412-79v10 Dumps

412-79v10 Free Practice Test

EC-Council 412-79v10: EC-Council Certified Security Analyst (ECSA) V10

QUESTION 11

Which type of vulnerability assessment tool provides security to the IT system by testing for vulnerabilities in the applications and operation system?

Correct Answer: D

QUESTION 12

Which of the following protocols cannot be used to filter VoIP traffic?

Correct Answer: D

QUESTION 13

Which of the following policies states that the relevant application owner must authorize requests for additional access to specific business applications in writing to the IT Department/resource?

Correct Answer: B

QUESTION 14

Security auditors determine the use of WAPs on their networks with Nessus vulnerability scanner which identifies the commonly used WAPs.
One of the plug-ins that the Nessus Vulnerability Scanner uses is ID #11026 and is named “Access Point Detection”. This plug-in uses four techniques to identify the presence of a WAP.
Which one of the following techniques is mostly used for uploading new firmware images while upgrading the WAP device?

Correct Answer: C

QUESTION 15

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net
What will this search produce?

Correct Answer: A