EC-Council Certified Security Analyst (ECSA) Exam
412-79 Exam

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their
computers. Before talking to his boss, George wants to have some proof of their activity.
George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network. What filter should George use in Ethereal?

  1. net port 22
  2. udp port 22 and host 172.16.28.1/24
  3. src port 22 and dst port 22
  4. src port 23 and dst port 23

Answer(s): C



You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?

  1. Circuit-level proxy firewall
  2. Packet filtering firewall
  3. Application-level proxy firewall
  4. Statefull firewall

Answer(s): D



You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

  1. Metamorphic
  2. Oligomorhic
  3. Polymorphic
  4. Transmorphic

Answer(s): A



In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

  1. More RESET packets to the affected router to get it to power back up
  2. RESTART packets to the affected router to get it to power back up
  3. The change in the routing fabric to bypass the affected router
  4. STOP packets to all other routers warning of where the attack originated

Answer(s): C




Cisco Engineer
I have found that your resources are probably the best on the market...and I work at Cisco.
- UNITED STATES
Upvote


Koshani
A well Good morning Dear braindumpgalaxy.com Team I wanna say that I passed the 000-888 yesterday and i am happy
- UNITED STATES
Upvote


Aized
I took the A+ hardware exam yesterday and thanks to your excellent and helping preparation material. I got a nice score.
- Pakistan
Upvote


Nazanin
I passed the exam with great distinction!
- CANADA
Upvote


Xiwan W
Great Price....Great Product. Keep up the good work!
- China
Upvote


Ashwin
So far your practice exams are extremely helpful. My test scores keep on going up every time I do them and I feel very confident now.
- India
Upvote


Mike M
The exams was excellent and helped me pass without any doubt.Very helpful! Thank you! I passed!
- UNITED ARAB EMIRATES
Upvote


Smart one
You guys rock. I just passed my 920-139 exam with 929 marks. Thanks for accurate & descriptive question bank.
- UK
Upvote


C J
Just to let you know, I passed my exam. Thank you,
- Mexico
Upvote


Mr. P
I just have to say a big thank you to you guys... i passed 70-552 exams with 896. You guys are the bomb! Keep the faith and the flag of being good. A big thank you once again.(10Q ALL).
- GERMANY
Upvote

Read more ...