New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 412-79v10 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following will not handle routing protocols properly?

Options:
A.

“Internet-router-firewall-net architecture”

B.

“Internet-firewall-router-net architecture”

C.

“Internet-firewall -net architecture”

D.

“Internet-firewall/router(edge device)-net architecture”

ECCouncil 412-79v10 Premium Access
Questions 12

You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack against your external firewall. The firewall quickly freezes up and becomes unusable.

You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?

Options:
A.

The firewall failed-open

B.

The firewall failed-bypass

C.

The firewall failed-closed

D.

The firewall ACL has been purged

Questions 13

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set.

What is Terri trying to accomplish by sending this IP packet?

Options:
A.

Poison the switch's MAC address table by flooding it with ACK bits

B.

Enable tunneling feature on the switch

C.

Trick the switch into thinking it already has a session with Terri's computer

D.

Crash the switch with a DoS attack since switches cannot send ACK bits

Questions 14

An "idle" system is also referred to as what?

Options:
A.

Zombie

B.

PC not being used

C.

Bot

D.

PC not connected to the Internet

Questions 15

Which of the following shields Internet users from artificial DNS data, such as a deceptive or mischievous address instead of the genuine address that was requested?

Options:
A.

DNSSEC

B.

Firewall

C.

Packet filtering

D.

IPSec

Questions 16

DMZ is a network designed to give the public access to the specific internal resources and you might want to do the same thing for guests visiting organizations without compromising the integrity of the internal resources. In general, attacks on the wireless networks fall into four basic categories.

Identify the attacks that fall under Passive attacks category.

Options:
A.

Wardriving

B.

Spoofing

C.

Sniffing

D.

Network Hijacking

Questions 17

Why is a legal agreement important to have before launching a penetration test?

412-79v10 Question 17

Options:
A.

Guarantees your consultant fees

B.

Allows you to perform a penetration test without the knowledge and consent of the organization's upper management

C.

It establishes the legality of the penetration test by documenting the scope of the project and the consent of the company.

D.

It is important to ensure that the target organization has implemented mandatory security policies

Questions 18

By default, the TFTP server listens on UDP port 69. Which of the following utility reports the port status of target TCP and UDP ports on a local or a remote computer and is used to troubleshoot TCP/IP connectivity issues?

Options:
A.

PortQry

B.

Netstat

C.

Telnet

D.

Tracert

Questions 19

Many security and compliance projects begin with a simple idea: assess the organization's risk, vulnerabilities, and breaches. Implementing an IT security risk assessment is critical to the overall security posture of any organization.

An effective security risk assessment can prevent breaches and reduce the impact of realized breaches.

412-79v10 Question 19

What is the formula to calculate risk?

Options:
A.

Risk = Budget x Time

B.

Risk = Goodwill x Reputation

C.

Risk = Loss x Exposure factor

D.

Risk = Threats x Attacks

Questions 20

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum.

Different types of Internet Control Message Protocols (ICMPs) are identified by a type and code field.

412-79v10 Question 20

Which of the following ICMP messages will be generated if the destination port is not reachable?

Options:
A.

ICMP Type 11 code 1

B.

ICMP Type 5 code 3

C.

ICMP Type 3 code 2

D.

ICMP Type 3 code 3

Exam Code: 412-79v10
Certification Provider: ECCouncil
Exam Name: EC-Council Certified Security Analyst (ECSA) V10
Last Update: Mar 28, 2025
Questions: 201