ずっと自分自身を向上させたいあなたは、412-79認定試験を受験する予定があるのですか。もし受験したいなら、試験の準備をどのようにするつもりですか。もしかして、自分に相応しい試験参考書を見つけたのでしょうか。では、どんな参考書は選べる価値を持っていますか。あなたが選んだのは、IT-Passports.comの412-79問題集ですか。もしそうだったら、もう試験に合格できないなどのことを心配する必要がないのです。
IT-Passports.comの412-79問題集には、PDF版およびソフトウェア版のバージョンがあります。それはあなたに最大の利便性を与えることができます。いつでもどこでも問題を学ぶことができるために、あなたはPDF版の問題集をダウンロードしてプリントアウトすることができます。そして、ソフトウェア版の412-79問題集は実際試験の雰囲気を感じさせることができます。そうすると、受験するとき、あなたは試験を容易に対処することができます。
試験番号:412-79問題集
試験科目:EC-COUNCIL 「EC-Council Certified Security Analyst (ECSA)」
問題と解答:全74問
EC-COUNCILの412-79認定試験に受かりたいのなら、適切なトレーニングツールを選択する必要があります。EC-COUNCILの412-79認定試験に関する研究資料が重要な一部です。我々IT-Passports.comはEC-COUNCILの412-79認定試験に対する効果的な資料を提供できます。IT-Passports.comのIT専門家は全員が実力と豊富な経験を持っているのですから、彼らが研究した材料は実際の試験問題と殆ど同じです。IT-Passports.comは特別に受験生に便宜を提供するためのサイトで、受験生が首尾よく試験に合格することを助けられます。
IT-Passports.comというサイトには全的な資源とEC-COUNCILの412-79の試験問題があります。それに、EC-COUNCILの412-79の試験の実践経験やテストダンプにも含まれています。IT-Passports.comは受験生たちを助けて試験の準備をして、試験に合格するサイトですから、受験生のトレーニングにいろいろな便利を差し上げます。あなたは一部の試用問題と解答を無料にダウンロードすることができます。IT-Passports.comのEC-COUNCILの412-79の試験中に絶対な方法で転送することでなく、IT-Passports.comは真実かつ全面的な試験問題と解答を提供していますから、当社がオンラインするユニークなのEC-COUNCILの412-79の試験トレーニング資料を利用したら、あなたが気楽に試験に合格することができるようになります。IT-Passports.comは合格率が100パーセントということを保証します。
412-79試験は簡単ではありません。専門的な知識が必要で、もしあなたはまだこの方面の知識を欠かれば、IT-Passports.comは君に向ける知識を提供いたします。IT-Passports.comの専門家チームは彼らの知識や経験を利用してあなたの知識を広めることを助けています。そしてあなたに412-79試験に関するテスト問題と解答が分析して差し上げるうちにあなたのIT専門知識を固めています。
IT-Passports.comは専門的な、受験生の皆さんを対象とした最も先進的なEC-COUNCILの412-79試験の認証資料を提供しているサイトです。IT-Passports.comを利用したら、EC-COUNCILの412-79試験に合格するのを心配することはないです。
今は時間がそんなに重要な社会でもっとも少ないお時間を使って試験に合格するのは一番よいだと思います。IT-Passports.comが短期な訓練を提供し、一回に君の試験に合格させることができます。
購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.it-passports.com/412-79.html
NO.1 .After attending a CEH security seminar, you make a list of changes you would like to perform on your
network to increase its security. One of the first things you change is to switch the RestrictAnonymous
setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from
establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in
establishing a null session with one of the servers. Why is that?
A. RestrictAnonymous must be set to "2" for complete security
B. RestrictAnonymous must be set to "3" for complete security
C. There is no way to always prevent an anonymous null session from establishing
D. RestrictAnonymous must be set to "10" for complete security
Answer: A
EC-COUNCIL 412-79認証試験 412-79認証試験 412-79問題集 412-79
NO.2 .You are carrying out the last round of testing for your new website before it goes live. The website has
many dynamic pages and connects to a SQL backend that accesses your product inventory in a database.
You come across a web security site that recommends inputting the following code into a search field on
web pages to check for vulnerabilities:
This is a test
When you type this and click on search, you receive a pop-up window that says:
"This is a test."
What is the result of this test?
A. Your website is vulnerable to web bugs
B. Your website is vulnerable to CSS
C. Your website is not vulnerable
D. Your website is vulnerable to SQL injection
Answer: B
EC-COUNCIL 412-79認定証 412-79練習問題
NO.3 .You are running known exploits against your network to test for possible vulnerabilities. To test the
strength of your virus software, you load a test network to mimic your production network. Your software
successfully blocks some simple macro and encrypted viruses. You decide to really test the software by
using virus code where the code rewrites itself entirely and the signatures change
6 from child to child, but the functionality stays the same. What type of virus is this that you are testing?
A. Metamorphic
B. Oligomorhic
C. Polymorphic
D. Transmorphic
Answer: A
EC-COUNCIL認定資格 412-79認証試験 412-79 412-79認定資格 412-79
NO.4 .Your company uses Cisco routers exclusively throughout the network. After securing the routers to
the best of your knowledge, an outside security firm is brought in to assess the network security. Although
they found very few issues, they were able to enumerate the model, OS version, and capabilities for all
your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate
this information on your Cisco routers?
A. Simple Network Management Protocol
B. Broadcast System Protocol
C. Cisco Discovery Protocol
D. Border Gateway Protocol
Answer: C
EC-COUNCIL 412-79 412-79認定資格 412-79過去問
NO.5 George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities
of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a
scanner like Nessus is not recommended in this situation?
A. Nessus is too loud
B. There are no ways of performing a "stealthy" wireless scan
C. Nessus cannot perform wireless testing
D. Nessus is not a network scanner
Answer: A
EC-COUNCIL 412-79練習問題 412-79参考書
NO.6 .George is the network administrator of a large Internet company on the west coast. Per corporate
policy, none of the employees in the company are allowed to use FTP or SFTP programs without
obtaining approval from the IT department. Few managers are using SFTP program on their computers.
Before talking to his boss, George wants to have some proof of their activity.
George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?
A. net port 22
B. udp port 22 and host 172.16.28.1/24
C. src port 22 anddst port 22
D. src port 23 anddst port 23
Answer: C
EC-COUNCIL問題集 412-79 412-79認定試験
NO.7 .Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers are constantly talking
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers will not respond to idle scans
Answer: A
EC-COUNCIL過去問 412-79 412-79問題集 412-79認定資格 412-79
NO.8 .What will the following command accomplish?
A. Test ability of a router to handle over-sized packets
B. Test the ability of a router to handle fragmented packets
C. Test the ability of a WLAN to handle fragmented packets
D. Test the ability of a router to handle under-sized packets
Answer: A
EC-COUNCIL認定資格 412-79認定証 412-79過去問 412-79認定試験 412-79認定資格
NO.9 .At what layer of the OSI model do routers function on?
A. 3
B. 4
C. 5
D. 1
Answer: A
EC-COUNCIL 412-79 412-79 412-79 412-79
NO.10 .What operating system would respond to the following command?
A. Mac OS X
B. Windows XP
C. Windows 95
D. FreeBSD
Answer: D
EC-COUNCIL 412-79練習問題 412-79過去問 412-79 412-79認証試験
NO.11 .What are the security risks of running a "repair" installation for Windows XP?
A. There are no security risks when running the "repair" installation for Windows XP
B. Pressing Shift+F1gives the user administrative rights
C. Pressing Ctrl+F10 gives the user administrative rights
D. Pressing Shift+F10 gives the user administrative rights
Answer: D
EC-COUNCIL認定試験 412-79認定証 412-79
NO.12 .You are assisting a Department of Defense contract company to become compliant with the stringent
security policies set by the DoD. One such strict rule is that firewalls must only allow incoming
connections that were first initiated by internal computers. What type of firewall must you implement to
abide by this policy?
A. Circuit-level proxy firewall
B. Packet filtering firewall
C. Application-level proxy firewall
D. Statefull firewall
Answer: D
EC-COUNCIL 412-79 412-79練習問題 412-79認定資格 412-79
NO.13 .Your company's network just finished going through a SAS 70 audit. This audit reported that overall,
your network is secure, but there are some areas that needs improvement. The major area was SNMP
security. The audit company recommended turning off SNMP, but that is not an option since you have so
many remote nodes to keep track of. What step could you take to help secure SNMP on your network?
A. Change the default community string names
B. Block all internal MAC address from using SNMP
C. Block access to UDP port 171
D. Block access to TCP port 171
Answer: A
EC-COUNCIL 412-79認証試験 412-79 412-79
NO.14 .How many bits is Source Port Number in TCP Header packet?
A. 48
B. 32
C. 64
D. 16
Answer: D
EC-COUNCIL 412-79 412-79認定試験 412-79 412-79 412-79過去問
NO.15 .What is the following command trying to accomplish?
A. Verify that NETBIOS is running for the 192.168.0.0 network
B. Verify that TCP port 445 is open for the 192.168.0.0 network
C. Verify that UDP port 445 is open for the 192.168.0.0 network
D. Verify that UDP port 445 is closed for the 192.168.0.0 network
Answer: C
EC-COUNCIL認定試験 412-79 412-79認証試験 412-79認証試験 412-79
NO.16 .Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to
hack into his former company's network. Since Simon remembers some of the server names, he attempts
to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?
A. Enumerate all the users in the domain
B. Perform DNS poisoning
C. Send DOS commands to crash the DNS servers
D. Perform a zone transfer
Answer: D
EC-COUNCIL 412-79 412-79認定試験 412-79 412-79練習問題
NO.17 .You are the security analyst working for a private company out of France. Your current assignment is
to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance,
you discover that the bank security defenses are very strong and would take too long to penetrate. You
decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in
London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You
want to sniff the traffic and extract usernames and passwords. What tool could you use to get this
information?
A. RaidSniff
B. Snort
C. Ettercap
D. Airsnort
Answer: C
EC-COUNCIL認証試験 412-79 412-79 412-79練習問題
NO.18 .An "idle" system is also referred to as what?
A. Zombie
B. PC not being used
C. Bot
D. PC not connected to the Internet
Answer: A
EC-COUNCIL 412-79認定証 412-79参考書 412-79 412-79認定資格
NO.19 .In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers
to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down
the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to
the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts
itself down. What will the other routers communicate between themselves?
A. More RESET packets to the affected router to get it to power back up
B. RESTART packets to the affected router to get it to power back up
C. The change in the routing fabric to bypass the affected router
D. STOP packets to all other routers warning of where the attack originated
Answer: C
EC-COUNCIL過去問 412-79認定証 412-79認定証 412-79
NO.20 .Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers will not respond to idle scans
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers are constantly talking
Answer: D
EC-COUNCIL問題集 412-79認定試験 412-79 412-79参考書
IT-Passports.comの商品を使用したあとのひとはIT-Passports.comの商品がIT関連認定試験に対して役に立つとフィードバックします。弊社が提供した商品を利用すると試験にたやすく合格しました。EC-COUNCILの412-79認証試験に関する訓練は対応性のテストで君を助けることができて、試験の前に十分の準備をさしあげます。
没有评论:
发表评论