Free 412-79 Exam Braindumps (page: 8)

Page 7 of 52

In the context of penetration testing, what does blue teaming mean?

  1. A penetration test performed with the knowledge and consent of the organization's IT staff
  2. It is the most expensive and most widely used
  3. It may be conducted with or without warning
  4. A penetration test performed without the knowledge of the organization's IT staff but with permission from upper management

Answer(s): A



Vulnerability assessment is an examination of the ability of a system or application, including current security procedures and controls, to withstand assault. It recognizes, measures, and classifies security vulnerabilities in a computer system, network, and communication channels. A vulnerability assessment is used to identify weaknesses that could be exploited and predict the effectiveness of additional security measures in protecting information resources from attack.



Which of the following vulnerability assessment technique is used to test the web server infrastructure for any misconfiguration and outdated content?

  1. Passive Assessment
  2. Host-based Assessment
  3. External Assessment
  4. Application Assessment

Answer(s): D



You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks.
When assessing the risk to the clients network, what step should you take first?

  1. Analyzing, categorizing and prioritizing resources
  2. Evaluating the existing perimeter and internal security
  3. Checking for a written security policy
  4. Analyzing the use of existing management and control architecture

Answer(s): C



Firewall is an IP packet filter that enforces the filtering and security policies to the flowing network traffic. Using firewalls in IPv6 is still the best way of protection from low level attacks at the network and transport layers.
Which one of the following cannot handle routing protocols properly?

  1. "Internet-router-firewall-net architecture"
  2. "Internet-firewall-router-net architecture"
  3. "Internet-firewall/router(edge device)-net architecture"
  4. "Internet-firewall -net architecture"

Answer(s): B






Post your Comments and Discuss EC-Council 412-79 exam with other Community members: