412-79v10 Premium Bundle

412-79v10 Premium Bundle

EC-Council Certified Security Analyst (ECSA) V10 Certification Exam

4.5 
(47685 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

EC-Council 412-79v10 Free Practice Questions

It is more faster and easier to pass the by using . Immediate access to the and find the same core area with professionally verified answers, then PASS your exam with a high score now.

Online 412-79v10 free questions and answers of New Version:

NEW QUESTION 1
You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using Idp.exe.
What are you trying to accomplish here?

  • A. Poison the DNS records with false records
  • B. Enumerate MX and A records from DNS
  • C. Establish a remote connection to the Domain Controller
  • D. Enumerate domain user accounts and built-in groups

Answer: D

NEW QUESTION 2
Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

  • A. Filtered
  • B. Stealth
  • C. Closed
  • D. Open

Answer: D

NEW QUESTION 3
A pen tester has extracted a database name by using a blind SQL injection. Now he begins to test the table inside the database using the below query and finds the table:
http://juggyboy.com/page.aspx?id=1; IF (LEN(SELECT TOP 1 NAME from sysobjects where xtype='U')=3) WAITFOR DELAY '00:00:10'--
http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),1,1)))=101) WAITFOR DELAY '00:00:10'--
http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),2,1)))=109) WAITFOR DELAY '00:00:10'--
http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),3,1)))=112) WAITFOR DELAY '00:00:10'—
What is the table name?

  • A. CTS
  • B. QRT
  • C. EMP
  • D. ABC

Answer: C

NEW QUESTION 4
Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast.
On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently.
What could be Tyler issue with his home wireless network?

  • A. 2.4 Ghz Cordless phones
  • B. Satellite television
  • C. CB radio
  • D. Computers on his wired network

Answer: A

NEW QUESTION 5
Identify the injection attack represented in the diagram below:
412-79v10 dumps exhibit

  • A. XPath Injection Attack
  • B. XML Request Attack
  • C. XML Injection Attack
  • D. Frame Injection Attack

Answer: C

NEW QUESTION 6
How many possible sequence number combinations are there in TCP/IP protocol?

  • A. 320 billion
  • B. 32 million
  • C. 4 billion
  • D. 1 billion

Answer: C

NEW QUESTION 7
What is a good security method to prevent unauthorized users from "tailgating"?

  • A. Electronic key systems
  • B. Man trap
  • C. Pick-resistant locks
  • D. Electronic combination locks

Answer: B

NEW QUESTION 8
Which of the following has an offset field that specifies the length of the header and data?

  • A. IP Header
  • B. UDP Header
  • C. ICMP Header
  • D. TCP Header

Answer: D

NEW QUESTION 9
Wireshark is a network analyzer. It reads packets from the network, decodes them, and presents them in an easy-to-understand format. Which one of the following is the command-line version of Wireshark, which can be used to capture the live packets from the wire or to read the saved capture files?

  • A. Tcpdump
  • B. Capinfos
  • C. Tshark
  • D. Idl2wrs

Answer: B

NEW QUESTION 10
Identify the port numbers used by POP3 and POP3S protocols.

  • A. 113 and 981
  • B. 111 and 982
  • C. 110 and 995
  • D. 109 and 973

Answer: C

NEW QUESTION 11
Which of the following policy forbids everything with strict restrictions on all usage of the company systems and network?

  • A. Information-Protection Po
  • B. Paranoid Policy
  • C. Promiscuous Policy
  • D. Prudent Policy

Answer: B

NEW QUESTION 12
Which one of the following is a command line tool used for capturing data from the live network and copying those packets to a file?

  • A. Wireshark: Capinfos
  • B. Wireshark: Tcpdump
  • C. Wireshark: Text2pcap
  • D. Wireshark: Dumpcap

Answer: D

NEW QUESTION 13
Amazon, an IT based company, conducts a survey on the usage of the Internet. They found that company employees spend most of the time at work surfing the web for their personal use and for inappropriate web site viewing. Management decide to block all such web sites using URL filtering software.
412-79v10 dumps exhibit
How can employees continue to see the blocked websites?

  • A. Using session hijacking
  • B. Using proxy servers
  • C. Using authentication
  • D. Using encryption

Answer: B

NEW QUESTION 14
Which of the following is the objective of Gramm-Leach-Bliley Act?

  • A. To ease the transfer of financial information between institutions and banks
  • B. To protect the confidentiality, integrity, and availability of data
  • C. To set a new or enhanced standards for all U.
  • D. public company boards, management and public accounting firms
  • E. To certify the accuracy of the reported financial statement

Answer: A

NEW QUESTION 15
Attackers create secret accounts and gain illegal access to resources using backdoor while bypassing the authentication procedures. Creating a backdoor is a where an attacker obtains remote access to a computer on a network.
412-79v10 dumps exhibit
Which of the following techniques do attackers use to create backdoors to covertly gather critical information about a target machine?

  • A. Internal network mapping to map the internal network of the target machine
  • B. Port scanning to determine what ports are open or in use on the target machine
  • C. Sniffing to monitor all the incoming and outgoing network traffic
  • D. Social engineering and spear phishing attacks to install malicious programs on the target machine

Answer: D

NEW QUESTION 16
Windows stores user passwords in the Security Accounts Manager database (SAM), or in the Active Directory database in domains. Passwords are never stored in clear text; passwords are hashed and the results are stored in the SAM.
NTLM and LM authentication protocols are used to securely store a user's password in the SAM database using different hashing methods.
412-79v10 dumps exhibit
The SAM file in Windows Server 2008 is located in which of the following locations?

  • A. c:windowssystem32configSAM
  • B. c:windowssystem32driversSAM
  • C. c:windowssystem32SetupSAM
  • D. c:windowssystem32BootSAM

Answer: D

100% Valid and Newest Version 412-79v10 Questions & Answers shared by Passcertsure, Get Full Dumps HERE: https://www.passcertsure.com/412-79v10-test/ (New 201 Q&As)


START 412-79v10 EXAM