[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 412-79v8 Dumps with VCE and PDF 1-10
Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 412-79v8
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/412-79v8.html
EC-Council Certified Security Analyst (ECSA)
Question No: 1
A man enters a PIN number at an ATM machine, being unaware that the person next to him was watching. Which of the following social engineering techniques refers to this type of information theft?
-
Shoulder surfing
-
Phishing
-
Insider Accomplice
-
Vishing
Answer: A
Question No: 2
Which of the following approaches to vulnerability assessment relies on the administrator providing baseline of system configuration and then scanning continuously without incorporating any information found at the time of scanning?
-
Service-based Assessment Solutions
-
Product-based Assessment Solutions
-
Tree-based Assessment
-
Inference-based Assessment
Answer: C
Reference:http://www.netsense.info/downloads/security_wp_mva.pdf(page 12, tree-based assessment technology, second para)
Question No: 3
Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gatewaydoes not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs) are identified by a type and code field.
Which of the following ICMP messages will be generated if the destination port is not reachable?
-
ICMP Type 11 code 1
-
ICMP Type 5 code 3
-
ICMP Type 3 code 2
-
ICMP Type 3 code 3
Answer: D
Question No: 4
Which of the following attacks is an offline attack?
-
Pre-Computed Hashes
-
Hash Injection Attack
-
Password Guessing
-
Dumpster Diving
Answer: A
Reference:http://nrupentheking.blogspot.com/2011/02/types-of-password-attack-2.html
Question No: 5
Attackers create secret accounts and gain illegal access to resources using backdoor while bypassing the authentication procedures. Creating a backdoor is a where an attacker obtains remote access to a computer on a network.
Which of the following techniques do attackers use to create backdoors to covertly gather
critical information about a target machine?
-
Internal network mapping to map the internal network of the target machine
-
Port scanning to determine what ports are open or in use on the target machine
-
Sniffing to monitor all the incoming and outgoing network traffic
-
Social engineering and spear phishing attacks to install malicious programs on the target machine
Answer: D
Question No: 6
What is the maximum value of a “tinyint” field in most database systems?
A. 222
-
224 or more
-
240 or less
-
225 or more
Answer: D
Reference:http://books.google.com.pk/books?id=JUcIAAAAQBAJamp;pg=SA3-PA3amp;lpg=SA3- PA3amp;dq=maximum value of a “tinyint” field in most databa se systemsamp;source=blamp;ots=NscGk- R5ramp;sig=1hMOYByxt7ebRJ4UEjbpxMijTQsamp;hl=enamp;sa=Xamp;ei=pvgeVJnTCNDkaI_fgugOamp;v ed=0CDYQ6AEwAw#v=onepageamp;q=maximum value of a “tin yint” field in most database systemsamp;f=false
Question No: 7
Network scanning is used to identify the available network resources. Which one of the following is also known as a half-open scan, because a full TCP connection is never completed and it is used to determine which ports are open and listening on a target device?
-
SYN Scan
-
TCP Connect Scan
-
XMAS Scan
-
Null Scan
Answer: A
Question No: 8
TCP/IP provides a broad range of communication protocols for the various applications on the network. The TCP/IP model has four layers with major protocols included within each layer. Which one of the following protocols is used to collect information from all the network devices?
-
Simple Network Management Protocol (SNMP)
-
Network File system (NFS)
-
Internet Control Message Protocol (ICMP)
-
Transmission Control Protocol(TCP)
Answer: A
Question No: 9
The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU.
The value of the MTU depends on the type of the transmission link. The design of IP accommodates MTU differences by allowing routers to fragment IP datagrams as necessary. The receiving station is responsible for reassembling the fragments back into the original full size IP datagram.
IP fragmentation involves breaking a datagram into a number of pieces that can be reassembled later. The IP source, destination,identification, total length, and fragment offset fields in the IP header, are used for IP fragmentation and reassembly.
The fragment offset is 13 bits and indicates where a fragment belongs in the original IP datagram. This value is a:
-
Multipleof four bytes
-
Multiple of two bytes
-
Multiple of eight bytes
-
Multiple of six bytes
Answer: C
Reference:http://www.freesoft.org/CIE/Course/Section3/7.htm(fragment offset: 13 bits)
Question No: 10
Many security and compliance projects begin with a simple idea: assess the organization#39;s risk, vulnerabilities, and breaches. Implementing an IT security risk assessment is critical to the overall security posture of any organization.
An effective security risk assessment can prevent breaches and reduce the impact of realized breaches.
What is the formula to calculate risk?
-
Risk = Budget x Time
-
Risk = Goodwill x Reputation
-
Risk = Loss x Exposure factor
-
Risk = Threats x Attacks
Answer: C
100% Ensurepass Free Download!
–Download Free Demo:412-79v8 Demo PDF
100% Ensurepass Free Guaranteed!
–412-79v8 Dumps
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF