[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 412-79v8 Dumps with VCE and PDF 1-10

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 412-79v8
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Analyst (ECSA)

Question No: 1

A man enters a PIN number at an ATM machine, being unaware that the person next to him was watching. Which of the following social engineering techniques refers to this type of information theft?

  1. Shoulder surfing

  2. Phishing

  3. Insider Accomplice

  4. Vishing

Answer: A

Question No: 2

Which of the following approaches to vulnerability assessment relies on the administrator providing baseline of system configuration and then scanning continuously without incorporating any information found at the time of scanning?

Ensurepass 2018 PDF and VCE

  1. Service-based Assessment Solutions

  2. Product-based Assessment Solutions

  3. Tree-based Assessment

  4. Inference-based Assessment

Answer: C

Reference:http://www.netsense.info/downloads/security_wp_mva.pdf(page 12, tree-based assessment technology, second para)

Question No: 3

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gatewaydoes not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs) are identified by a type and code field.

Ensurepass 2018 PDF and VCE

Which of the following ICMP messages will be generated if the destination port is not reachable?

  1. ICMP Type 11 code 1

  2. ICMP Type 5 code 3

  3. ICMP Type 3 code 2

  4. ICMP Type 3 code 3

Answer: D

Question No: 4

Which of the following attacks is an offline attack?

  1. Pre-Computed Hashes

  2. Hash Injection Attack

  3. Password Guessing

  4. Dumpster Diving

Answer: A


Question No: 5

Attackers create secret accounts and gain illegal access to resources using backdoor while bypassing the authentication procedures. Creating a backdoor is a where an attacker obtains remote access to a computer on a network.

Ensurepass 2018 PDF and VCE

Which of the following techniques do attackers use to create backdoors to covertly gather

critical information about a target machine?

  1. Internal network mapping to map the internal network of the target machine

  2. Port scanning to determine what ports are open or in use on the target machine

  3. Sniffing to monitor all the incoming and outgoing network traffic

  4. Social engineering and spear phishing attacks to install malicious programs on the target machine

Answer: D

Question No: 6

What is the maximum value of a “tinyint” field in most database systems?

A. 222

  1. 224 or more

  2. 240 or less

  3. 225 or more

Answer: D

Reference:http://books.google.com.pk/books?id=JUcIAAAAQBAJamp;pg=SA3-PA3amp;lpg=SA3- PA3amp;dq=maximum value of a “tinyint” field in most databa se systemsamp;source=blamp;ots=NscGk- R5ramp;sig=1hMOYByxt7ebRJ4UEjbpxMijTQsamp;hl=enamp;sa=Xamp;ei=pvgeVJnTCNDkaI_fgugOamp;v ed=0CDYQ6AEwAw#v=onepageamp;q=maximum value of a “tin yint” field in most database systemsamp;f=false

Question No: 7

Network scanning is used to identify the available network resources. Which one of the following is also known as a half-open scan, because a full TCP connection is never completed and it is used to determine which ports are open and listening on a target device?

  1. SYN Scan

  2. TCP Connect Scan

  3. XMAS Scan

  4. Null Scan

Answer: A

Question No: 8

TCP/IP provides a broad range of communication protocols for the various applications on the network. The TCP/IP model has four layers with major protocols included within each layer. Which one of the following protocols is used to collect information from all the network devices?

  1. Simple Network Management Protocol (SNMP)

  2. Network File system (NFS)

  3. Internet Control Message Protocol (ICMP)

  4. Transmission Control Protocol(TCP)

Answer: A

Question No: 9

The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU.

The value of the MTU depends on the type of the transmission link. The design of IP accommodates MTU differences by allowing routers to fragment IP datagrams as necessary. The receiving station is responsible for reassembling the fragments back into the original full size IP datagram.

IP fragmentation involves breaking a datagram into a number of pieces that can be reassembled later. The IP source, destination,identification, total length, and fragment offset fields in the IP header, are used for IP fragmentation and reassembly.

Ensurepass 2018 PDF and VCE

The fragment offset is 13 bits and indicates where a fragment belongs in the original IP datagram. This value is a:

  1. Multipleof four bytes

  2. Multiple of two bytes

  3. Multiple of eight bytes

  4. Multiple of six bytes

Answer: C

Reference:http://www.freesoft.org/CIE/Course/Section3/7.htm(fragment offset: 13 bits)

Question No: 10

Many security and compliance projects begin with a simple idea: assess the organization#39;s risk, vulnerabilities, and breaches. Implementing an IT security risk assessment is critical to the overall security posture of any organization.

An effective security risk assessment can prevent breaches and reduce the impact of realized breaches.

Ensurepass 2018 PDF and VCE

What is the formula to calculate risk?

  1. Risk = Budget x Time

  2. Risk = Goodwill x Reputation

  3. Risk = Loss x Exposure factor

  4. Risk = Threats x Attacks

Answer: C

100% Ensurepass Free Download!
Download Free Demo:412-79v8 Demo PDF
100% Ensurepass Free Guaranteed!
412-79v8 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.