Certbus > EC-COUNCIL > ECCouncil Certification > 412-79V8 > 412-79V8 Online Practice Questions and Answers

412-79V8 Online Practice Questions and Answers

Questions 4

Which of the following is an application alert returned by a web application that helps an attacker guess a valid username?

A. Invalid username or password

B. Account username was not found

C. Incorrect password

D. Username or password incorrect

Browse 200 Q&As
Questions 5

What is the maximum value of a "tinyint" field in most database systems?

A. 222

B. 224 or more

C. 240 or less

D. 225 or more

Browse 200 Q&As
Questions 6

A man enters a PIN number at an ATM machine, being unaware that the person next to him was watching. Which of the following social engineering techniques refers to this type of information theft?

A. Shoulder surfing

B. Phishing

C. Insider Accomplice

D. Vishing

Browse 200 Q&As
Questions 7

Which of the following is developed to address security concerns on time and reduce the misuse or threat of attacks in an organization?

A. Vulnerabilities checklists

B. Configuration checklists

C. Action Plan

D. Testing Plan

Browse 200 Q&As
Questions 8

Packet filtering firewalls are usually a part of a router. In a packet filtering firewall, each packet is compared to a set of criteria before it is forwarded. Depending on the packet and the criteria, the firewall can: i)Drop the packet ii)Forward it or send a message to the originator At which level of the OSI model do the packet filtering firewalls work?

A. Application layer

B. Physical layer

C. Transport layer

D. Network layer

Browse 200 Q&As
Questions 9

By default, the TFTP server listens on UDP port 69. Which of the following utility reports the port status of target TCP and UDP ports on a local or a remote computer and is used to troubleshoot TCP/IP connectivity issues?

A. PortQry

B. Netstat

C. Telnet

D. Tracert

Browse 200 Q&As
Questions 10

To locate the firewall, SYN packet is crafted using Hping or any other packet crafter and sent to the firewall. If ICMP unreachable type 13 message (which is an admin prohibited packet) with a source IP address of the access control device is received, then it means which of the following type of firewall is in place?

A. Circuit level gateway

B. Stateful multilayer inspection firewall

C. Packet filter

D. Application level gateway

Browse 200 Q&As
Questions 11

Port numbers are used to keep track of different conversations crossing the network at the same time. Both TCP and UDP use port (socket) numbers to pass information to the upper layers. Port numbers have the assigned ranges.

Port numbers above 1024 are considered which one of the following?

A. Dynamically assigned port numbers

B. Statically assigned port numbers

C. Well-known port numbers

D. Unregistered port numbers

Browse 200 Q&As
Questions 12

John, the penetration tester in a pen test firm, was asked to find whether NTP services are opened on the target network (10.0.0.7) using Nmap tool.

Which one of the following Nmap commands will he use to find it?

A. nmap -sU p 389 10.0.0.7

B. nmap -sU p 123 10.0.0.7

C. nmap -sU p 161 10.0.0.7

D. nmap -sU p 135 10.0.0.7

Browse 200 Q&As
Questions 13

Which of the following shields Internet users from artificial DNS data, such as a deceptive or mischievous address instead of the genuine address that was requested?

A. DNSSEC

B. Firewall

C. Packet filtering

D. IPSec

Browse 200 Q&As
Questions 14

Besides the policy implications of chat rooms, Internet Relay Chat (IRC) is frequented by attackers and used as a command and control mechanism. IRC normally uses which one of the following TCP ports?

A. 6566 TCP port

B. 6771 TCP port

C. 6667 TCP port

D. 6257 TCP port

Browse 200 Q&As
Questions 15

Which one of the following Snort logger mode commands is associated to run a binary log file through Snort in sniffer mode to dump the packets to the screen?

A. ./snort -dvr packet.log icmp

B. ./snort -dev -l ./log

C. ./snort -dv -r packet.log

D. ./snort -l ./log b

Browse 200 Q&As
Questions 16

The SnortMain () function begins by associating a set of handlers for the signals, Snort receives. It does this using the signal () function. Which one of the following functions is used as a programspecific signal and the handler for this calls the DropStats() function to output the current Snort statistics?

A. SIGUSR1

B. SIGTERM

C. SIGINT

D. SIGHUP

Browse 200 Q&As
Questions 17

Which one of the following tools of trade is a commercial shellcode and payload generator written in Python by Dave Aitel?

A. Microsoft Baseline Security Analyzer (MBSA)

B. CORE Impact

C. Canvas

D. Network Security Analysis Tool (NSAT)

Browse 200 Q&As
Questions 18

Which one of the following tools of trade is an automated, comprehensive penetration testing product for assessing the specific information security threats to an organization?

A. Sunbelt Network Security Inspector (SNSI)

B. CORE Impact

C. Canvas

D. Microsoft Baseline Security Analyzer (MBSA)

Browse 200 Q&As
Exam Code: 412-79V8
Exam Name: EC-Council Certified Security Analyst (ECSA)
Last Update: Apr 26, 2024
Questions: 200 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99