Exam Details

  • Exam Code
    :412-79
  • Exam Name
    :EC-Council Certified Security Analyst (ECSA)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :232 Q&As
  • Last Updated
    :Mar 26, 2025

EC-COUNCIL EC-COUNCIL Certifications 412-79 Questions & Answers

  • Question 151:

    What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

    A. Service account passwords in plain text

    B. Cached password hashes for the past 20 users

    C. IAS account names and passwords

    D. Local store PKI Kerberos certificates

  • Question 152:

    Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

    A. Open

    B. Stealth

    C. Closed

    D. Filtered

  • Question 153:

    Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?

    A. %systemroot%\system32\drivers\etc

    B. %systemroot%\repair

    C. %systemroot%\LSA

    D. %systemroot%\system32\LSA

  • Question 154:

    When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

    A. NIPS

    B. Passive IDS

    C. Progressive IDS

    D. Active IDS

  • Question 155:

    You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company's clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive footprinting against their Web servers. What tool should you use?

    A. Ping sweep

    B. Netcraft

    C. Dig

    D. Nmap

  • Question 156:

    John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found.

    What information will he be able to gather from this?

    A. The SAM file from Hillary computer

    B. Hillary network username and password hash

    C. The SID of Hillary network account

    D. The network shares that Hillary has permissions

  • Question 157:

    James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

    A. Fraggle

    B. SYN flood

    C. Trinoo

    D. Smurf

  • Question 158:

    Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

    A. Fuzzing

    B. Tailgating

    C. Man trap attack

    D. Backtrapping

  • Question 159:

    Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

    A. OSPF

    B. BPG

    C. ATM

    D. UDP

  • Question 160:

    You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack against your external firewall. The firewall quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?

    A. The firewall failed-open

    B. The firewall failed-bypass

    C. The firewall failed-closed

    D. The firewall ACL has been purged

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 412-79 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.