[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 412-79 Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 412-79
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Analyst (ECSA)

Question No: 41 – (Topic 1)

John and Hillary works at the same department in the company. John wants to find out Hillary#39;s network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found. What information will he be able to gather from this?

  1. The SID of Hillary#39;s network account

  2. The network shares that Hillary has permissions

  3. The SAM file from Hillary#39;s computer

  4. Hillary#39;s network username and password hash

Answer: D

Question No: 42 – (Topic 1)

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri#39;s duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company#39;s switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?

  1. Poison the switch#39;s MAC address table by flooding it with ACK bits

  2. Enable tunneling feature on the switch

  3. Trick the switch into thinking it already has a session with Terri#39;s computer

  4. Crash the switch with a DoS attack since switches cannot send ACK bits

Answer: C

Question No: 43 – (Topic 1)

Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler issue with his home wireless network?

  1. 2.4 Ghz Cordless phones

  2. Satellite television

  3. CB radio

  4. Computers on his wired network

Answer: A

Question No: 44 – (Topic 1)

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe.

What are you trying to accomplish here?

  1. Enumerate domain user accounts and built-in groups

  2. Establish a remote connection to the Domain Controller

  3. Poison the DNS records with false records

  4. Enumerate MX and A records from DNS

Answer: A

Question No: 45 – (Topic 1)

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company#39;s network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?

  1. Perform a zone transfer

  2. Perform DNS poisoning

  3. Send DOS commands to crash the DNS servers

  4. Enumerate all the users in the domain

Answer: A

Question No: 46 – (Topic 1)

Why is it a good idea to perform a penetration test from the inside?

  1. It is easier to hack from the inside

  2. It is never a good idea to perform a penetration test from the inside

  3. To attack a network from a hacker#39;s perspective

  4. Because 70% of attacks are from inside the organization

Answer: D

Question No: 47 – (Topic 1)

Click on the Exhibit Button

Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette#39;s duties include logging on to all the company#39;s network equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as possible. Paulette presents the following screenshot to her boss so he can inform the client about necessary changes need to be made. From the screenshot, what changes should the client company make?


Ensurepass 2018 PDF and VCE

  1. The banner should not state quot;only authorized IT personnel may proceedquot;

  2. Remove any identifying numbers, names, or version information

  3. The banner should include the Cisco tech support contact information as well

  4. The banner should have more detail on the version numbers for the network equipment

Answer: B

Question No: 48 – (Topic 1)

An quot;idlequot; system is also referred to as what?

  1. PC not being used

  2. PC not connected to the Internet

  3. Bot

  4. Zombie

Answer: D

Question No: 49 – (Topic 1)

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

  1. False negatives

  2. True positives

  3. True negatives

  4. False positives

Answer: A

Question No: 50 – (Topic 1)

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.org and view the HTML code of news.com. You

then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal:

lt;img src=http://coolwebsearch.com/ads/pixel.news.com width=1 height=1 border=0gt; What have you found?

  1. Trojan.downloader

  2. Blind bug

  3. Web bug

  4. CGI code

Answer: C

Topic 2, Volume B

100% Ensurepass Free Download!
Download Free Demo:412-79 Demo PDF
100% Ensurepass Free Guaranteed!
412-79 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.