Weekend Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 412-79 EC-Council Certified Security Analyst (ECSA) is now Stable and With Pass Result

412-79 Practice Exam Questions and Answers

EC-Council Certified Security Analyst (ECSA)

Last Update 3 days ago
Total Questions : 232

EC-Council Certified Security Analyst (ECSA) is stable now with all latest exam questions are added 3 days ago. Incorporating 412-79 practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the EC-Council Certified Security Analyst (ECSA) exam format, identifying knowledge gaps, applying theoretical knowledge in ECCouncil practical scenarios, you are setting yourself up for success. 412-79 exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

412-79 exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through 412-79 dumps allows you to practice pacing yourself, ensuring that you can complete all EC-Council Certified Security Analyst (ECSA) exam questions within the allotted time frame without sacrificing accuracy.

412-79 PDF

412-79 PDF (Printable)
$48
$119.99

412-79 Testing Engine

412-79 PDF (Printable)
$56
$139.99

412-79 PDF + Testing Engine

412-79 PDF (Printable)
$70.8
$176.99
Question # 1

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

Options:

A.  

Avoid cross talk

B.  

Avoid over-saturation of wireless signals

C.  

So that the access points will work on different frequencies

D.  

Multiple access points can be set up on the same channel without any issues

Discussion 0
Question # 2

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

Options:

A.  

Windows computers will not respond to idle scans

B.  

Linux/Unix computers are constantly talking

C.  

Linux/Unix computers are easier to compromise

D.  

Windows computers are constantly talking

Discussion 0
Question # 3

Diskcopy is:

Options:

A.  

a utility byAccessData

B.  

a standard MS-DOS command

C.  

Digital Intelligence utility

D.  

dd copying tool

Discussion 0
Question # 4

What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?

Options:

A.  

mcopy

B.  

image

C.  

MD5

D.  

dd

Discussion 0
Question # 5

To preserve digital evidence, an investigator should ____________________

Options:

A.  

Make tow copies of each evidence item using a single imaging tool

B.  

Make a single copy of each evidence item using an approved imaging tool

C.  

Make two copies of each evidence item using different imaging tools

D.  

Only store the original evidence item

Discussion 0
Question # 6

What should you do when approached by a reporter about a case that you are working on or have worked on?

Options:

A.  

Refer the reporter to the attorney that retained you

B.  

Say, “no comment”

C.  

Answer all the reporters questions as completely as possible

D.  

Answer only the questions that help your case

Discussion 0
Question # 7

What does mactime, an essential part of the coroner‟s toolkit do?

Options:

A.  

It traverses the file system and produces a listing of all files based on the modification, access and change timestamps

B.  

It can recover deleted file space and search it for dat

A.  

However, it does not allow the investigator t preview them

C.  

The tools scans for i-node information, which is used by other tools in the tool kit

D.  

It is tool specific to the MAC OS and forms a core component of the toolkit

Discussion 0
Question # 8

The ____________________ refers to handing over the results of private investigations to the authorities because of indications of criminal activity.

Options:

A.  

Locard Exchange Principle

B.  

Clark Standard

C.  

Kelly Policy

D.  

Silver-Platter Doctrine

Discussion 0
Question # 9

You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firms employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will.

What do you do?

Options:

A.  

Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned

B.  

Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment

C.  

Inform the owner that conducting an investigation without a policy is a violation of the employees expectation of privacy

D.  

Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies

Discussion 0
Question # 10

If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

Options:

A.  

31401

B.  

The zombie will not send a response

C.  

31402

D.  

31399

Discussion 0
Question # 11

At what layer of the OSI model do routers function on?

Options:

A.  

3

B.  

4

C.  

5

D.  

1

Discussion 0
Question # 12

Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler issue with his home wireless network?

Options:

A.  

2.4 Ghz Cordless phones

B.  

Satellite television

C.  

CB radio

D.  

Computers on his wired network

Discussion 0
Question # 13

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

Options:

A.  

False negatives

B.  

True positives

C.  

True negatives

D.  

False positives

Discussion 0
Question # 14

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

Options:

A.  

True negatives

B.  

False negatives

C.  

False positives

D.  

True positives

Discussion 0
Question # 15

You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so quickly?

Options:

A.  

Networks using Active Directory never use SAM databases so the SAM database pulled was empty

B.  

Passwords of 14 characters or less are broken up into two 7-character hashes

C.  

The passwords that were cracked are local accounts on the Domain Controller

D.  

A password Group Policy change takes at least 3 weeks to completely replicate throughout a network

Discussion 0
Question # 16

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

Options:

A.  

outlook:"search"

B.  

allinurl:"exchange/logon.asp"

C.  

locate:"logon page"

D.  

intitle:"exchange server"

Discussion 0
Question # 17

Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

Options:

A.  

Fuzzing

B.  

Tailgating

C.  

Man trap attack

D.  

Backtrapping

Discussion 0
Question # 18

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?

Options:

A.  

IBM Methodology

B.  

LPT Methodology

C.  

Google Methodology

D.  

Microsoft Methodology

Discussion 0
Question # 19

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers:

http://172.168.4.131/level/99/exec/show/config

After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

Options:

A.  

URL Obfuscation Arbitrary Administrative Access Vulnerability

B.  

Cisco IOS Arbitrary Administrative Access Online Vulnerability

C.  

HTTP Configuration Arbitrary Administrative Access Vulnerability

D.  

HTML Configuration Arbitrary Administrative Access Vulnerability

Discussion 0
Question # 20

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

Options:

A.  

NIPS

B.  

Passive IDS

C.  

Progressive IDS

D.  

Active IDS

Discussion 0
Question # 21

At what layer of the OSI model do routers function on?

Options:

A.  

5

B.  

1

C.  

4

D.  

3

Discussion 0
Question # 22

You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data. What method would be most efficient for you to acquire digital evidence from this network?

Options:

A.  

create a compressed copy of the file with DoubleSpace

B.  

create a sparse data copy of a folder or file

C.  

make a bit-stream disk-to-image file

D.  

make a bit-stream disk-to-disk file

Discussion 0
Question # 23

When monitoring for both intrusion and security events between multiple computers, it is essential that the computers‟ clocks are synchronize

D.  

Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?

Options:

A.  

Universal Time Set

B.  

Network Time Protocol

C.  

SyncTime Service

D.  

Time-Sync Protocol

Discussion 0
Question # 24

An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weeken

D.  

You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?

Options:

A.  

EFS uses a 128- bit key that can‟t be cracked, so you will not be able to recover the information

B.  

When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information

C.  

The EFS Revoked Key Agent can be used on the Computer to recover the information

D.  

When the Encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information.

Discussion 0
Question # 25

Before you are called to testify as an expert, what must an attorney do first?

Options:

A.  

engage in damage control

B.  

prove that the tools you used to conduct your examination are perfect

C.  

read your curriculum vitae to the jury

D.  

qualify you as an expert witness

Discussion 0
Question # 26

The offset in a hexadecimal code is:

Options:

A.  

The last byte after the colon

B.  

The 0x at the beginning of the code

C.  

The 0x at the end of the code

D.  

The first byte after the colon

Discussion 0
Question # 27

The following excerpt is taken from a honeypot log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. (Note: The objective of this question is to test whether the student can read basic information from log entries and interpret the nature of attack.) Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169 Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482 Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53 Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21 Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53 Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111 Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80 Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53 Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53 Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0) Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506) Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080 Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558 From the options given below choose the one which best interprets the following entry: Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53

Options:

A.  

An IDS evasion technique

B.  

A buffer overflow attempt

C.  

A DNS zone transfer

D.  

Data being retrieved from 63.226.81.13

Discussion 0
Question # 28

What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?

Options:

A.  

A compressed file

B.  

A Data stream file

C.  

An encrypted file

D.  

A reserved file

Discussion 0
Question # 29

If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?

Options:

A.  

The system files have been copied by a remote attacker

B.  

The system administrator has created an incremental backup

C.  

The system has been compromised using a t0rnrootkit

D.  

Nothing in particular as these can be operational files

Discussion 0
Question # 30

Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?

Options:

A.  

the Microsoft Virtual Machine Identifier

B.  

the Personal Application Protocol

C.  

the Globally Unique ID

D.  

the Individual ASCII String

Discussion 0
Question # 31

Which of the following is NOT a graphics file?

Options:

A.  

Picture1.tga

B.  

Picture2.bmp

C.  

Picture3.nfo

D.  

Picture4.psd

Discussion 0
Question # 32

What binary coding is used most often for e-mail purposes?

Options:

A.  

MIME

B.  

Uuencode

C.  

IMAP

D.  

SMTP

Discussion 0
Question # 33

You are working as an independent computer forensics investigator and receive a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer la

B.  

When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a simple backup copy of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a simple backup copy will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?

Options:

A.  

Bit-stream Copy

B.  

Robust Copy

C.  

Full backup Copy

D.  

Incremental Backup Copy

Discussion 0
Question # 34

Bob has been trying to penetrate a remote production system for the past tow weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However law enforcement agencies were recoding his every activity and this was later presented as evidence. The organization had used a Virtual Environment to trap Bo

B.  

What is a Virtual Environment?

Options:

A.  

A Honeypot that traps hackers

B.  

A system Using Trojaned commands

C.  

An environment set up after the user logs in

D.  

An environment set up before an user logs in

Discussion 0
Get 412-79 dumps and pass your exam in 24 hours!

Free Exams Sample Questions