EC-COUNCIL EC-Council Certified Security Analyst (ECSA) 認定 412-79v8 試験問題:
1. Traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. It sends a sequence of three Internet Control Message Protocol (ICMP) echo request packets addressed to a destination host.
The time-to-live (TTL) value, also known as hop limit, is used in determining the intermediate routers being traversed towards the destination.
During routing, each router reduces packets' TTL value by
A) Reference:http://www.packetu.com/2009/10/09/traceroute-through-the-asa/
QUESTIONNO: 90
Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?
A. Hash Key Length
B. C/R Value Length
C. C/R Key Length
D. Hash Value Length
B) 4
C) 1
D) 2
E) 3
2. One of the steps in information gathering is to run searches on a company using complex keywords in Google.
Which search keywords would you use in the Google search engine to find all the PowerPoint presentations containing information about a target company, ROCHESTON?
A) ROCHESTON fileformat:+ppt
B) ROCHESTON ppt:filestring
C) ROCHESTON filetype:ppt
D) ROCHESTON +ppt:filesearch
3. Which type of security policy applies to the below configuration? i)Provides maximum security while allowing known, but necessary, dangers ii)All services are blocked; nothing is allowed iii)Safe and necessary services are enabled individually iv)Non-essential services and procedures that cannot be made safe are NOT allowed v)Everything is logged
A) Promiscuous Policy
B) Permissive Policy
C) Paranoid Policy
D) Prudent Policy
4. Identify the policy that defines the standards for the organizational network connectivity and security standards for computers that are connected in the organizational network.
A) Remote-Access Policy
B) Special-AccessPolicy
C) Information-Protection Policy
D) Acceptable-Use Policy
5. Variables are used to define parameters for detection, specifically those of your local network and/or specific servers or ports for inclusion or exclusion in rules. These are simple substitution variables set with the var keyword. Which one of the following operator is used to define metavariables?
A) "?"
B) "$"
C) "*"
D) "#"
質問と回答:
質問 # 1 正解: C | 質問 # 2 正解: C | 質問 # 3 正解: D | 質問 # 4 正解: A | 質問 # 5 正解: B |