Exam Details

  • Exam Code
    :412-79V8
  • Exam Name
    :EC-Council Certified Security Analyst (ECSA)
  • Certification
    :ECCouncil Certification
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :200 Q&As
  • Last Updated
    :May 09, 2024

EC-COUNCIL ECCouncil Certification 412-79V8 Questions & Answers

  • Question 41:

    Transmission Control Protocol (TCP) is a connection-oriented four layer protocol. It is responsible for breaking messages into segments, re-assembling them at the destination station, and re-sending. Which one of the following protocols does not use the TCP?

    A. Reverse Address Resolution Protocol (RARP)

    B. HTTP (Hypertext Transfer Protocol)

    C. SMTP (Simple Mail Transfer Protocol)

    D. Telnet

  • Question 42:

    TCP/IP provides a broad range of communication protocols for the various applications on the network. The TCP/IP model has four layers with major protocols included within each layer. Which one of the following protocols is used to collect information from all the network devices?

    A. Simple Network Management Protocol (SNMP)

    B. Network File system (NFS)

    C. Internet Control Message Protocol (ICMP)

    D. Transmission Control Protocol (TCP)

  • Question 43:

    Identify the framework that comprises of five levels to guide agency assessment of their security programs and assist in prioritizing efforts for improvement:

    A. Information System Security Assessment Framework (ISSAF)

    B. Microsoft Internet Security Framework

    C. Nortells Unified Security Framework

    D. Federal Information Technology Security Assessment Framework

  • Question 44:

    A framework for security analysis is composed of a set of instructions, assumptions, and limitations to analyze and solve security concerns and develop threat free applications. Which of the following frameworks helps an organization in the evaluation of the company's information security with that of the industrial standards?

    A. Microsoft Internet Security Framework

    B. Information System Security Assessment Framework

    C. The IBM Security Framework

    D. Nortell's Unified Security Framework

  • Question 45:

    The framework primarily designed to fulfill a methodical and organized way of addressing five threat classes to network and that can be used to access, plan, manage, and maintain secure computers and communication networks is:

    A. Nortells Unified Security Framework

    B. The IBM Security Framework

    C. Bell Labs Network Security Framework

    D. Microsoft Internet Security Framework

  • Question 46:

    A framework is a fundamental structure used to support and resolve complex issues. The framework that delivers an efficient set of technologies in order to develop applications which are more secure in using Internet and Intranet is:

    A. Microsoft Internet Security Framework

    B. Information System Security Assessment Framework (ISSAF)

    C. Bell Labs Network Security Framework

    D. The IBM Security Framework

  • Question 47:

    Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?

    A. California SB 1386

    B. Sarbanes-Oxley 2002

    C. Gramm-Leach-Bliley Act (GLBA)

    D. USA Patriot Act 2001

  • Question 48:

    Which one of the following acts related to the information security in the US fix the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting?

    A. California SB 1386

    B. Sarbanes-Oxley 2002

    C. Gramm-Leach-Bliley Act (GLBA)

    D. USA Patriot Act 2001

  • Question 49:

    Identify the policy that defines the standards for the organizational network connectivity and security standards for computers that are connected in the organizational network.

    A. Information-Protection Policy

    B. Special-Access Policy

    C. Remote-Access Policy

    D. Acceptable-Use Policy

  • Question 50:

    A security policy is a document or set of documents that describes, at a high level, the security controls that will be implemented by the company. Which one of the following policies forbids everything and restricts usage of company computers, whether it is system usage or network usage?

    A. Paranoid Policy

    B. Prudent Policy

    C. Promiscuous Policy

    D. Information-Protection Policy

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 412-79V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.