

C. physical attack

D. ARP redirect

Buy Now
Questions 11

An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs (DVDs) by using a large magnet. You inform him that this method will not be effective in wiping out the data because CDs and DVDs are ______________ media used to store large amounts of data and are not affected by the magnet.

A. logical

B. anti-magnetic

C. magnetic

D. optical

Buy Now
Questions 12

____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.

A. Network Forensics

B. Computer Forensics

C. Incident Response

D. Event Reaction

Buy Now
Questions 13

This organization maintains a database of hash signatures for known software:

A. International Standards Organization

B. Institute of Electrical and Electronics Engineers

C. National Software Reference Library

D. American National standards Institute

Buy Now
Exam Code: 412-79
Exam Name: EC-Council Certified Security Analyst (ECSA)
Last Update: Jan 11, 2025
Questions: 232
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99