Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

412-79v10 Exam Dumps - ECCouncil ECSA Questions and Answers

Question # 24

One needs to run “Scan Server Configuration” tool to allow a remote connection to Nessus from the remote Nessus clients. This tool allows the port and bound interface of the Nessus daemon to be configured.

By default, the Nessus daemon listens to connections on which one of the following?

Options:

A.

Localhost (127.0.0.1) and port 1241

B.

Localhost (127.0.0.1) and port 1240

C.

Localhost (127.0.0.1) and port 1246

D.

Localhost (127.0.0.0) and port 1243

Buy Now
Question # 25

What is the target host IP in the following command?

Options:

A.

Firewalk does not scan target hosts

B.

172.16.28.95

C.

This command is using FIN packets, which cannot scan target hosts

D.

10.10.150.1

Buy Now
Question # 26

How many bits is Source Port Number in TCP Header packet?

Options:

A.

48

B.

32

C.

64

D.

16

Buy Now
Question # 27

What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?

Options:

A.

Server Side Includes

B.

Sort Server Includes

C.

Server Sort Includes

D.

Slide Server Includes

Buy Now
Question # 28

Which of the following protocols cannot be used to filter VoIP traffic?

Options:

A.

Media Gateway Control Protocol (MGCP)

B.

Real-time Transport Control Protocol (RTCP)

C.

Session Description Protocol (SDP)

D.

Real-Time Publish Subscribe (RTPS)

Buy Now
Question # 29

A penetration test will show you the vulnerabilities in the target system and the risks associated with it. An educated valuation of the risk will be performed so that the vulnerabilities can be reported as High/Medium/Low risk issues.

What are the two types of ‘white-box’ penetration testing?

Options:

A.

Announced testing and blind testing

B.

Blind testing and double blind testing

C.

Blind testing and unannounced testing

D.

Announced testing and unannounced testing

Buy Now
Question # 30

Which one of the following log analysis tools is used for analyzing the server’s log files?

Options:

A.

Performance Analysis of Logs tool

B.

Network Sniffer Interface Test tool

C.

Ka Log Analyzer tool

D.

Event Log Tracker tool

Buy Now
Question # 31

Logs are the record of the system and network activities. Syslog protocol is used for delivering log information across an IP network. Syslog messages can be sent via which one of the following?

Options:

A.

UDP and TCP

B.

TCP and SMTP

C.

SMTP

D.

UDP and SMTP

Buy Now
Question # 32

In the TCP/IP model, the transport layer is responsible for reliability and flow control from source to the destination. TCP provides the mechanism for flow control by allowing the sending and receiving hosts to communicate.

A flow control mechanism avoids the problem with a transmitting host overflowing the buffers in the receiving host.

Options:

A.

Sliding Windows

B.

Windowing

C.

Positive Acknowledgment with Retransmission (PAR)

D.

Synchronization

Buy Now
Question # 33

A framework is a fundamental structure used to support and resolve complex issues. The framework that delivers an efficient set of technologies in order to develop applications which are more secure in using Internet and Intranet is:

Options:

A.

Microsoft Internet Security Framework

B.

Information System Security Assessment Framework (ISSAF)

C.

Bell Labs Network Security Framework

D.

The IBM Security Framework

Buy Now
Exam Code: 412-79v10
Exam Name: EC-Council Certified Security Analyst (ECSA) V10
Last Update: Jan 31, 2025
Questions: 201
412-79v10 pdf

412-79v10 PDF

$25.5  $84.99
412-79v10 Engine

412-79v10 Testing Engine

$28.5  $94.99
412-79v10 PDF + Engine

412-79v10 PDF + Testing Engine

$40.5  $134.99