[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 412-79 Dumps with VCE and PDF 11-20

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 412-79
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Analyst (ECSA)

Question No: 11 – (Topic 1)

What will the following command accomplish?

Ensurepass 2018 PDF and VCE

  1. Test ability of a router to handle over-sized packets

  2. Test the ability of a router to handle fragmented packets

  3. Test the ability of a WLAN to handle fragmented packets

  4. Test the ability of a router to handle under-sized packets

Answer: A

Question No: 12 – (Topic 1)

What are the security risks of running a quot;repairquot; installation for Windows XP?

  1. There are no security risks when running the quot;repairquot; installation for Windows XP

  2. Pressing Shift F1 gives the user administrative rights

  3. Pressing Ctrl F10 gives the user administrative rights

  4. Pressing Shift F10 gives the user administrative rights

Answer: D

Question No: 13 – (Topic 1)

You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?

  1. RaidSniff

  2. Snort

  3. Ettercap

  4. Airsnort

Answer: C

Question No: 14 – (Topic 1)

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity.

George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network. What filter should George use in Ethereal?

  1. net port 22

  2. udp port 22 and host

  3. src port 22 and dst port 22

  4. src port 23 and dst port 23

Answer: C

Question No: 15 – (Topic 1)

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?

  1. Circuit-level proxy firewall

  2. Packet filtering firewall

  3. Application-level proxy firewall

  4. Statefull firewall

Answer: D

Question No: 16 – (Topic 1)

You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

  1. Metamorphic

  2. Oligomorhic

  3. Polymorphic

  4. Transmorphic

Answer: A

Question No: 17 – (Topic 1)

In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on quot;bringing down the Internetquot;. Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

  1. More RESET packets to the affected router to get it to power back up

  2. RESTART packets to the affected router to get it to power back up

  3. The change in the routing fabric to bypass the affected router

  4. STOP packets to all other routers warning of where the attack originated

Answer: C

Question No: 18 – (Topic 1)

What is the following command trying to accomplish?

Ensurepass 2018 PDF and VCE

  1. Verify that NETBIOS is running for the network

  2. Verify that TCP port 445 is open for the network

  3. Verify that UDP port 445 is open for the network

  4. Verify that UDP port 445 is closed for the network

Answer: C

Question No: 19 – (Topic 1)

Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?

  1. Simple Network Management Protocol

  2. Broadcast System Protocol

  3. Cisco Discovery Protocol

  4. Border Gateway Protocol

Answer: C

Question No: 20 – (Topic 1)

George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as quot;stealthyquot; as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

  1. Nessus is too loud

  2. There are no ways of performing a quot;stealthyquot; wireless scan

  3. Nessus cannot perform wireless testing

  4. Nessus is not a network scanner

Answer: A

100% Ensurepass Free Download!
Download Free Demo:412-79 Demo PDF
100% Ensurepass Free Guaranteed!
412-79 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No