[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 412-79v8 Dumps with VCE and PDF 61-70

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 412-79v8
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Analyst (ECSA)

Question No: 61

Which one of the following acts related to the information security in the US fix the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting?

  1. California SB 1386

  2. Sarbanes-Oxley 2002

  3. Gramm-Leach-Bliley Act (GLBA)

  4. USA Patriot Act 2001

Answer: B

Question No: 62

TCP/IP model isa framework for the Internet Protocol suite of computer network protocols that defines the communication in an IP-based network. It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.

Ensurepass 2018 PDF and VCE

Which of the following TCP/IP layers selects the best path through the network for packets to travel?

  1. Transport layer

  2. Network Access layer

  3. Internet layer

  4. Application layer

Answer: C

Question No: 63

A firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. It examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped.

Ensurepass 2018 PDF and VCE

Why is an appliance-based firewall is more secure than those implemented on top of the commercial operating system (Software based)?

  1. Appliance based firewalls cannot be upgraded

  2. Firewalls implemented on a hardware firewall are highly scalable

  3. Hardware appliances does not suffer from security vulnerabilities associated with the underlying operating system

  4. Operating system firewalls are highly configured

Answer: C

Question No: 64

In the process of hacking a web application, attackers manipulate the HTTP requests to subvert the application authorization schemes by modifying input fields that relate to the user ID, username, access group, cost, file names, file identifiers,etc. They first access the web application using a low privileged account and then escalate privileges to access protected resources. What attack has been carried out?

  1. XPath Injection Attack

  2. Authorization Attack

  3. Authentication Attack

  4. Frame Injection Attack

Answer: B

Reference:http://luizfirmino.blogspot.com/2011_09_01_archive.html(see authorization


Question No: 65

DMZ is a network designed to give the public access to the specific internal resources and you might want to do the same thing for guests visiting organizations without compromising the integrity of the internal resources. In general, attacks on the wireless networks fall into four basic categories. Identify the attacks that fall under Passive attacks category.(Select all that apply)

  1. Wardriving

  2. Spoofing

  3. Sniffing

  4. Network Hijacking

Answer: A

Question No: 66

Identify the policy that defines the standards for the organizational network connectivity and security standards for computers that are connected in the organizational network.

  1. Information-Protection Policy

  2. Special-AccessPolicy

  3. Remote-Access Policy

  4. Acceptable-Use Policy

Answer: C

Question No: 67

Packet filtering firewalls are usually a part of a router. In a packet filtering firewall, each packet is compared to a set of criteria before it is forwarded.

Depending on the packet and the criteria, the firewall can:

  1. Drop the packet

  2. Forward it or send a message to the originator

Ensurepass 2018 PDF and VCE

At which level of the OSI model do the packet filtering firewalls work?

  1. Application layer

  2. Physical layer

  3. Transport layer

  4. Network layer

Answer: D Reference:http://books.google.com.pk/books?id=KPjLAyA7HgoCamp;pg=PA208amp;lpg=PA208amp; dq=At which level of the OSI model do the packet filtering firewalls workamp;source=bl

amp;ots=zRrbcmY3pjamp;sig=I3vuS3VA7r- 3VF8lC6xq_c_r31Mamp;hl=enamp;sa=Xamp;ei=wMcfVMetI8HPaNSRgPgDamp;ved=0CC8Q6AEwAg#v

=onepageamp;q=At which level of the OSI model do the pa cket filtering firewalls workamp;f=false(packet filters)

Question No: 68

Windows stores user passwords in the Security Accounts Manager database (SAM), or in the Active Directory database in domains. Passwords are never stored in clear text; passwords are hashed and the results are stored in the SAM.

NTLM and LM authentication protocols are used to securely store a user#39;s password in the SAM database using different hashing methods.

Ensurepass 2018 PDF and VCE

The SAM file in Windows Server 2008 is located in which of the following locations?

  1. c:\windows\system32\config\SAM

  2. c:\windows\system32\drivers\SAM

  3. c:\windows\system32\Setup\SAM

  4. c:\windows\system32\Boot\SAM

Answer: A

Question No: 69

During the process of fingerprinting a web application environment, what do you need to do in order to analyze HTTP and HTTPS request headers and the HTML source code?

  1. Examine Source of the Available Pages

  2. Perform Web Spidering

  3. Perform Banner Grabbing

  4. Check the HTTP and HTML Processing by the Browser

Answer: D

Question No: 70

John, a penetration tester, was asked for a document that defines the project, specifies goals, objectives, deadlines, the resources required, and the approach of the project.

Which of the following includes all of these requirements?

  1. Penetration testing project plan

  2. Penetration testing software project management plan

  3. Penetration testing project scope report

  4. Penetration testing schedule plan

Answer: A Explanation: Rfere

http://books.google.com.pk/books?id=7dwEAAAAQBAJamp;pg=SA4-PA14amp;lpg=SA4- PA14amp;dq=penetration testing document that defines the project, specifies goals, obje ctives, deadlines, the resources required, and the approach of the projectamp;source=b lamp;ots=SQCLHNtthNamp;sig=kRcccmtDtCdZgB7hASShxSRbfOMamp;hl=enamp;sa=Xamp;ei=hyMfVOKz GYvmarvFgaALamp;ved=0CB0Q6AEwAA#v=onepageamp;q=penetration testing docume nt that defines the project, specifies goals, objectives% 2C deadlines, the resources required, and the approac h of the projectamp;f=false

100% Ensurepass Free Download!
Download Free Demo:412-79v8 Demo PDF
100% Ensurepass Free Guaranteed!
412-79v8 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.