EC-Council 412-79V10 EC-Council Certified Security Analyst (ECSA) V10 Online Training
EC-Council 412-79V10 Online Training
The questions for 412-79V10 were last updated at Nov 22,2024.
- Exam Code: 412-79V10
- Exam Name: EC-Council Certified Security Analyst (ECSA) V10
- Certification Provider: EC-Council
- Latest update: Nov 22,2024
A framework for security analysis is composed of a set of instructions, assumptions, and limitations to analyze and solve security concerns and develop threat free applications.
Which of the following frameworks helps an organization in the evaluation of the company’s information security with that of the industrial standards?
- A . Microsoft Internet Security Framework
- B . Information System Security Assessment Framework
- C . The IBM Security Framework
- D . Nortell’s Unified Security Framework
A framework is a fundamental structure used to support and resolve complex issues.
The framework that delivers an efficient set of technologies in order to develop applications which are more secure in using Internet and Intranet is:
- A . Microsoft Internet Security Framework
- B . Information System Security Assessment Framework (ISSAF)
- C . Bell Labs Network Security Framework
- D . The IBM Security Framework
Identify the framework that comprises of five levels to guide agency assessment of their security programs and assist in prioritizing efforts for improvement:
- A . Information System Security Assessment Framework (ISSAF)
- B . Microsoft Internet Security Framework
- C . Nortells Unified Security Framework
- D . Federal Information Technology Security Assessment Framework
NTP protocol is used to synchronize the system clocks of computers with a remote time server or time source over a network.
Which one of the following ports is used by NTP as its transport layer?
- A . TCP port 152
- B . UDP port 177
- C . UDP port 123
- D . TCP port 113
In the context of penetration testing, what does blue teaming mean?
- A . A penetration test performed with the knowledge and consent of the organization’s IT staff
- B . It is the most expensive and most widely used
- C . It may be conducted with or without warning
- D . A penetration test performed without the knowledge of the organization’s IT staff but with permission from upper management
Vulnerability assessment is an examination of the ability of a system or application, including current security procedures and controls, to withstand assault. It recognizes, measures, and classifies security vulnerabilities in a computer system, network, and communication channels.
A vulnerability assessment is used to identify weaknesses that could be exploited and predict the effectiveness of additional security measures in protecting information resources from attack.
Which of the following vulnerability assessment technique is used to test the web server infrastructure for any misconfiguration and outdated content?
- A . Passive Assessment
- B . Host-based Assessment
- C . External Assessment
- D . Application Assessment
You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks.
When assessing the risk to the clients network, what step should you take first?
- A . Analyzing, categorizing and prioritizing resources
- B . Evaluating the existing perimeter and internal security
- C . Checking for a written security policy
- D . Analyzing the use of existing management and control architecture
Firewall is an IP packet filter that enforces the filtering and security policies to the flowing network traffic. Using firewalls in IPv6 is still the best way of protection from low level attacks at the network and transport layers.
Which one of the following cannot handle routing protocols properly?
- A . “Internet-router-firewall-net architecture”
- B . “Internet-firewall-router-net architecture”
- C . “Internet-firewall/router(edge device)-net architecture”
- D . “Internet-firewall -net architecture”
You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers.
What type of firewall must you implement to abide by this policy?
- A . Circuit-level proxy firewall
- B . Packet filtering firewall
- C . Application-level proxy firewall
- D . Statefull firewall
George is a senior security analyst working for a state agency in Florida. His state’s congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs.
The state bill requires that an IDS with a "time-based induction machine" be used.
What IDS feature must George implement to meet this requirement?
- A . Pattern matching
- B . Statistical-based anomaly detection
- C . Real-time anomaly detection
- D . Signature-based anomaly detection