Free 412-79 Exam Braindumps (page: 11)

Page 10 of 52

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram.
Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs) are identified by a TYPE field. If the destination is not reachable, which one of the following are generated?

  1. Type 8 ICMP codes
  2. Type 12 ICMP codes
  3. Type 3 ICMP codes
  4. Type 7 ICMP codes

Answer(s): C



John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found.
What information will he be able to gather from this?

  1. The SID of Hillary's network account
  2. The network shares that Hillary has permissions
  3. The SAM file from Hillary's computer
  4. Hillary's network username and password hash

Answer(s): D



Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer.
Where should Harold navigate on the computer to find the file?

  1. %systemroot%\LSA
  2. %systemroot%\repair
  3. %systemroot%\system32\drivers\etc
  4. %systemroot%\system32\LSA

Answer(s): B



Which one of the following log analysis tools is a Cisco Router Log Format log analyzer and it parses logs, imports them into a SQL database (or its own built-in database), aggregates them, and generates the dynamically filtered reports, all through a web interface?

  1. Event Log Tracker
  2. Sawmill
  3. Syslog Manager
  4. Event Log Explorer

Answer(s): B






Post your Comments and Discuss EC-Council 412-79 exam with other Community members: