Free 412-79 Exam Braindumps (page: 13)

Page 12 of 52

Identify the person who will lead the penetration-testing project and be the client point of contact.

  1. Database Penetration Tester
  2. Policy Penetration Tester
  3. Chief Penetration Tester
  4. Application Penetration Tester

Answer(s): C



ARP spoofing is a technique whereby an attacker sends fake ("spoofed") Address Resolution Protocol (ARP) messages onto a Local Area Network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host (such as the default gateway), causing any traffic meant for that IP address to be sent to the attacker instead. ARP spoofing attack is used as an opening for other attacks.



What type of attack would you launch after successfully deploying ARP spoofing?

  1. Parameter Filtering
  2. Social Engineering
  3. Input Validation
  4. Session Hijacking

Answer(s): D



Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?

  1. AES
  2. DES (ECB mode)
  3. MD5
  4. RC5

Answer(s): C



Which of the following will not handle routing protocols properly?

  1. "Internet-router-firewall-net architecture"
  2. "Internet-firewall-router-net architecture"
  3. "Internet-firewall -net architecture"
  4. "Internet-firewall/router(edge device)-net architecture"

Answer(s): B






Post your Comments and Discuss EC-Council 412-79 exam with other Community members: