Leads4pass > EC-COUNCIL > EC-COUNCIL Certifications > 412-79V10 > 412-79V10 Online Practice Questions and Answers

412-79V10 Online Practice Questions and Answers

Questions 4

In the TCP/IP model, the transport layer is responsible for reliability and flow control from source to the destination. TCP provides the mechanism for flow control by allowing the sending and receiving hosts to communicate. A flow control mechanism avoids the problem with a transmitting host overflowing the buffers in the receiving host.

Which of the following flow control mechanism guarantees reliable delivery of data?

A. Sliding Windows

B. Windowing

C. Positive Acknowledgment with Retransmission (PAR)

D. Synchronization

Buy Now
Questions 5

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

A. Connect Scanning Techniques

B. SYN Scanning Techniques

C. Stealth Scanning Techniques

D. Port Scanning Techniques

Buy Now
Questions 6

Application security assessment is one of the activity that a pen tester performs in the attack phase. It is designed to identify and assess threats to the organization through bespoke, proprietary applications or systems. It checks the application so that a malicious user cannot access, modify, or destroy data or services within the system.

Identify the type of application security assessment which analyzes the application-based code to confirm that it does not contain any sensitive information that an attacker might use to exploit an application.

A. Web Penetration Testing

B. Functionality Testing

C. Authorization Testing

D. Source Code Review

Buy Now
Questions 7

Which of the following are the default ports used by NetBIOS service?

A. 135, 136, 139, 445

B. 134, 135, 136, 137

C. 137, 138, 139, 140

D. 133, 134, 139, 142

Buy Now
Questions 8

By default, the TFTP server listens on UDP port 69. Which of the following utility reports the port status of target TCP and UDP ports on a local or a remote computer and is used to troubleshoot TCP/IP connectivity issues?

A. PortQry

B. Netstat

C. Telnet

D. Tracert

Buy Now
Questions 9

Vulnerability assessment is an examination of the ability of a system or application, including the current security procedures and controls, to withstand assault.

What does a vulnerability assessment identify?

A. Disgruntled employees

B. Weaknesses that could be exploited

C. Physical security breaches

D. Organizational structure

Buy Now
Questions 10

Which one of the following architectures has the drawback of internally considering the hosted services individually?

A. Weak Screened Subnet Architecture

B. "Inside Versus Outside" Architecture

C. "Three-Homed Firewall" DMZ Architecture

D. Strong Screened-Subnet Architecture

Buy Now
Questions 11

From where can clues about the underlying application environment can be collected?

A. From the extension of the file

B. From executable file

C. From file types and directories

D. From source code

Buy Now
Questions 12

Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?

A. Hash Key Length

B. C/R Value Length

C. C/R Key Length

D. Hash Value Length

Buy Now
Questions 13

If a web application sends HTTP cookies as its method for transmitting session tokens, it may be vulnerable which of the following attacks?

A. Parameter tampering Attack

B. Sql injection attack

C. Session Hijacking

D. Cross-site request attack

Buy Now
Exam Code: 412-79V10
Exam Name: EC-Council Certified Security Analyst (ECSA) V10
Last Update: Jan 11, 2025
Questions: 201
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99