EC-Council 412-79 Exam Questions
EC-Council Certified Security Analyst (ECSA) Exam (Page 11 )

Updated On: 2-Mar-2026

Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related.
What organization should Frank submit the log to find out if it is a new vulnerability or not?

  1. CVE
  2. IANA
  3. RIPE
  4. APIPA

Answer(s): A



What is a difference between host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS)?

  1. NIDS are usually a more expensive solution to implement compared to HIDS.
  2. Attempts to install Trojans or backdoors cannot be monitored by a HIDS whereas NIDS can monitor and stop such intrusion events.
  3. NIDS are standalone hardware appliances that include network intrusion detection capabilities whereas HIDS consist of software agents installed on individual computers within the system.
  4. HIDS requires less administration and training compared to NIDS.

Answer(s): C



A chipset is a group of integrated circuits that are designed to work together and are usually marketed as a single product." It is generally the motherboard chips or the chips used on the expansion card.
Which one of the following is well supported in most wireless applications?

  1. Orinoco chipsets
  2. Prism II chipsets
  3. Atheros Chipset
  4. Cisco chipset

Answer(s): B



In the process of hacking a web application, attackers manipulate the HTTP requests to subvert the application authorization schemes by modifying input fields that relate to the user ID, username, access group, cost, file names, file identifiers, etc. They first access the web application using a low privileged account and then escalate privileges to access protected resources.
What attack has been carried out?

  1. XPath Injection Attack
  2. Authorization Attack
  3. Authentication Attack
  4. Frame Injection Attack

Answer(s): B



In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?

  1. IPS evasion technique
  2. IDS evasion technique
  3. UDP evasion technique
  4. TTL evasion technique

Answer(s): D



Viewing page 11 of 42
Viewing questions 51 - 55 out of 204 questions



Post your Comments and Discuss EC-Council 412-79 exam dumps with other Community members:

412-79 Exam Discussions & Posts

AI Tutor