Act now and download your EC-Council 412-79v9 test today! Do not waste time for the worthless EC-Council 412-79v9 tutorials. Download Update EC-Council EC-Council Certified Security Analyst (ECSA) v9 exam with real questions and answers and begin to learn EC-Council 412-79v9 with a classic professional.
Online 412-79v9 free questions and answers of New Version:
NEW QUESTION 1
An external intrusion test and analysis identify security weaknesses and strengths of the client's systems and networks as they appear from outside the client's security perimeter, usually from the Internet. The goal of an external intrusion test and analysis is to demonstrate the existence of known vulnerabilities that could be exploited by an external attacker.
During external penetration testing, which of the following scanning techniques allow you to determine a port’s state without making a full connection to the host?
Answer: B
NEW QUESTION 2
Which one of the following components of standard Solaris Syslog is a UNIX command that is used to add single-line entries to the system log?
Answer: A
NEW QUESTION 3
TCP/IP model is a framework for the Internet Protocol suite of computer network protocols that defines the communication in an IP-based network. It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.
Which of the following TCP/IP layers selects the best path through the network for packets to travel?
Answer: C
NEW QUESTION 4
Identify the person who will lead the penetration-testing project and be the client point of contact.
Answer: C
Explanation:
Reference: http://www.scribd.com/doc/133635286/LPTv4-Module-15-Pre-Penetration-Testing-Checklist-NoRestriction (page 15)
NEW QUESTION 5
SQL injection attack consists of insertion or "injection" of either a partial or complete SQL query via the data input or transmitted from the client (browser) to the web application.
A successful SQL injection attack can: i)Read sensitive data from the database
iii) Modify database data (insert/update/delete)
iii)Execute administration operations on the database (such as shutdown the DBMS) iV)Recover the content of a given file existing on the DBMS file system or write files into the file system
v)Issue commands to the operating system
Pen tester needs to perform various tests to detect SQL injection vulnerability. He has to make a list of all input fields whose values could be used in crafting a SQL query, including the hidden fields of POST requests and then test them separately, trying to interfere with the query and to generate an error.
In which of the following tests is the source code of the application tested in a non-runtime environment to detect the SQL injection vulnerabilities?
Answer: D
Explanation:
Reference: http://ijritcc.org/IJRITCC%20Vol_2%20Issue_5/Removal%20of%20Data%20Vulnerabilities
%20Using%20SQL.pdf
NEW QUESTION 6
Besides the policy implications of chat rooms, Internet Relay Chat (IRC) is frequented by attackers and used as a command and control mechanism. IRC normally uses which one of the following TCP ports?
Answer: C
NEW QUESTION 7
You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks. When assessing the risk to the clients network, what step should you take first?
Answer: C
NEW QUESTION 8
Which of the following statements is true about Multi-Layer Intrusion Detection Systems (mIDSs)?
Answer: A
Explanation:
Reference: http://www.symantec.com/connect/articles/multi-layer-intrusion-detection- systems (economic advantages, first para)
NEW QUESTION 9
Which of the following are the default ports used by NetBIOS service?
Answer: A
NEW QUESTION 10
Today, most organizations would agree that their most valuable IT assets reside within applications and databases. Most would probably also agree that these are areas that have the weakest levels of security, thus making them the prime target for malicious activity from system administrators, DBAs, contractors, consultants, partners, and customers.
Which of the following flaws refers to an application using poorly written encryption code to securely encrypt and store sensitive data in the database and allows an attacker to steal or modify weakly protected data such as credit card numbers, SSNs, and other authentication credentials?
Answer: B
NEW QUESTION 11
An antenna is a device that is designed to transmit and receive the electromagnetic waves that are generally called radio waves. Which one of the following types of antenna is
developed from waveguide technology?
Answer: B
NEW QUESTION 12
Which of the following equipment could a pen tester use to perform shoulder surfing?
Answer: A
Explanation:
Reference: http://en.wikipedia.org/wiki/Shoulder_surfing_(computer_security)
NEW QUESTION 13
DNS information records provide important data about:
Answer: B
NEW QUESTION 14
Logs are the record of the system and network activities. Syslog protocol is used for delivering log information across an IP network. Syslog messages can be sent via which one of the following?
Answer: A
NEW QUESTION 15
What threat categories should you use to prioritize vulnerabilities detected in the pen testing report?
Answer: B
NEW QUESTION 16
During external penetration testing, which of the following techniques uses tools like Nmap to predict the sequence numbers generated by the targeted server and use this information to perform session hijacking techniques?
Answer: A
Explanation:
Reference: http://www.scribd.com/doc/133636402/LPTv4-Module-18-External-Penetration-Testing-NoRestriction (p.43)
NEW QUESTION 17
Which of the following is the range for assigned ports managed by the Internet Assigned Numbers Authority (IANA)?
Answer: D
Explanation:
Reference: https://www.ietf.org/rfc/rfc1700.txt (well known port numbers, 4th para)
NEW QUESTION 18
Mason is footprinting an organization to gather competitive intelligence. He visits the company's website for contact information and telephone numbers but does not find any. He knows the entire staff directory was listed on their website 12 months. How can he find the directory?
Answer: D
NEW QUESTION 19
Which of the following appendices gives detailed lists of all the technical terms used in the report?
Answer: D
Explanation:
Refere’ http://en.wikipedia.org/wiki/Glossary
NEW QUESTION 20
The SnortMain () function begins by associating a set of handlers for the signals, Snort receives. It does this using the signal () function. Which one of the following functions is used as a programspecific signal and the handler for this calls the DropStats() function to output the current Snort statistics?
Answer: A
NEW QUESTION 21
By default, the TFTP server listens on UDP port 69. Which of the following utility reports the port status of target TCP and UDP ports on a local or a remote computer and is used to troubleshoot TCP/IP connectivity issues?
Answer: A
Explanation:
Reference: http://support.microsoft.com/kb/832919
NEW QUESTION 22
Assessing a network from a hacker's point of view to discover the exploits and vulnerabilities that are accessible to the outside world is which sort of vulnerability assessment?
Answer: D
Explanation:
Reference: http://controlcase.com/managed_compliance_pci_vulnerability_scan.html
NEW QUESTION 23
Which one of the following acts related to the information security in the US fix the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting?
Answer: B
NEW QUESTION 24
Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and it works well for direct scanning and often works well through firewalls?
Answer: A
NEW QUESTION 25
Which of the following is developed to address security concerns on time and reduce the misuse or threat of attacks in an organization?
Answer: A
NEW QUESTION 26
......
P.S. Easily pass 412-79v9 Exam with 203 Q&As Certleader Dumps & pdf Version, Welcome to Download the Newest Certleader 412-79v9 Dumps: https://www.certleader.com/412-79v9-dumps.html (203 New Questions)