[PDF and VCE] Free 412-79 VCE and PDF, Exam Materials Instant Download

Tens of thousands of competitors, pages of hard questions and unsatisfied exam preparation situations… Do not worried about all those annoying things! We, help you with your Certified Ethical Hacker Hotest 412-79 study guide EC-Council Certified Security Analyst (ECSA) exam. We will assist you clear the May 26,2022 Latest 412-79 pdf exam with Certified Ethical Hacker 412-79 actual tests. We 412-79 dumps are the most comprehensive ones.

We Geekcert has our own expert team. They selected and published the latest 412-79 preparation materials from Official Exam-Center.

The following are the 412-79 free dumps. Go through and check the validity and accuracy of our 412-79 dumps.If you need to check sample questions of the 412-79 free dumps, go through the Q and As from 412-79 dumps below.

Question 1:

At what layer of the OSI model do routers function on?

A. 3

B. 4

C. 5

D. 1

Correct Answer: A

Question 2:

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

A. Windows computers will not respond to idle scans

B. Linux/Unix computers are constantly talking

C. Linux/Unix computers are easier to compromise

D. Windows computers are constantly talking

Correct Answer: D

Question 3:

How many bits is Source Port Number in TCP Header packet?

A. 48

B. 32

C. 64

D. 16

Correct Answer: D

Question 4:

You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

A. Metamorphic

B. Oligomorhic

C. Polymorphic

D. Transmorphic

Correct Answer: A

Question 5:

What is the following command trying to accomplish?

A. Verify that NETBIOS is running for the network

B. Verify that TCP port 445 is open for the network

C. Verify that UDP port 445 is open for the network

D. Verify that UDP port 445 is closed for the network

Correct Answer: C

Question 6:

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive footprinting against their Web servers. What tool should you use?

A. Nmap

B. Netcraft

C. Ping sweep

D. Dig

Correct Answer: B

Question 7:

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?

A. IPSEC does not work with packet filtering firewalls

B. NAT does not work with IPSEC

C. NAT does not work with statefull firewalls

D. Statefull firewalls do not work with packet filtering firewalls

Correct Answer: B

Question 8:

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold? needs?

A. Application-level proxy firewall

B. Data link layer firewall

C. Packet filtering firewall

D. Circuit-level proxy firewall

Correct Answer: A

Question 9:

What is a good security method to prevent unauthorized users from “tailgating”?

A. Electronic key systems

B. Man trap

C. Pick-resistant locks

D. Electronic combination locks

Correct Answer: B

Question 10:

If an attacker\’s computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

A. 31401

B. The zombie will not send a response

C. 31402

D. 31399

Correct Answer: A

Question 11:

A packet is sent to a router that does not have the packet destination address in its route table, how will the packet get to its properA packet is sent to a router that does not have the packet? destination address in its route table, how will the packet get to its proper destination?

A. Root Internet servers

B. Border Gateway Protocol

C. Gateway of last resort

D. Reverse DNS

Correct Answer: C

Question 12:

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?

A. Poison the DNS records with false records

B. Enumerate MX and A records from DNS

C. Enumerate domain user accounts and built-in groups

D. Establish a remote connection to the Domain Controller

Correct Answer: C

Question 13:

Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?

A. SDW Encryption

B. EFS Encryption

C. DFS Encryption

D. IPS Encryption

Correct Answer: B

Question 14:

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company\’s main office in Iowa. She states that she needs the receptionist\’s network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for.

What principal of social engineering did Julia use?

A. Reciprocation

B. Friendship/Liking

C. Social Validation

D. Scarcity

Correct Answer: A

Question 15:

John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?

A. Firewalk sets all packets with a TTL of zero

B. Firewalk cannot pass through Cisco firewalls

C. Firewalk sets all packets with a TTL of one

D. Firewalk cannot be detected by network sniffers

Correct Answer: C

Tagged: Tags