显示标签为“412-79”的博文。显示所有博文
显示标签为“412-79”的博文。显示所有博文

2013年12月12日星期四

Exam 412-79 braindumps

If you don't purchase any course, although you spend a lot of time and effort to review of knowledge to prepare for EC-COUNCIL certification 412-79 exam, it is still risky for you to pass the exam. But selecting IT-Tests's products allows you to spend a small amount of money and time and safely pass the exam. I believe that IT-Tests.com is more suitable for your choice in the society where time is so valuable. Moreover, our IT-Tests.com a distinct website which can give you a guarantee among many similar sites. Choosing IT-Tests.com is equivalent to choose success.

IT-Tests.com EC-COUNCIL 412-79 exam questions are compiled according to the latest syllabus and the actual 412-79 certification exam. We are also constantly upgrade our training materials so that you could get the best and the latest information for the first time. When you buy our 412-79 exam training materials, you will get a year of free updates. At any time, you can extend the the update subscription time, so that you can have a longer time to prepare for the exam.

Education degree does not equal strength, and it does not mean ability. Education degree just mean that you have this learning experience only. And the real ability is exercised in practice, it is not necessarily linked with the academic qualifications. Do not feel that you have no ability, and don't doubt yourself. When you choose to participate in the EC-COUNCIL 412-79 exam, it is necessary to pass it. If you are concerned about the test, however, you can choose IT-Tests.com's EC-COUNCIL 412-79 exam training materials. No matter how low your qualifications, you can easily understand the content of the training materials. And you can pass the exam successfully.

IT-Tests.com provide different training tools and resources to prepare for the EC-COUNCIL 412-79 exam. The preparation guide includes courses, practice test, test engine and part free PDF download.

You can free download part of IT-Tests's exercises and answers about EC-COUNCIL certification 412-79 exam as a try, then you will be more confident to choose our IT-Tests's products to prepare your EC-COUNCIL certification 412-79 exam. Please add IT-Tests's products in you cart quickly.

IT-Tests.com's EC-COUNCIL 412-79 exam training materials not only can save your energy and money, but also can save a lot of time for you. Because the things what our materials have done, you might need a few months to achieve. So what you have to do is use the IT-Tests.com EC-COUNCIL 412-79 exam training materials. And obtain this certificate for yourself. IT-Tests.com will help you to get the knowledge and experience that you need and will provide you with a detailed EC-COUNCIL 412-79 exam objective. So with it, you will pass the exam.

EC-COUNCIL 412-79 certificate can help you a lot. It can help you improve your job and living standard, and having it can give you a great sum of wealth. EC-COUNCIL certification 412-79 exam is a test of the level of knowledge of IT professionals. IT-Tests.com has developed the best and the most accurate training materials about EC-COUNCIL certification 412-79 exam. Now IT-Tests.com can provide you the most comprehensive training materials about EC-COUNCIL 412-79 exam, including exam practice questions and answers.

Exam Code: 412-79
Exam Name: EC-COUNCIL (EC-Council Certified Security Analyst (ECSA))
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 100 Questions and Answers
Last Update: 2013-12-12

412-79 (EC-Council Certified Security Analyst (ECSA)) Free Demo Download: http://www.it-tests.com/412-79.html

NO.1 .Your company uses Cisco routers exclusively throughout the network. After securing the routers to
the best of your knowledge, an outside security firm is brought in to assess the network security. Although
they found very few issues, they were able to enumerate the model, OS version, and capabilities for all
your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate
this information on your Cisco routers?
A. Simple Network Management Protocol
B. Broadcast System Protocol
C. Cisco Discovery Protocol
D. Border Gateway Protocol
Answer: C

EC-COUNCIL exam   412-79   412-79 exam dumps   412-79

NO.2 .At what layer of the OSI model do routers function on?
A. 3
B. 4
C. 5
D. 1
Answer: A

EC-COUNCIL exam simulations   412-79 questions   412-79   412-79 exam   412-79 test   412-79

NO.3 .How many bits is Source Port Number in TCP Header packet?
A. 48
B. 32
C. 64
D. 16
Answer: D

EC-COUNCIL exam dumps   412-79 braindump   412-79 exam simulations

NO.4 .You are the security analyst working for a private company out of France. Your current assignment is
to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance,
you discover that the bank security defenses are very strong and would take too long to penetrate. You
decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in
London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You
want to sniff the traffic and extract usernames and passwords. What tool could you use to get this
information?
A. RaidSniff
B. Snort
C. Ettercap
D. Airsnort
Answer: C

EC-COUNCIL questions   412-79 certification   412-79 study guide   412-79   412-79 certification training

NO.5 .In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers
to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down
the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to
the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts
itself down. What will the other routers communicate between themselves?
A. More RESET packets to the affected router to get it to power back up
B. RESTART packets to the affected router to get it to power back up
C. The change in the routing fabric to bypass the affected router
D. STOP packets to all other routers warning of where the attack originated
Answer: C

EC-COUNCIL exam dumps   412-79   412-79 test   412-79

NO.6 .You are running known exploits against your network to test for possible vulnerabilities. To test the
strength of your virus software, you load a test network to mimic your production network. Your software
successfully blocks some simple macro and encrypted viruses. You decide to really test the software by
using virus code where the code rewrites itself entirely and the signatures change
6 from child to child, but the functionality stays the same. What type of virus is this that you are testing?
A. Metamorphic
B. Oligomorhic
C. Polymorphic
D. Transmorphic
Answer: A

EC-COUNCIL exam prep   412-79 study guide   412-79 test answers   412-79 pdf

NO.7 .Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to
hack into his former company's network. Since Simon remembers some of the server names, he attempts
to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?
A. Enumerate all the users in the domain
B. Perform DNS poisoning
C. Send DOS commands to crash the DNS servers
D. Perform a zone transfer
Answer: D

EC-COUNCIL   412-79   412-79

NO.8 .Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers will not respond to idle scans
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers are constantly talking
Answer: D

EC-COUNCIL certification   412-79   412-79 exam prep   412-79

NO.9 George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities
of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a
scanner like Nessus is not recommended in this situation?
A. Nessus is too loud
B. There are no ways of performing a "stealthy" wireless scan
C. Nessus cannot perform wireless testing
D. Nessus is not a network scanner
Answer: A

EC-COUNCIL pdf   412-79   412-79   412-79   412-79

NO.10 .You are assisting a Department of Defense contract company to become compliant with the stringent
security policies set by the DoD. One such strict rule is that firewalls must only allow incoming
connections that were first initiated by internal computers. What type of firewall must you implement to
abide by this policy?
A. Circuit-level proxy firewall
B. Packet filtering firewall
C. Application-level proxy firewall
D. Statefull firewall
Answer: D

EC-COUNCIL exam simulations   412-79 pdf   412-79   412-79 questions

NO.11 .What will the following command accomplish?
A. Test ability of a router to handle over-sized packets
B. Test the ability of a router to handle fragmented packets
C. Test the ability of a WLAN to handle fragmented packets
D. Test the ability of a router to handle under-sized packets
Answer: A

EC-COUNCIL   412-79   412-79 exam simulations   412-79 exam prep   412-79   412-79 dumps

NO.12 .Your company's network just finished going through a SAS 70 audit. This audit reported that overall,
your network is secure, but there are some areas that needs improvement. The major area was SNMP
security. The audit company recommended turning off SNMP, but that is not an option since you have so
many remote nodes to keep track of. What step could you take to help secure SNMP on your network?
A. Change the default community string names
B. Block all internal MAC address from using SNMP
C. Block access to UDP port 171
D. Block access to TCP port 171
Answer: A

EC-COUNCIL certification training   412-79 original questions   412-79   412-79

NO.13 .What is the following command trying to accomplish?
A. Verify that NETBIOS is running for the 192.168.0.0 network
B. Verify that TCP port 445 is open for the 192.168.0.0 network
C. Verify that UDP port 445 is open for the 192.168.0.0 network
D. Verify that UDP port 445 is closed for the 192.168.0.0 network
Answer: C

EC-COUNCIL answers real questions   412-79 test questions   412-79   412-79 certification   412-79 exam prep

NO.14 .An "idle" system is also referred to as what?
A. Zombie
B. PC not being used
C. Bot
D. PC not connected to the Internet
Answer: A

EC-COUNCIL certification   412-79 exam prep   412-79   412-79   412-79 exam   412-79

NO.15 .George is the network administrator of a large Internet company on the west coast. Per corporate
policy, none of the employees in the company are allowed to use FTP or SFTP programs without
obtaining approval from the IT department. Few managers are using SFTP program on their computers.
Before talking to his boss, George wants to have some proof of their activity.
George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?
A. net port 22
B. udp port 22 and host 172.16.28.1/24
C. src port 22 anddst port 22
D. src port 23 anddst port 23
Answer: C

EC-COUNCIL   412-79 dumps   412-79 original questions

NO.16 .Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers are constantly talking
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers will not respond to idle scans
Answer: A

EC-COUNCIL exam   412-79 pdf   412-79 test answers   412-79   412-79 practice test

NO.17 .After attending a CEH security seminar, you make a list of changes you would like to perform on your
network to increase its security. One of the first things you change is to switch the RestrictAnonymous
setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from
establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in
establishing a null session with one of the servers. Why is that?
A. RestrictAnonymous must be set to "2" for complete security
B. RestrictAnonymous must be set to "3" for complete security
C. There is no way to always prevent an anonymous null session from establishing
D. RestrictAnonymous must be set to "10" for complete security
Answer: A

EC-COUNCIL certification training   412-79 exam   412-79 braindump   412-79

NO.18 .You are carrying out the last round of testing for your new website before it goes live. The website has
many dynamic pages and connects to a SQL backend that accesses your product inventory in a database.
You come across a web security site that recommends inputting the following code into a search field on
web pages to check for vulnerabilities:
This is a test
When you type this and click on search, you receive a pop-up window that says:
"This is a test."
What is the result of this test?
A. Your website is vulnerable to web bugs
B. Your website is vulnerable to CSS
C. Your website is not vulnerable
D. Your website is vulnerable to SQL injection
Answer: B

EC-COUNCIL exam simulations   412-79   412-79

NO.19 .What operating system would respond to the following command?
A. Mac OS X
B. Windows XP
C. Windows 95
D. FreeBSD
Answer: D

EC-COUNCIL pdf   412-79   412-79   412-79

NO.20 .What are the security risks of running a "repair" installation for Windows XP?
A. There are no security risks when running the "repair" installation for Windows XP
B. Pressing Shift+F1gives the user administrative rights
C. Pressing Ctrl+F10 gives the user administrative rights
D. Pressing Shift+F10 gives the user administrative rights
Answer: D

EC-COUNCIL test answers   412-79   412-79   412-79   412-79

IT-Tests.com offer the latest HP0-J67 Questions & Answers and high-quality 1Z1-061 PDF Practice Test. Our 70-484 VCE testing engine and 000-087 study guide can help you pass the real exam. High-quality 70-462 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/412-79.html

2013年11月22日星期五

EC-COUNCIL certification 412-79 exam best training materials

IT-Tests's products are developed by a lot of experienced IT specialists using their wealth of knowledge and experience to do research for IT certification exams. So if you participate in EC-COUNCIL certification 412-79 exam, please choose our IT-Tests's products, IT-Tests.com can not only provide you a wide coverage and good quality exam information to guarantee you to let you be ready to face this very professional exam but also help you pass EC-COUNCIL certification 412-79 exam to get the certification.

You can free download part of IT-Tests's practice questions and answers about EC-COUNCIL certification 412-79 exam online. Once you decide to select IT-Tests, IT-Tests.com will make every effort to help you pass the exam. If you find that our exam practice questions and answers is very different form the actual exam questions and answers and can not help you pass the exam, we will immediately 100% full refund.

EC-COUNCIL 412-79 certification can guarantee you have good job prospects, because EC-COUNCIL certification 412-79 exam is a difficult test of IT knowledge, passing EC-COUNCIL certification 412-79 exam proves that your IT expertise a strong and you can be qualified for a good job.

Exam Code: 412-79
Exam Name: EC-COUNCIL (EC-Council Certified Security Analyst (ECSA))
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 100 Questions and Answers
Last Update: 2013-11-22

We should use the most relaxed attitude to face all difficulties. Although EC-COUNCIL 412-79 exam is very difficult, but we candidates should use the most relaxed state of mind to face it. Because IT-Tests.com's EC-COUNCIL 412-79 exam training materials will help us to pass the exam successfully. With it, we would not be afraid, and will not be confused. IT-Tests.com's EC-COUNCIL 412-79 exam training materials is the best medicine for candidates.

412-79 (EC-Council Certified Security Analyst (ECSA)) Free Demo Download: http://www.it-tests.com/412-79.html

NO.1 .George is the network administrator of a large Internet company on the west coast. Per corporate
policy, none of the employees in the company are allowed to use FTP or SFTP programs without
obtaining approval from the IT department. Few managers are using SFTP program on their computers.
Before talking to his boss, George wants to have some proof of their activity.
George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?
A. net port 22
B. udp port 22 and host 172.16.28.1/24
C. src port 22 anddst port 22
D. src port 23 anddst port 23
Answer: C

EC-COUNCIL certification   412-79   412-79 test

NO.2 .In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers
to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down
the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to
the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts
itself down. What will the other routers communicate between themselves?
A. More RESET packets to the affected router to get it to power back up
B. RESTART packets to the affected router to get it to power back up
C. The change in the routing fabric to bypass the affected router
D. STOP packets to all other routers warning of where the attack originated
Answer: C

EC-COUNCIL   412-79 dumps   412-79 test   412-79 demo

NO.3 .Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers will not respond to idle scans
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers are constantly talking
Answer: D

EC-COUNCIL   412-79 pdf   412-79

NO.4 .Your company uses Cisco routers exclusively throughout the network. After securing the routers to
the best of your knowledge, an outside security firm is brought in to assess the network security. Although
they found very few issues, they were able to enumerate the model, OS version, and capabilities for all
your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate
this information on your Cisco routers?
A. Simple Network Management Protocol
B. Broadcast System Protocol
C. Cisco Discovery Protocol
D. Border Gateway Protocol
Answer: C

EC-COUNCIL   412-79   412-79 answers real questions

NO.5 .What are the security risks of running a "repair" installation for Windows XP?
A. There are no security risks when running the "repair" installation for Windows XP
B. Pressing Shift+F1gives the user administrative rights
C. Pressing Ctrl+F10 gives the user administrative rights
D. Pressing Shift+F10 gives the user administrative rights
Answer: D

EC-COUNCIL test answers   412-79   412-79 practice test   412-79

NO.6 .An "idle" system is also referred to as what?
A. Zombie
B. PC not being used
C. Bot
D. PC not connected to the Internet
Answer: A

EC-COUNCIL answers real questions   412-79 test answers   412-79 exam prep   412-79 exam simulations   412-79

NO.7 .Your company's network just finished going through a SAS 70 audit. This audit reported that overall,
your network is secure, but there are some areas that needs improvement. The major area was SNMP
security. The audit company recommended turning off SNMP, but that is not an option since you have so
many remote nodes to keep track of. What step could you take to help secure SNMP on your network?
A. Change the default community string names
B. Block all internal MAC address from using SNMP
C. Block access to UDP port 171
D. Block access to TCP port 171
Answer: A

EC-COUNCIL   412-79 exam prep   412-79

NO.8 George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities
of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a
scanner like Nessus is not recommended in this situation?
A. Nessus is too loud
B. There are no ways of performing a "stealthy" wireless scan
C. Nessus cannot perform wireless testing
D. Nessus is not a network scanner
Answer: A

EC-COUNCIL   412-79   412-79

NO.9 .Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to
hack into his former company's network. Since Simon remembers some of the server names, he attempts
to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?
A. Enumerate all the users in the domain
B. Perform DNS poisoning
C. Send DOS commands to crash the DNS servers
D. Perform a zone transfer
Answer: D

EC-COUNCIL exam prep   412-79   412-79 test answers   412-79 test answers   412-79 exam dumps

NO.10 .You are running known exploits against your network to test for possible vulnerabilities. To test the
strength of your virus software, you load a test network to mimic your production network. Your software
successfully blocks some simple macro and encrypted viruses. You decide to really test the software by
using virus code where the code rewrites itself entirely and the signatures change
6 from child to child, but the functionality stays the same. What type of virus is this that you are testing?
A. Metamorphic
B. Oligomorhic
C. Polymorphic
D. Transmorphic
Answer: A

EC-COUNCIL   412-79 certification training   412-79

NO.11 .How many bits is Source Port Number in TCP Header packet?
A. 48
B. 32
C. 64
D. 16
Answer: D

EC-COUNCIL demo   412-79   412-79 exam prep   412-79 exam

NO.12 .You are assisting a Department of Defense contract company to become compliant with the stringent
security policies set by the DoD. One such strict rule is that firewalls must only allow incoming
connections that were first initiated by internal computers. What type of firewall must you implement to
abide by this policy?
A. Circuit-level proxy firewall
B. Packet filtering firewall
C. Application-level proxy firewall
D. Statefull firewall
Answer: D

EC-COUNCIL test   412-79 certification   412-79   412-79 study guide

NO.13 .You are carrying out the last round of testing for your new website before it goes live. The website has
many dynamic pages and connects to a SQL backend that accesses your product inventory in a database.
You come across a web security site that recommends inputting the following code into a search field on
web pages to check for vulnerabilities:
This is a test
When you type this and click on search, you receive a pop-up window that says:
"This is a test."
What is the result of this test?
A. Your website is vulnerable to web bugs
B. Your website is vulnerable to CSS
C. Your website is not vulnerable
D. Your website is vulnerable to SQL injection
Answer: B

EC-COUNCIL   412-79   412-79

NO.14 .At what layer of the OSI model do routers function on?
A. 3
B. 4
C. 5
D. 1
Answer: A

EC-COUNCIL   412-79   412-79   412-79

NO.15 .What will the following command accomplish?
A. Test ability of a router to handle over-sized packets
B. Test the ability of a router to handle fragmented packets
C. Test the ability of a WLAN to handle fragmented packets
D. Test the ability of a router to handle under-sized packets
Answer: A

EC-COUNCIL answers real questions   412-79   412-79 practice test   412-79 test   412-79

NO.16 .What operating system would respond to the following command?
A. Mac OS X
B. Windows XP
C. Windows 95
D. FreeBSD
Answer: D

EC-COUNCIL dumps   412-79 exam simulations   412-79 certification training   412-79 exam dumps

NO.17 .What is the following command trying to accomplish?
A. Verify that NETBIOS is running for the 192.168.0.0 network
B. Verify that TCP port 445 is open for the 192.168.0.0 network
C. Verify that UDP port 445 is open for the 192.168.0.0 network
D. Verify that UDP port 445 is closed for the 192.168.0.0 network
Answer: C

EC-COUNCIL exam dumps   412-79   412-79   412-79 certification training

NO.18 .After attending a CEH security seminar, you make a list of changes you would like to perform on your
network to increase its security. One of the first things you change is to switch the RestrictAnonymous
setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from
establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in
establishing a null session with one of the servers. Why is that?
A. RestrictAnonymous must be set to "2" for complete security
B. RestrictAnonymous must be set to "3" for complete security
C. There is no way to always prevent an anonymous null session from establishing
D. RestrictAnonymous must be set to "10" for complete security
Answer: A

EC-COUNCIL   412-79   412-79

NO.19 .Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers are constantly talking
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers will not respond to idle scans
Answer: A

EC-COUNCIL exam   412-79 test answers   412-79 demo   412-79

NO.20 .You are the security analyst working for a private company out of France. Your current assignment is
to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance,
you discover that the bank security defenses are very strong and would take too long to penetrate. You
decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in
London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You
want to sniff the traffic and extract usernames and passwords. What tool could you use to get this
information?
A. RaidSniff
B. Snort
C. Ettercap
D. Airsnort
Answer: C

EC-COUNCIL answers real questions   412-79   412-79 dumps   412-79

IT-Tests.com offer the latest 000-596 Questions & Answers and high-quality 70-492 PDF Practice Test. Our 1z0-822 VCE testing engine and MB7-702 study guide can help you pass the real exam. High-quality HH0-050 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/412-79.html

2013年6月16日星期日

Latest training guide for EC-COUNCIL 412-79

IT-Tests.com provide you the product with high quality and reliability. You can free download online part of IT-Tests's providing practice questions and answers about the EC-COUNCIL certification 412-79 exam as a try. After your trail I believe you will be very satisfied with our product. Such a good product which can help you pass the exam successfully, what are you waiting for? Please add it to your shopping cart.


Now passing EC-COUNCIL certification 412-79 exam is not easy, so choosing a good training tool is a guarantee of success. IT-Tests.com will be the first time to provide you with exam information and exam practice questions and answers to let you be fully prepared to ensure 100% to pass EC-COUNCIL certification 412-79 exam. IT-Tests.com can not only allow you for the first time to participate in the EC-COUNCIL certification 412-79 exam to pass it successfully, but also help you save a lot of valuable time.


Our IT-Tests.com is a professional website to provide accurate exam material for a variety of IT certification exams. And IT-Tests.com can help many IT professionals enhance their career goals. The strength of our the IT elite team will make you feel incredible. You can try to free download part of the exam questions and answers about EC-COUNCIL certification 412-79 exam to measure the reliability of our IT-Tests.


Exam Code: 412-79

Exam Name: EC-COUNCIL (EC-Council Certified Security Analyst (ECSA))

Add IT-Tests's products to cart now! You will have 100% confidence to participate in the exam and disposably pass EC-COUNCIL certification 412-79 exam. At last, you will not regret your choice.


412-79 (EC-Council Certified Security Analyst (ECSA)) Free Demo Download: http://www.it-tests.com/412-79.html


NO.1 .An "idle" system is also referred to as what?
A. Zombie
B. PC not being used
C. Bot
D. PC not connected to the Internet
Answer: A

EC-COUNCIL exam prep   412-79 exam dumps   412-79   412-79   412-79 questions   412-79 exam dumps

NO.2 .At what layer of the OSI model do routers function on?
A. 3
B. 4
C. 5
D. 1
Answer: A

EC-COUNCIL   412-79   412-79 certification   412-79   412-79

NO.3 .What operating system would respond to the following command?
A. Mac OS X
B. Windows XP
C. Windows 95
D. FreeBSD
Answer: D

EC-COUNCIL   412-79 original questions   412-79   412-79

NO.4 .You are assisting a Department of Defense contract company to become compliant with the stringent
security policies set by the DoD. One such strict rule is that firewalls must only allow incoming
connections that were first initiated by internal computers. What type of firewall must you implement to
abide by this policy?
A. Circuit-level proxy firewall
B. Packet filtering firewall
C. Application-level proxy firewall
D. Statefull firewall
Answer: D

EC-COUNCIL   412-79   412-79 test answers   412-79   412-79 certification

NO.5 .Your company uses Cisco routers exclusively throughout the network. After securing the routers to
the best of your knowledge, an outside security firm is brought in to assess the network security. Although
they found very few issues, they were able to enumerate the model, OS version, and capabilities for all
your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate
this information on your Cisco routers?
A. Simple Network Management Protocol
B. Broadcast System Protocol
C. Cisco Discovery Protocol
D. Border Gateway Protocol
Answer: C

EC-COUNCIL   412-79 demo   412-79

NO.6 .Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers are constantly talking
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers will not respond to idle scans
Answer: A

EC-COUNCIL   412-79 exam prep   412-79   412-79 exam simulations

NO.7 .Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to
hack into his former company's network. Since Simon remembers some of the server names, he attempts
to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?
A. Enumerate all the users in the domain
B. Perform DNS poisoning
C. Send DOS commands to crash the DNS servers
D. Perform a zone transfer
Answer: D

EC-COUNCIL exam prep   412-79 original questions   412-79 certification   412-79 certification

NO.8 .Your company's network just finished going through a SAS 70 audit. This audit reported that overall,
your network is secure, but there are some areas that needs improvement. The major area was SNMP
security. The audit company recommended turning off SNMP, but that is not an option since you have so
many remote nodes to keep track of. What step could you take to help secure SNMP on your network?
A. Change the default community string names
B. Block all internal MAC address from using SNMP
C. Block access to UDP port 171
D. Block access to TCP port 171
Answer: A

EC-COUNCIL pdf   412-79 original questions   412-79

NO.9 .Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers will not respond to idle scans
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers are constantly talking
Answer: D

EC-COUNCIL test   412-79 pdf   412-79 exam dumps   412-79

NO.10 .What is the following command trying to accomplish?
A. Verify that NETBIOS is running for the 192.168.0.0 network
B. Verify that TCP port 445 is open for the 192.168.0.0 network
C. Verify that UDP port 445 is open for the 192.168.0.0 network
D. Verify that UDP port 445 is closed for the 192.168.0.0 network
Answer: C

EC-COUNCIL   412-79 demo   412-79 certification training   412-79   412-79   412-79 certification

NO.11 .You are the security analyst working for a private company out of France. Your current assignment is
to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance,
you discover that the bank security defenses are very strong and would take too long to penetrate. You
decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in
London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You
want to sniff the traffic and extract usernames and passwords. What tool could you use to get this
information?
A. RaidSniff
B. Snort
C. Ettercap
D. Airsnort
Answer: C

EC-COUNCIL   412-79   412-79 exam dumps

NO.12 .After attending a CEH security seminar, you make a list of changes you would like to perform on your
network to increase its security. One of the first things you change is to switch the RestrictAnonymous
setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from
establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in
establishing a null session with one of the servers. Why is that?
A. RestrictAnonymous must be set to "2" for complete security
B. RestrictAnonymous must be set to "3" for complete security
C. There is no way to always prevent an anonymous null session from establishing
D. RestrictAnonymous must be set to "10" for complete security
Answer: A

EC-COUNCIL demo   412-79 practice test   412-79 study guide   412-79   412-79 certification

NO.13 .What are the security risks of running a "repair" installation for Windows XP?
A. There are no security risks when running the "repair" installation for Windows XP
B. Pressing Shift+F1gives the user administrative rights
C. Pressing Ctrl+F10 gives the user administrative rights
D. Pressing Shift+F10 gives the user administrative rights
Answer: D

EC-COUNCIL questions   412-79 original questions   412-79

NO.14 George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities
of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a
scanner like Nessus is not recommended in this situation?
A. Nessus is too loud
B. There are no ways of performing a "stealthy" wireless scan
C. Nessus cannot perform wireless testing
D. Nessus is not a network scanner
Answer: A

EC-COUNCIL   412-79 certification   412-79 pdf   412-79 test

NO.15 .George is the network administrator of a large Internet company on the west coast. Per corporate
policy, none of the employees in the company are allowed to use FTP or SFTP programs without
obtaining approval from the IT department. Few managers are using SFTP program on their computers.
Before talking to his boss, George wants to have some proof of their activity.
George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?
A. net port 22
B. udp port 22 and host 172.16.28.1/24
C. src port 22 anddst port 22
D. src port 23 anddst port 23
Answer: C

EC-COUNCIL   412-79   412-79 exam prep   412-79

NO.16 .What will the following command accomplish?
A. Test ability of a router to handle over-sized packets
B. Test the ability of a router to handle fragmented packets
C. Test the ability of a WLAN to handle fragmented packets
D. Test the ability of a router to handle under-sized packets
Answer: A

EC-COUNCIL   412-79   412-79

NO.17 .You are carrying out the last round of testing for your new website before it goes live. The website has
many dynamic pages and connects to a SQL backend that accesses your product inventory in a database.
You come across a web security site that recommends inputting the following code into a search field on
web pages to check for vulnerabilities:
This is a test
When you type this and click on search, you receive a pop-up window that says:
"This is a test."
What is the result of this test?
A. Your website is vulnerable to web bugs
B. Your website is vulnerable to CSS
C. Your website is not vulnerable
D. Your website is vulnerable to SQL injection
Answer: B

EC-COUNCIL   412-79   412-79   412-79   412-79 exam prep

NO.18 .In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers
to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down
the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to
the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts
itself down. What will the other routers communicate between themselves?
A. More RESET packets to the affected router to get it to power back up
B. RESTART packets to the affected router to get it to power back up
C. The change in the routing fabric to bypass the affected router
D. STOP packets to all other routers warning of where the attack originated
Answer: C

EC-COUNCIL   412-79   412-79   412-79

NO.19 .You are running known exploits against your network to test for possible vulnerabilities. To test the
strength of your virus software, you load a test network to mimic your production network. Your software
successfully blocks some simple macro and encrypted viruses. You decide to really test the software by
using virus code where the code rewrites itself entirely and the signatures change
6 from child to child, but the functionality stays the same. What type of virus is this that you are testing?
A. Metamorphic
B. Oligomorhic
C. Polymorphic
D. Transmorphic
Answer: A

EC-COUNCIL   412-79   412-79

NO.20 .How many bits is Source Port Number in TCP Header packet?
A. 48
B. 32
C. 64
D. 16
Answer: D

EC-COUNCIL   412-79 demo   412-79 study guide

412-79 certification exam is a very import component EC-COUNCIL certification exam. But passing EC-COUNCIL certification 412-79 exam is not so simple. In order to give to relieve pressure and save time and effort for candidates who take a preparation for the 412-79 certification exam, IT-Tests.com specially produce a variety of training tools. So you can choose an appropriate quick training from IT-Tests.com to pass the exam.