EC-Council 412-79V10 EC-Council Certified Security Analyst (ECSA) V10 Online Training
EC-Council 412-79V10 Online Training
The questions for 412-79V10 were last updated at Nov 23,2024.
- Exam Code: 412-79V10
- Exam Name: EC-Council Certified Security Analyst (ECSA) V10
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
What is the maximum value of a “tinyint” field in most database systems?
- A . 222
- B . 224 or more
- C . 240 or less
- D . 225 or more
After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet.
Why is that?
- A . IPSEC does not work with packet filtering firewalls
- B . NAT does not work with IPSEC
- C . NAT does not work with statefull firewalls
- D . Statefull firewalls do not work with packet filtering firewalls
What are the 6 core concepts in IT security?
- A . Server management, website domains, firewalls, IDS, IPS, and auditing
- B . Authentication, authorization, confidentiality, integrity, availability, and non-repudiation
- C . Passwords, logins, access controls, restricted domains, configurations, and tunnels
- D . Biometrics, cloud security, social engineering, DoS attack, viruses, and Trojans
What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?
- A . Connect Scanning Techniques
- B . SYN Scanning Techniques
- C . Stealth Scanning Techniques
- D . Port Scanning Techniques
What is the difference between penetration testing and vulnerability testing?
- A . Penetration testing goes one step further than vulnerability testing; while vulnerability tests check for known vulnerabilities, penetration testing adopts the concept of ‘in-depth ethical hacking’
- B . Penetration testing is based on purely online vulnerability analysis while vulnerability testing engages ethical hackers to find vulnerabilities
- C . Vulnerability testing is more expensive than penetration testing
- D . Penetration testing is conducted purely for meeting compliance standards while vulnerability testing is focused on online scans
Which of the following defines the details of services to be provided for the client’s organization and the list of services required for performing the test in the organization?
- A . Draft
- B . Report
- C . Requirement list
- D . Quotation
You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London.
After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords.
What tool could you use to get this information?
- A . RaidSniff
- B . Snort
- C . Ettercap
- D . Airsnort
Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?
- A . Hash Key Length
- B . C/R Value Length
- C . C/R Key Length
- D . Hash Value Length
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?
- A . Passive IDS
- B . Active IDS
- C . Progressive IDS
- D . NIPS
Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?
- A . California SB 1386
- B . Sarbanes-Oxley 2002
- C . Gramm-Leach-Bliley Act (GLBA)
- D . USA Patriot Act 2001