Exam Details

  • Exam Code
    :412-79V10
  • Exam Name
    :EC-Council Certified Security Analyst (ECSA) V10
  • Certification
    :ECSA
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :201 Q&As
  • Last Updated
    :Apr 29, 2024

EC-COUNCIL ECSA 412-79V10 Questions & Answers

  • Question 41:

    Which one of the following tools of trade is a commercial shellcode and payload generator written in Python by Dave Aitel?

    A. Microsoft Baseline Security Analyzer (MBSA)

    B. CORE Impact

    C. Canvas

    D. Network Security Analysis Tool (NSAT)

  • Question 42:

    Rule of Engagement (ROE) is the formal permission to conduct a pen-test. It provides top- level guidance for conducting the penetration testing.

    Various factors are considered while preparing the scope of ROE which clearly explain the limits associated with the security test.

    Which of the following factors is NOT considered while preparing the scope of the Rules of Engagment (ROE)?

    A. A list of employees in the client organization

    B. A list of acceptable testing techniques

    C. Specific IP addresses/ranges to be tested

    D. Points of contact for the penetration testing team

  • Question 43:

    Which of the following is not the SQL injection attack character?

    A. $

    B. PRINT

    C. #

    D. @@variable

  • Question 44:

    In the example of a /etc/passwd file below, what does the bold letter string indicate?

    nomad:HrLNrZ3VS3TF2:501:100: Simple Nomad:/home/nomad:/bin/bash

    A. Maximum number of days the password is valid

    B. Group number

    C. GECOS information

    D. User number

  • Question 45:

    The framework primarily designed to fulfill a methodical and organized way of addressing five threat classes to network and that can be used to access, plan, manage, and maintain secure computers and communication networks is:

    A. Nortells Unified Security Framework

    B. The IBM Security Framework

    C. Bell Labs Network Security Framework

    D. Microsoft Internet Security Framework

  • Question 46:

    Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs) are identified by a type and code field.

    Which of the following ICMP messages will be generated if the destination port is not reachable?

    A. ICMP Type 11 code 1

    B. ICMP Type 5 code 3

    C. ICMP Type 3 code 2

    D. ICMP Type 3 code 3

  • Question 47:

    Why is a legal agreement important to have before launching a penetration test?

    A. Guarantees your consultant fees

    B. Allows you to perform a penetration test without the knowledge and consent of the organization's upper management

    C. It establishes the legality of the penetration test by documenting the scope of the project and the consent of the company.

    D. It is important to ensure that the target organization has implemented mandatory security policies

  • Question 48:

    Information gathering is performed to:

    i) Collect basic information about the target company and its network

    ii) Determine the operating system used, platforms running, web server versions, etc.

    iii) Find vulnerabilities and exploits

    Which of the following pen testing tests yields information about a company's technology infrastructure?

    A. Searching for web page posting patterns

    B. Analyzing the link popularity of the company's website

    C. Searching for trade association directories

    D. Searching for a company's job postings

  • Question 49:

    An antenna is a device that is designed to transmit and receive the electromagnetic waves that are generally called radio waves. Which one of the following types of antenna is developed from waveguide technology?

    A. Leaky Wave Antennas

    B. Aperture Antennas

    C. Reflector Antenna

    D. Directional Antenna

  • Question 50:

    Which one of the following commands is used to search one of more files for a specific pattern and it helps in organizing the firewall log files?

    A. grpck

    B. grep

    C. gpgv

    D. gprn

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 412-79V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.