Leads4pass > EC-COUNCIL > ECSA > 412-79V10 > 412-79V10 Online Practice Questions and Answers

412-79V10 Online Practice Questions and Answers

Questions 4

Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?

A. Project Goal

B. Success Factors

C. Objectives

D. Assumptions

Buy Now
Questions 5

Which of the following shields Internet users from artificial DNS data, such as a deceptive or mischievous address instead of the genuine address that was requested?

A. DNSSEC

B. Firewall

C. Packet filtering

D. IPSec

Buy Now
Questions 6

Which of the following approaches to vulnerability assessment relies on the administrator providing baseline of system configuration and then scanning continuously without incorporating any information found at the time of scanning?

A. Service-based Assessment Solutions

B. Product-based Assessment Solutions

C. Tree-based Assessment

D. Inference-based Assessment

Buy Now
Questions 7

In the context of penetration testing, what does blue teaming mean?

A. A penetration test performed with the knowledge and consent of the organization's IT staff

B. It is the most expensive and most widely used

C. It may be conducted with or without warning

D. A penetration test performed without the knowledge of the organization's IT staff but with permission from upper management

Buy Now
Questions 8

Which Wireshark filter displays all the packets where the IP address of the source host is 10.0.0.7?

A. ip.dst==10.0.0.7

B. ip.port==10.0.0.7

C. ip.src==10.0.0.7

D. ip.dstport==10.0.0.7

Buy Now
Questions 9

Which of the following attacks is an offline attack?

A. Pre-Computed Hashes

B. Hash Injection Attack

C. Password Guessing

D. Dumpster Diving

Buy Now
Questions 10

Which of the following is not the SQL injection attack character?

A. $

B. PRINT

C. #

D. @@variable

Buy Now
Questions 11

What threat categories should you use to prioritize vulnerabilities detected in the pen testing report?

A. 1, 2, 3, 4, 5

B. Low, medium, high, serious, critical

C. Urgent, dispute, action, zero, low

D. A, b, c, d, e

Buy Now
Questions 12

Which one of the following Snort logger mode commands is associated to run a binary log file through Snort in sniffer mode to dump the packets to the screen?

A. ./snort -dvr packet.log icmp

B. ./snort -dev -l ./log

C. ./snort -dv -r packet.log

D. ./snort -l ./log -b

Buy Now
Questions 13

Identify the type of firewall represented in the diagram below:

A. Stateful multilayer inspection firewall

B. Application level gateway

C. Packet filter

D. Circuit level gateway

Buy Now
Exam Code: 412-79V10
Exam Name: EC-Council Certified Security Analyst (ECSA) V10
Last Update: Nov 16, 2024
Questions: 201
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99