Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

412-79v10 EC-Council Certified Security Analyst (ECSA) V10 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

412-79v10 Practice Questions

EC-Council Certified Security Analyst (ECSA) V10

Last Update 22 hours ago
Total Questions : 201

Dive into our fully updated and stable 412-79v10 practice test platform, featuring all the latest ECSA exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free ECSA practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 412-79v10. Use this test to pinpoint which areas you need to focus your study on.

412-79v10 PDF

412-79v10 PDF (Printable)
$43.75
$124.99

412-79v10 Testing Engine

412-79v10 PDF (Printable)
$50.75
$144.99

412-79v10 PDF + Testing Engine

412-79v10 PDF (Printable)
$63.7
$181.99
Question # 11

Transmission Control Protocol (TCP) is a connection-oriented four layer protocol. It is responsible for breaking messages into segments, re-assembling them at the destination station, and re-sending. Which one of the following protocols does not use the TCP?

Options:

A.  

Reverse Address Resolution Protocol (RARP)

B.  

HTTP (Hypertext Transfer Protocol)

C.  

SMTP (Simple Mail Transfer Protocol)

D.  

Telnet

Discussion 0
Question # 12

In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet".

Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down.

What will the other routers communicate between themselves?

Options:

A.  

More RESET packets to the affected router to get it to power back up

B.  

RESTART packets to the affected router to get it to power back up

C.  

The change in the routing fabric to bypass the affected router

D.  

STOP packets to all other routers warning of where the attack originated

Discussion 0
Question # 13

Which one of the following 802.11 types uses either FHSS or DSSS for modulation?

Options:

A.  

802.11b

B.  

802.11a

C.  

802.11n

D.  

802.11-Legacy

Discussion 0
Question # 14

Which of the following is the objective of Gramm-Leach-Bliley Act?

Options:

A.  

To ease the transfer of financial information between institutions and banks

B.  

To protect the confidentiality, integrity, and availability of data

C.  

To set a new or enhanced standards for all U.S. public company boards, management and public accounting firms

D.  

To certify the accuracy of the reported financial statement

Discussion 0
Question # 15

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

Options:

A.  

Use attack as a launching point to penetrate deeper into the network

B.  

Demonstrate that no system can be protected against DoS attacks

C.  

List weak points on their network

D.  

Show outdated equipment so it can be replaced

Discussion 0
Question # 16

Which one of the following tools of trade is an automated, comprehensive penetration testing product for assessing the specific information security threats to an organization?

Options:

A.  

Sunbelt Network Security Inspector (SNSI)

B.  

CORE Impact

C.  

Canvas

D.  

Microsoft Baseline Security Analyzer (MBSA)

Discussion 0
Question # 17

Identify the injection attack represented in the diagram below:

Question # 17

Options:

A.  

XPath Injection Attack

B.  

XML Request Attack

C.  

XML Injection Attack

D.  

Frame Injection Attack

Discussion 0
Question # 18

Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?

include

#include

int main(int argc, char *argv[])

{

char buffer[10];

if (argc < 2)

{

fprintf(stderr, "USAGE: %s string\n", argv[0]);

return 1;

}

strcpy(buffer, argv[1]);

return 0;

}

Options:

A.  

Buffer overflow

B.  

Format string bug

C.  

Kernal injection

D.  

SQL injection

Discussion 0
Question # 19

Which of the following policies states that the relevant application owner must authorize requests for additional access to specific business applications in writing to the IT Department/resource?

Options:

A.  

Special-Access Policy

B.  

User Identification and Password Policy

C.  

Personal Computer Acceptable Use Policy

D.  

User-Account Policy

Discussion 0
Question # 20

Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.

Options:

A.  

Unannounced Testing

B.  

Double Blind Testing

C.  

Announced Testing

D.  

Blind Testing

Discussion 0
Get 412-79v10 dumps and pass your exam in 24 hours!

Free Exams Sample Questions