Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

412-79 EC-Council Certified Security Analyst (ECSA) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

412-79 Practice Questions

EC-Council Certified Security Analyst (ECSA)

Last Update 1 day ago
Total Questions : 232

Dive into our fully updated and stable 412-79 practice test platform, featuring all the latest ECSA exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free ECSA practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 412-79. Use this test to pinpoint which areas you need to focus your study on.

412-79 PDF

412-79 PDF (Printable)
$43.75
$124.99

412-79 Testing Engine

412-79 PDF (Printable)
$50.75
$144.99

412-79 PDF + Testing Engine

412-79 PDF (Printable)
$63.7
$181.99
Question # 21

At what layer of the OSI model do routers function on?

Options:

A.  

5

B.  

1

C.  

4

D.  

3

Discussion 0
Question # 22

You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data. What method would be most efficient for you to acquire digital evidence from this network?

Options:

A.  

create a compressed copy of the file with DoubleSpace

B.  

create a sparse data copy of a folder or file

C.  

make a bit-stream disk-to-image file

D.  

make a bit-stream disk-to-disk file

Discussion 0
Question # 23

When monitoring for both intrusion and security events between multiple computers, it is essential that the computers‟ clocks are synchronize

D.  

Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?

Options:

A.  

Universal Time Set

B.  

Network Time Protocol

C.  

SyncTime Service

D.  

Time-Sync Protocol

Discussion 0
Question # 24

An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weeken

D.  

You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?

Options:

A.  

EFS uses a 128- bit key that can‟t be cracked, so you will not be able to recover the information

B.  

When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information

C.  

The EFS Revoked Key Agent can be used on the Computer to recover the information

D.  

When the Encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information.

Discussion 0
Question # 25

Before you are called to testify as an expert, what must an attorney do first?

Options:

A.  

engage in damage control

B.  

prove that the tools you used to conduct your examination are perfect

C.  

read your curriculum vitae to the jury

D.  

qualify you as an expert witness

Discussion 0
Question # 26

The offset in a hexadecimal code is:

Options:

A.  

The last byte after the colon

B.  

The 0x at the beginning of the code

C.  

The 0x at the end of the code

D.  

The first byte after the colon

Discussion 0
Question # 27

The following excerpt is taken from a honeypot log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. (Note: The objective of this question is to test whether the student can read basic information from log entries and interpret the nature of attack.) Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169 Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482 Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53 Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21 Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53 Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111 Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80 Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53 Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53 Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0) Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506) Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080 Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558 From the options given below choose the one which best interprets the following entry: Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53

Options:

A.  

An IDS evasion technique

B.  

A buffer overflow attempt

C.  

A DNS zone transfer

D.  

Data being retrieved from 63.226.81.13

Discussion 0
Question # 28

What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?

Options:

A.  

A compressed file

B.  

A Data stream file

C.  

An encrypted file

D.  

A reserved file

Discussion 0
Question # 29

If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?

Options:

A.  

The system files have been copied by a remote attacker

B.  

The system administrator has created an incremental backup

C.  

The system has been compromised using a t0rnrootkit

D.  

Nothing in particular as these can be operational files

Discussion 0
Question # 30

Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?

Options:

A.  

the Microsoft Virtual Machine Identifier

B.  

the Personal Application Protocol

C.  

the Globally Unique ID

D.  

the Individual ASCII String

Discussion 0
Get 412-79 dumps and pass your exam in 24 hours!

Free Exams Sample Questions