Exam Details

  • Exam Code
    :412-79
  • Exam Name
    :EC-Council Certified Security Analyst (ECSA)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :232 Q&As
  • Last Updated
    :Mar 26, 2025

EC-COUNCIL EC-COUNCIL Certifications 412-79 Questions & Answers

  • Question 171:

    Software firewalls work at which layer of the OSI model?

    A. Transport

    B. Application

    C. Network

    D. Data Link

  • Question 172:

    After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a lage organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts responds to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

    A. A switched network will not respond to packets sent to the broadcast address

    B. Only IBM AS/400 will reply to this scan

    C. Only Unix and Unix-like systems will reply to this scan

    D. Only Windows systems will reply to this scan

  • Question 173:

    George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time-based induction machine" be used. What IDS feature must George implement to meet this requirement?

    A. Pattern matching

    B. Statistical-based anomaly detection

    C. Real-time anomaly detection

    D. Signature-based anomaly detection

  • Question 174:

    Software firewalls work at which layer of the OSI model?

    A. Data Link

    B. Network

    C. Transport

    D. Application

  • Question 175:

    The objective of this act was to protect consumers personal financial information held by financial institutions and their service providers.

    A. HIPAA

    B. Sarbanes-Oxley 2002

    C. Gramm-Leach-Bliley Act

    D. California SB 1386

  • Question 176:

    What does ICMP Type 3/Code 13 mean?

    A. Host Unreachable

    B. Port Unreachable

    C. Protocol Unreachable

    D. Administratively Blocked

  • Question 177:

    Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

    A. CVE

    B. IANA

    C. RIPE

    D. APIPA

  • Question 178:

    Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?

    #include

    #include

    int main(int argc, char *argv[])

    {

    char buffer[10];

    if (argc < 2)

    {

    fprintf(stderr, "USAGE: %s string\n", argv[0]);

    return 1;

    }

    strcpy(buffer, argv[1]);

    return 0;

    }

    A. Buffer overflow

    B. Format string bug

    C. Kernal injection

    D. SQL injection

  • Question 179:

    After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?

    A. Enable BGP

    B. Disable BGP

    C. Enable direct broadcasts

    D. Disable direct broadcasts

  • Question 180:

    You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers:

    http://172.168.4.131/level/99/exec/show/config

    After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

    A. URL Obfuscation Arbitrary Administrative Access Vulnerability

    B. Cisco IOS Arbitrary Administrative Access Online Vulnerability

    C. HTTP Configuration Arbitrary Administrative Access Vulnerability

    D. HTML Configuration Arbitrary Administrative Access Vulnerability

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 412-79 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.