[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 412-79v8 Dumps with VCE and PDF 51-60

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 412-79v8
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Analyst (ECSA)

Question No: 51

The framework primarily designed to fulfill a methodical and organized way of addressing five threat classes to network and that can be used to access, plan, manage, and maintain secure computers and communication networksis:

  1. Nortells Unified Security Framework

  2. The IBM Security Framework

  3. Bell Labs Network Security Framework

  4. Microsoft Internet Security Framework

Answer: C

Question No: 52

Identify the data security measure which defines a principle or state that ensures that an action or transaction cannot be denied.

  1. Availability

  2. Integrity

  3. Authorization

  4. Non-Repudiation

Answer: D


Question No: 53

Before performing the penetration testing, there will be a pre-contract discussion with different pen-testers (the team of penetration testers) to gather a quotation to perform pen testing.

Ensurepass 2018 PDF and VCE

Which of the following factors is NOT considered while preparing a price quote to perform pen testing?

  1. Total number of employees in the client organization

  2. Type of testers involved

  3. The budget required

  4. Expected time required to finish the project

Answer: A

Question No: 54

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

  1. Connect Scanning Techniques

  2. SYN Scanning Techniques

  3. Stealth Scanning Techniques

  4. Port Scanning Techniques

Answer: C

Reference:http://wwww.pc- freak.net/tutorials/hacking_info/arkin network scanning techniques.pdf(page 7

Question No: 55

Firewall is an IP packet filter that enforces the filtering and security policiesto the flowing network traffic. Using firewalls in IPv6 is still the best way of protection from low level attacks at the network and transport layers. Which one of the following cannot handle routing protocols properly?

  1. “Internet-router-firewall-netarchitecture”

  2. “Internet-firewall-router-net architecture”

  3. “Internet-firewall/router(edge device)-net architecture”

  4. “Internet-firewall -net architecture”

Answer: B

Question No: 56

Which one of the following commands is used to search one of more files for a specific pattern and it helps in organizing the firewall log files?

  1. grpck

  2. grep

  3. gpgv

  4. gprn

Answer: B

Question No: 57

The term social engineering is used to describe the various tricks used to fool people (employees, business partners, or customers) into voluntarily giving away information that would not normally be known to the general public.

Ensurepass 2018 PDF and VCE

What is the criminal practice of social engineering where an attacker uses the telephone system in an attempt to scam the user into surrendering private information?

  1. Phishing

  2. Spoofing

  3. Tapping

  4. Vishing

Answer: D

Question No: 58

Which of the following acts related to information security in the US establish that the management of an organization is responsible for establishing and maintaining an adequate internal control structure and procedures for financial reporting?

  1. USA Patriot Act 2001

  2. Sarbanes-Oxley 2002

  3. Gramm-Leach-Bliley Act (GLBA)

  4. California SB 1386

Answer: A

Reference:http://www.sec.gov/rules/final/33-8238.htm(see background)

Question No: 59

An attacker injects malicious query strings in user input fields to bypass web service authentication mechanisms and to access back-end databases.Which of the following attacks is this?

  1. Frame Injection Attack

  2. LDAP Injection Attack

  3. XPath Injection Attack

  4. SOAP Injection Attack

Answer: D

Explanation: http://luizfirmino.blogspot.com/2011_09_01_archive.html

Question No: 60

John, the penetration tester in a pen test firm, was asked to find whether NTP services are opened on the target network ( using Nmap tool.

Ensurepass 2018 PDF and VCE

Which one of the following Nmap commands will he use to findit?

A. nmap -sU -p 389

B. nmap -sU -p 123

C. nmap -sU -p 161

D. nmap -sU -p 135

Answer: B

100% Ensurepass Free Download!
Download Free Demo:412-79v8 Demo PDF
100% Ensurepass Free Guaranteed!
412-79v8 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.