Free 412-79 Exam Braindumps (page: 9)

Page 8 of 52

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers.
What type of firewall must you implement to abide by this policy?

  1. Circuit-level proxy firewall
  2. Packet filtering firewall
  3. Application-level proxy firewall
  4. Statefull firewall

Answer(s): D



George is a senior security analyst working for a state agency in Florid

  1. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs.
    The state bill requires that an IDS with a "time-based induction machine" be used.
    What IDS feature must George implement to meet this requirement?
  2. Pattern matching
  3. Statistical-based anomaly detection
  4. Real-time anomaly detection
  5. Signature-based anomaly detection

Answer(s): C



Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related.
What organization should Frank submit the log to find out if it is a new vulnerability or not?

  1. CVE
  2. IANA
  3. RIPE
  4. APIPA

Answer(s): A



What is a difference between host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS)?

  1. NIDS are usually a more expensive solution to implement compared to HIDS.
  2. Attempts to install Trojans or backdoors cannot be monitored by a HIDS whereas NIDS can monitor and stop such intrusion events.
  3. NIDS are standalone hardware appliances that include network intrusion detection capabilities whereas HIDS consist of software agents installed on individual computers within the system.
  4. HIDS requires less administration and training compared to NIDS.

Answer(s): C






Post your Comments and Discuss EC-Council 412-79 exam with other Community members: