Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > EC-COUNCIL > EC-COUNCIL Certifications > 412-79V10 > 412-79V10 Online Practice Questions and Answers

412-79V10 Online Practice Questions and Answers

Questions 4

How many bits is Source Port Number in TCP Header packet?

A. 48

B. 32

C. 64

D. 16

Buy Now

Correct Answer: D

Questions 5

Which of the following is developed to address security concerns on time and reduce the misuse or threat of attacks in an organization?

A. Vulnerabilities checklists

B. Configuration checklists

C. Action Plan

D. Testing Plan

Buy Now

Correct Answer: A

Questions 6

You have compromised a lower-level administrator account on an Active Directory network of a small

company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of

the Domain Controllers on port 389 using Idp.exe.

What are you trying to accomplish here?

A. Poison the DNS records with false records

B. Enumerate MX and A records from DNS

C. Establish a remote connection to the Domain Controller

D. Enumerate domain user accounts and built-in groups

Buy Now

Correct Answer: D

Questions 7

Identify the correct formula for Return on Investment (ROI).

A. ROI = ((Expected Returns ?Cost of Investment) / Cost of Investment) * 100

B. ROI = (Expected Returns + Cost of Investment) / Cost of Investment

C. ROI = (Expected Returns Cost of Investment) / Cost of Investment

D. ROI = ((Expected Returns + Cost of Investment) / Cost of Investment) * 100

Buy Now

Correct Answer: C

Reference: http://www.investopedia.com/terms/r/returnoninvestment.asp

Questions 8

War Driving is the act of moving around a specific area, mapping the population of wireless access points for statistical purposes. These statistics are then used to raise awareness of the security problems associated with these types of networks. Which one of the following is a Linux based program that exploits the weak IV (Initialization Vector) problem documented with static WEP?

A. Airsnort

B. Aircrack

C. WEPCrack

D. Airpwn

Buy Now

Correct Answer: A

Questions 9

ARP spoofing is a technique whereby an attacker sends fake ("spoofed") Address Resolution Protocol (ARP) messages onto a Local Area Network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host (such as the default gateway), causing any traffic meant for that IP address to be sent to the attacker instead.

ARP spoofing attack is used as an opening for other attacks.

What type of attack would you launch after successfully deploying ARP spoofing?

A. Parameter Filtering

B. Social Engineering

C. Input Validation

D. Session Hijacking

Buy Now

Correct Answer: D

Reference: http://en.wikipedia.org/wiki/ARP_spoofing

Questions 10

What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?

A. Server Side Includes

B. Sort Server Includes

C. Server Sort Includes

D. Slide Server Includes

Buy Now

Correct Answer: A

Questions 11

In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?

A. IPS evasion technique

B. IDS evasion technique

C. UDP evasion technique

D. TTL evasion technique

Buy Now

Correct Answer: D

Reference: http://is.muni.cz/th/172999/fi_m/MT_Bukac.pdf (page 24)

Questions 12

Identify the person who will lead the penetration-testing project and be the client point of contact.

A. Database Penetration Tester

B. Policy Penetration Tester

C. Chief Penetration Tester

D. Application Penetration Tester

Buy Now

Correct Answer: C

Reference: http://www.scribd.com/doc/133635286/LPTv4-Module-15-Pre-Penetration- Testing-Checklist-NoRestriction (page 15)

Questions 13

This is a group of people hired to give details of the vulnerabilities present in the system found after a penetration test. They are elite and extremely competent penetration testers and intrusion analysts. This team prepares a report on the vulnerabilities in the system, attack methods, and how to defend against them.

What is this team called?

A. Blue team

B. Tiger team

C. Gorilla team

D. Lion team

Buy Now

Correct Answer: B

Exam Code: 412-79V10
Exam Name: EC-Council Certified Security Analyst (ECSA) V10
Last Update: Jun 06, 2025
Questions: 201

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.