Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Pass 412-79v10 Exam Guide

Page: 3 / 8
Total 201 questions

EC-Council Certified Security Analyst (ECSA) V10 Questions and Answers

Question 9

After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the Restrict Anonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server.

Using User info tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

Options:

A.

Restrict Anonymous must be set to "2" for complete security

B.

Restrict Anonymous must be set to "3" for complete security

C.

There is no way to always prevent an anonymous null session from establishing

D.

Restrict Anonymous must be set to "10" for complete security

Question 10

Security auditors determine the use of WAPs on their networks with Nessus vulnerability scanner which identifies the commonly used WAPs.

One of the plug-ins that the Nessus Vulnerability Scanner uses is ID #11026 and is named “Access Point Detection”. This plug-in uses four techniques to identify the presence of a WAP.

Which one of the following techniques is mostly used for uploading new firmware images while upgrading the WAP device?

Options:

A.

NMAP TCP/IP fingerprinting

B.

HTTP fingerprinting

C.

FTP fingerprinting

D.

SNMP fingerprinting

Question 11

Identify the port numbers used by POP3 and POP3S protocols.

Options:

A.

113 and 981

B.

111 and 982

C.

110 and 995

D.

109 and 973

Question 12

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network.

How would you answer?

Options:

A.

IBM Methodology

B.

LPT Methodology

C.

Google Methodology

D.

Microsoft Methodology

Page: 3 / 8
Total 201 questions