24.11.2017 Views

412-79V9 Exam Practice Software

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CERTSGRADE<br />

High Grade and Valuable Preparation Stuff<br />

Eccouncil<br />

<strong>412</strong>-<strong>79V9</strong><br />

EC-Council Certified Security Analyst (ECSA) v9<br />

For More Information – Visit link below:<br />

http://www.certsgrade.com/<br />

Version = Product<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/


Question: 1<br />

What are the 6 core concepts in IT security?<br />

A. Server management, website domains, firewalls, IDS, IPS, and auditing<br />

B. Authentication, authorization, confidentiality, integrity, availability, and non-repudiation<br />

C. Passwords, logins, access controls, restricted domains, configurations, and tunnels<br />

D. Biometrics, cloud security, social engineering, DoS attack, viruses, and Trojans<br />

Question: 2<br />

Answer: B<br />

In Linux, /etc/shadow file stores the real password in encrypted format for user’s account with added<br />

properties associated with the user’s password.<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/


In the example of a /etc/shadow file below, what does the bold letter string indicate?<br />

Vivek: $1$fnffc$GteyHdicpGOfffXX40w#5:13064:0:99999:7<br />

A. Number of days the user is warned before the expiration date<br />

B. Minimum number of days required between password changes<br />

C. Maximum number of days the password is valid<br />

D. Last password changed<br />

Explanation:<br />

Reference:<br />

http://www.cyberciti.biz/faq/understanding-etcshadow-file/ (bullet # 4)<br />

Question: 3<br />

Answer: B<br />

What is a difference between host-based intrusion detection systems (HIDS) and network-based<br />

intrusion detection systems (NIDS)?<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/


A. NIDS are usually a more expensive solution to implement compared to HIDS.<br />

B. Attempts to install Trojans or backdoors cannot be monitored by a HIDS whereas NIDS can monitor<br />

and stop such intrusion events.<br />

C. NIDS are standalone hardware appliances that include network intrusion detection capabilities<br />

whereas HIDS consist of software agents installed on individual computers within the system.<br />

D. HIDS requires less administration and training compared to NIDS.<br />

Question: 4<br />

Answer: C<br />

Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the<br />

critical assets, and creates proper information protection procedures such as effective planning,<br />

scheduling, coordination, and logistics?<br />

A. Threat-Assessment Phase<br />

B. Pre-Assessment Phase<br />

C. Assessment Phase<br />

D. Post-Assessment Phase<br />

Question: 5<br />

Answer: B<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/


Which of the following is not the SQL injection attack character?<br />

A. $<br />

B. PRINT<br />

C. #<br />

D. @@variable<br />

Answer: A<br />

Question: 6<br />

Which of the following is the objective of Gramm-Leach-Bliley Act?<br />

A. To ease the transfer of financial information between institutions and banks<br />

B. To protect the confidentiality, integrity, and availability of data<br />

C. To set a new or enhanced standards for all U.S. public company boards, management and public<br />

accounting firms<br />

D. To certify the accuracy of the reported financial statement<br />

Answer: A<br />

Explanation:<br />

Reference:<br />

http://www.itap.purdue.edu/security/policies/glb_safeguards_rule_training_general.pdf<br />

Question: 7<br />

Which of the following contents of a pen testing project plan addresses the strengths, weaknesses,<br />

opportunities, and threats involved in the project?<br />

A. Project Goal<br />

B. Success Factors<br />

C. Objectives<br />

D. Assumptions<br />

Question: 8<br />

Answer: D<br />

In a TCP packet filtering firewall, traffic is filtered based on specified session rules, such as when a<br />

session is initiated by a recognized computer.<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/


Identify the level up to which the unknown traffic is allowed into the network stack.<br />

A. Level 5 – Application<br />

B. Level 2 – Data Link<br />

C. Level 4 – TCP<br />

D. Level 3 – Internet Protocol (IP)<br />

Answer: D<br />

Explanation:<br />

Reference:<br />

http://books.google.com.pk/books?id=KPjLAyA7HgoC&pg=PA208&lpg=PA208&dq=TCP+packet+filtering<br />

+firewall+level+up+to+which+the+unknown+traffic+is+allowed+into+the+network+stack&source=bl&ot<br />

s=zRrbchVYng&sig=q5G3T8lggTfAMNRkL7Kp0SRslHU&hl=en&sa=X&ei=5PUeVLSbC8TmaMzrgZgC&ved=<br />

0CBsQ6AEwAA#v=onepage&q=TCP%20packet%20filtering%20firewall%20level%20up%20to%20which%<br />

20the%20unknown%20traffic%20is%20allowed%20into%20the%20network%20stack&f=false<br />

Question: 9<br />

Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter<br />

details at a fake website whose look and feel are almost identical to the legitimate one.<br />

Phishing is an example of social engineering techniques used to deceive users, and exploits the poor<br />

usability of current web security technologies. Attempts to deal with the growing number of reported<br />

phishing incidents include legislation, user training, public awareness, and technical security measures.<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/


What characteristics do phishing messages often have that may make them identifiable?<br />

A. Invalid email signatures or contact information<br />

B. Suspiciously good grammar and capitalization<br />

C. They trigger warning pop-ups<br />

D. Suspicious attachments<br />

Question: 10<br />

Answer: C<br />

Which of the following are the default ports used by NetBIOS service?<br />

A. 135, 136, 139, 445<br />

B. 134, 135, 136, 137<br />

C. 137, 138, 139, 140<br />

D. 133, 134, 139, 142<br />

Answer: A<br />

Question: 11<br />

What is the maximum value of a “tinyint” field in most database systems?<br />

A. 222<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/


B. 224 or more<br />

C. 240 or less<br />

D. 225 or more<br />

Answer: D<br />

Explanation:<br />

Reference:<br />

http://books.google.com.pk/books?id=JUcIAAAAQBAJ&pg=SA3-PA3&lpg=SA3-<br />

PA3&dq=maximum+value+of+a+%E2%80%9Ctinyint%E2%80%9D+field+in+most+database+systems&so<br />

urce=bl&ots=NscGk--<br />

R5r&sig=1hMOYByxt7ebRJ4UEjbpxMijTQs&hl=en&sa=X&ei=pvgeVJnTCNDkaI_fgugO&ved=0CDYQ6AEw<br />

Aw#v=onepage&q=maximum%20value%20of%20a%20%E2%80%9Ctinyint%E2%80%9D%20field%20in%<br />

20most%20database%20systems&f=false<br />

Question: 12<br />

Which of the following policies states that the relevant application owner must authorize requests for<br />

additional access to specific business applications in writing to the IT Department/resource?<br />

A. Special-Access Policy<br />

B. User Identification and Password Policy<br />

C. Personal Computer Acceptable Use Policy<br />

D. User-Account Policy<br />

Question: 13<br />

Answer: B<br />

Identify the person who will lead the penetration-testing project and be the client point of contact.<br />

A. Database Penetration Tester<br />

B. Policy Penetration Tester<br />

C. Chief Penetration Tester<br />

D. Application Penetration Tester<br />

Answer: C<br />

Explanation:<br />

Reference:<br />

http://www.scribd.com/doc/133635286/LPTv4-Module-15-Pre-Penetration-Testing-Checklist-<br />

NoRestriction (page 15)<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/


Question: 14<br />

A man enters a PIN number at an ATM machine, being unaware that the person next to him was<br />

watching. Which of the following social engineering techniques refers to this type of information theft?<br />

A. Shoulder surfing<br />

B. Phishing<br />

C. Insider Accomplice<br />

D. Vishing<br />

Question: 15<br />

Answer: A<br />

The Internet is a giant database where people store some of their most private information on the<br />

cloud, trusting that the service provider can keep it all safe. Trojans, Viruses, DoS attacks, website<br />

defacement, lost computers, accidental publishing, and more have all been sources of major leaks over<br />

the last 15 years.<br />

What is the biggest source of data leaks in organizations today?<br />

A. Weak passwords and lack of identity management<br />

B. Insufficient IT security budget<br />

C. Rogue employees and insider attacks<br />

D. Vulnerabilities, risks, and threats facing Web sites<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/


Answer: C<br />

Question: 16<br />

Why is a legal agreement important to have before launching a penetration test?<br />

A. Guarantees your consultant fees<br />

B. Allows you to perform a penetration test without the knowledge and consent of the organization's<br />

upper management<br />

C. It establishes the legality of the penetration test by documenting the scope of the project and the<br />

consent of the company.<br />

D. It is important to ensure that the target organization has implemented mandatory security policies<br />

Answer: C<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/


Powered by TCPDF (www.tcpdf.org)<br />

For More Information – Visit link below:<br />

http://www.certsgrade.com/<br />

PRODUCT FEATURES<br />

100% Money Back Guarantee<br />

90 Days Free updates<br />

Special Discounts on Bulk Orders<br />

Guaranteed Success<br />

50,000 Satisfied Customers<br />

100% Secure Shopping<br />

Privacy Policy<br />

Refund Policy<br />

WE ACCEPT<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!