EC-Council Certified Security Analyst (ECSA) v9 412-79V9 Exam Questions in PDF

Free EC-Council 412-79V9 Dumps Questions (page: 5)

Identify the person who will lead the penetration-testing project and be the client point of contact.

  1. Database Penetration Tester
  2. Policy Penetration Tester
  3. Chief Penetration Tester
  4. Application Penetration Tester

Answer(s): C


Reference:

http://www.scribd.com/doc/133635286/LPTv4-Module-15-Pre-Penetration- Testing-Checklist-NoRestriction (page 15)



Logs are the record of the system and network activities. Syslog protocol is used for delivering log information across an IP network. Syslog messages can be sent via which one of the following?

  1. UDP and TCP
  2. TCP and SMTP
  3. SMTP
  4. UDP and SMTP

Answer(s): A



The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU.
The value of the MTU depends on the type of the transmission link. The design of IP accommodates MTU differences by allowing routers to fragment IP datagrams as necessary. The receiving station is responsible for reassembling the fragments back into the original full size IP datagram.
IP fragmentation involves breaking a datagram into a number of pieces that can be reassembled later. The IP source, destination, identification, total length, and fragment offset fields in the IP header, are used for IP fragmentation and reassembly.



The fragment offset is 13 bits and indicates where a fragment belongs in the original IP datagram. This value is a:

  1. Multiple of four bytes
  2. Multiple of two bytes
  3. Multiple of eight bytes
  4. Multiple of six bytes

Answer(s): C


Reference:

http://www.freesoft.org/CIE/Course/Section3/7.htm (fragment offset: 13 bits)



Which one of the following tools of trade is an automated, comprehensive penetration testing product for assessing the specific information security threats to an organization?

  1. Sunbelt Network Security Inspector (SNSI).
  2. CORE Impact
  3. Canvas
  4. Microsoft Baseline Security Analyzer (MBSA)

Answer(s): C



Which of the following is the objective of Gramm-Leach-Bliley Act?

  1. To ease the transfer of financial information between institutions and banks
  2. To protect the confidentiality, integrity, and availability of data
  3. To set a new or enhanced standards for all U.S. public company boards, management and public accounting firms
  4. To certify the accuracy of the reported financial statement

Answer(s): A


Reference:

http://www.itap.purdue.edu/security/policies/glb_safeguards_rule_training_general.pdf



Port numbers are used to keep track of different conversations crossing the network at the same time. Both TCP and UDP use port (socket) numbers to pass information to the upper layers. Port numbers have the assigned ranges. The port numbers above 1024 are considered as which one of the following? (Select all that apply)

  1. Well-known port numbers
  2. Dynamically assigned port numbers
  3. Unregistered port numbers
  4. Statically assigned port numbers

Answer(s): B



The Internet is a giant database where people store some of their most private information on the cloud, trusting that the service provider can keep it all safe. Trojans, Viruses, DoS attacks, website defacement, lost computers, accidental publishing, and more have all been sources of major leaks over the last 15 years.



What is the biggest source of data leaks in organizations today?

  1. Weak passwords and lack of identity management
  2. Insufficient IT security budget
  3. Rogue employees and insider attacks
  4. Vulnerabilities, risks, and threats facing Web sites

Answer(s): C



Identify the injection attack represented in the diagram below:

  1. XPath Injection Attack
  2. XML Request Attack
  3. XML Injection Attack
  4. Frame Injection Attack

Answer(s): C


Reference:

http://projects.webappsec.org/w/page/13247004/XML%20Injection



Share your comments for EC-Council 412-79V9 exam with other users:

A
Ayushi Baria
11/7/2023 7:44:00 AM

this is very helpfull for me

A
alma
8/25/2023 1:20:00 PM

just started preparing for the exam

C
CW
7/10/2023 6:46:00 PM

these are the type of questions i need.

N
Nobody
8/30/2023 9:54:00 PM

does this actually work? are they the exam questions and answers word for word?

S
Salah
7/23/2023 9:46:00 AM

thanks for providing these questions

R
Ritu
9/15/2023 5:55:00 AM

interesting

R
Ron
5/30/2023 8:33:00 AM

these dumps are pretty good.

S
Sowl
8/10/2023 6:22:00 PM

good questions

B
Blessious Phiri
8/15/2023 2:02:00 PM

dbua is used for upgrading oracle database

R
Richard
10/24/2023 6:12:00 AM

i am thrilled to say that i passed my amazon web services mls-c01 exam, thanks to study materials. they were comprehensive and well-structured, making my preparation efficient.

J
Janjua
5/22/2023 3:31:00 PM

please upload latest ibm ace c1000-056 dumps

M
Matt
12/30/2023 11:18:00 AM

if only explanations were provided...

R
Rasha
6/29/2023 8:23:00 PM

yes .. i need the dump if you can help me

A
Anonymous
7/25/2023 8:05:00 AM

good morning, could you please upload this exam again?

A
AJ
9/24/2023 9:32:00 AM

hi please upload sre foundation and practitioner exam questions

P
peter parker
8/10/2023 10:59:00 AM

the exam is listed as 80 questions with a pass mark of 70%, how is your 50 questions related?

B
Berihun
7/13/2023 7:29:00 AM

all questions are so important and covers all ccna modules

N
nspk
1/19/2024 12:53:00 AM

q 44. ans:- b (goto setup > order settings > select enable optional price books for orders) reference link --> https://resources.docs.salesforce.com/latest/latest/en-us/sfdc/pdf/sfom_impl_b2b_b2b2c.pdf(decide whether you want to enable the optional price books feature. if so, select enable optional price books for orders. you can use orders in salesforce while managing price books in an external platform. if you’re using d2c commerce, you must select enable optional price books for orders.)

M
Muhammad Rawish Siddiqui
12/2/2023 5:28:00 AM

"cost of replacing data if it were lost" is also correct.

A
Anonymous
7/14/2023 3:17:00 AM

pls upload the questions

M
Mukesh
7/10/2023 4:14:00 PM

good questions

E
Elie Abou Chrouch
12/11/2023 3:38:00 AM

question 182 - correct answer is d. ethernet frame length is 64 - 1518b. length of user data containing is that frame: 46 - 1500b.

D
Damien
9/23/2023 8:37:00 AM

i need this exam pls

N
Nani
9/10/2023 12:02:00 PM

its required for me, please make it enable to access. thanks

E
ethiopia
8/2/2023 2:18:00 AM

seems good..

W
whoAreWeReally
12/19/2023 8:29:00 PM

took the test last week, i did have about 15 - 20 word for word from this site on the test. (only was able to cram 600 of the questions from this site so maybe more were there i didnt review) had 4 labs, bgp, lacp, vrf with tunnels and actually had to skip a lab due to time. lots of automation syntax questions.

V
vs
9/2/2023 12:19:00 PM

no comments

J
john adenu
11/14/2023 11:02:00 AM

nice questions bring out the best in you.

O
Osman
11/21/2023 2:27:00 PM

really helpful

E
Edward
9/13/2023 5:27:00 PM

question #50 and question #81 are exactly the same questions, azure site recovery provides________for virtual machines. the first says that it is fault tolerance is the answer and second says disater recovery. from my research, it says it should be disaster recovery. can anybody explain to me why? thank you

M
Monti
5/24/2023 11:14:00 PM

iam thankful for these exam dumps questions, i would not have passed without this exam dumps.

A
Anon
10/25/2023 10:48:00 PM

some of the answers seem to be inaccurate. q10 for example shouldnt it be an m custom column?

P
PeterPan
10/18/2023 10:22:00 AM

are the question real or fake?

C
CW
7/11/2023 3:19:00 PM

thank you for providing such assistance.

AI Tutor 👋 I’m here to help!