Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

412-79 EC-Council Certified Security Analyst (ECSA) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

412-79 Practice Questions

EC-Council Certified Security Analyst (ECSA)

Last Update 1 day ago
Total Questions : 232

Dive into our fully updated and stable 412-79 practice test platform, featuring all the latest ECSA exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free ECSA practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 412-79. Use this test to pinpoint which areas you need to focus your study on.

412-79 PDF

412-79 PDF (Printable)
$43.75
$124.99

412-79 Testing Engine

412-79 PDF (Printable)
$50.75
$144.99

412-79 PDF + Testing Engine

412-79 PDF (Printable)
$63.7
$181.99
Question # 11

At what layer of the OSI model do routers function on?

Options:

A.  

3

B.  

4

C.  

5

D.  

1

Discussion 0
Question # 12

Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler issue with his home wireless network?

Options:

A.  

2.4 Ghz Cordless phones

B.  

Satellite television

C.  

CB radio

D.  

Computers on his wired network

Discussion 0
Question # 13

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

Options:

A.  

False negatives

B.  

True positives

C.  

True negatives

D.  

False positives

Discussion 0
Question # 14

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

Options:

A.  

True negatives

B.  

False negatives

C.  

False positives

D.  

True positives

Discussion 0
Question # 15

You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so quickly?

Options:

A.  

Networks using Active Directory never use SAM databases so the SAM database pulled was empty

B.  

Passwords of 14 characters or less are broken up into two 7-character hashes

C.  

The passwords that were cracked are local accounts on the Domain Controller

D.  

A password Group Policy change takes at least 3 weeks to completely replicate throughout a network

Discussion 0
Question # 16

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

Options:

A.  

outlook:"search"

B.  

allinurl:"exchange/logon.asp"

C.  

locate:"logon page"

D.  

intitle:"exchange server"

Discussion 0
Question # 17

Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

Options:

A.  

Fuzzing

B.  

Tailgating

C.  

Man trap attack

D.  

Backtrapping

Discussion 0
Question # 18

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?

Options:

A.  

IBM Methodology

B.  

LPT Methodology

C.  

Google Methodology

D.  

Microsoft Methodology

Discussion 0
Question # 19

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers:

http://172.168.4.131/level/99/exec/show/config

After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

Options:

A.  

URL Obfuscation Arbitrary Administrative Access Vulnerability

B.  

Cisco IOS Arbitrary Administrative Access Online Vulnerability

C.  

HTTP Configuration Arbitrary Administrative Access Vulnerability

D.  

HTML Configuration Arbitrary Administrative Access Vulnerability

Discussion 0
Question # 20

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

Options:

A.  

NIPS

B.  

Passive IDS

C.  

Progressive IDS

D.  

Active IDS

Discussion 0
Get 412-79 dumps and pass your exam in 24 hours!

Free Exams Sample Questions