Está en la página 1de 6

DumpLeader

Ensure Success with Money back Guarantee

http://www.dumpleader.com
Advance your career with IT Cert!

IT Certification Guaranteed, The Easy Way!

Exam

412-79v8

Title

EC-Council Certified Security


Analyst (ECSA)

Vendor

EC-COUNCIL

Version

DEMO

IT Certification Guaranteed, The Easy Way!

NO.1 Which of the following appendices gives detailed lists of all the technical terms used in the
report?
A. Required Work Efforts
B. References
C. Research
D. Glossary
Answer: D
Explanation:
Refere'http://en.wikipedia.org/wiki/Glossary
NO.2 Which of the following is the range for assigned ports managed by the Internet Assigned
Numbers Authority (IANA)?
A. 3001-3100
B. 5000-5099
C. 6666-6674
D. 0 - 1023
Answer: D
Reference:https://www.ietf.org/rfc/rfc1700.txt(well known port numbers, 4thpara)
NO.3 Mason is footprinting an organization to gather competitive intelligence. He visits the
company's website for contact information and telephone numbers but does not find any. He knows
the entire staff directory was listed on their website 12 months. How can he find the directory?
A. Visit Google's search engine and view the cached copy
B. Crawl and download the entire website using the Surfoffline tool and save them to his computer
C. Visit the company's partners' and customers' website for this information
D. Use WayBackMachine in Archive.org web site to retrieve the Internet archive
Answer: D
NO.4 What information can be collected by dumpster diving?
A. Sensitive documents
B. Email messages
C. Customer contact information
D. All the above
Answer: A
Reference:http://www.spamlaws.com/dumpster-diving.html
NO.5 Which of the following policies helps secure data and protects the privacy of organizational
information?
A. Special-Access Policy
B. Document retention Policy
C. Cryptography Policy
D. Personal Security Policy
Answer: C
2

IT Certification Guaranteed, The Easy Way!

NO.6 External penetration testing is a traditional approach to penetration testing and is more
focused on the servers, infrastructure and the underlying software comprising the target. It involves a
comprehensive analysis of publicly available information about the target, such as Web servers, Mail
servers, Firewalls, and Routers.

Which of the following types of penetration testing is performed with no prior knowledge of the site?
A. Blue box testing
B. White box testing
C. Grey box testing
D. Black box testing
Answer: D
Reference:http://books.google.com.pk/books?id=5m6ta2fgTswC&pg=SA5PA4&lpg=SA5PA4&dq=penetration+testing+is+performed+with+no+prior+knowledge+of+the+site&s
ourc
e=bl&ots=8GkmyUBH2U&sig=wdBIboWxrhk5QjlQXs3yWOcuk2Q&hl=en&sa=X&ei=SgfVI2LLc3qaOa5g
IgO&ved=0CCkQ6AEwAQ#v=onepage&q=penetration%20testing%20i
s%20performed%20with%20no%20prior%20knowledge%20of%20the%20site&f=false
NO.7 Assessing a network from a hacker's point of view to discover the exploits and vulnerabilities
that are accessible to the outside world is which sort of vulnerability assessment?
A. Network Assessments
B. Application Assessments
C. Wireless Network Assessments
D. External Assessment
Answer: D
Reference:http://controlcase.com/managed_compliance_pci_vulnerability_scan.html
NO.8 Which of the following is the objective of Gramm-Leach-Bliley Act?
A. To ease the transfer of financial information between institutions and banks
B. To protect the confidentiality, integrity, and availability of data
C. To set a new or enhanced standards for all U.S. public company boards, management and public
accounting firms
D. To certify the accuracy of the reported financial statement
Answer: B
Reference:http://www.itap.purdue.edu/security/policies/glb_safeguards_rule_training_gener
al.pdf
3

IT Certification Guaranteed, The Easy Way!

NO.9 A firewall protects networked computers from intentional hostile intrusion that could
compromise confidentiality or result in data corruption or denial of service. It examines all traffic
routed between the two networks to see if it meets certain criteria. If it does, it is routed between
the networks, otherwise it is stopped.

Why is an appliance-based firewall is more secure than those implemented on top of the commercial
operating system (Software based)?
A. Appliance based firewalls cannot be upgraded
B. Firewalls implemented on a hardware firewall are highly scalable
C. Hardware appliances does not suffer from security vulnerabilities associated with the underlying
operating system
D. Operating system firewalls are highly configured
Answer: C
NO.10 During the process of fingerprinting a web application environment, what do you need to do in
order to analyze HTTP and HTTPS request headers and the HTML source code?
A. Examine Source of the Available Pages
B. Perform Web Spidering
C. Perform Banner Grabbing
D. Check the HTTP and HTML Processing by the Browser
Answer: C
NO.11 If a web application sends HTTP cookies as its method for transmitting session tokens, it may
be vulnerable which of the following attacks?
A. Parameter tampering Attack
B. Sql injection attack
C. Session Hijacking
D. Cross-site request attack
Answer: D

IT Certification Guaranteed, The Easy Way!

Reference:https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
NO.12 Which of the following shields Internet users from artificial DNS data, such as a deceptive or
mischievous address instead of the genuine address that was requested?
A. DNSSEC
B. Firewall
C. Packet filtering
D. IPSec
Answer: A
Reference:http://tools.ietf.org/html/draft-osterweil-dane-ipsec-01(abstract, first para)

También podría gustarte