EC-Council 412-79 Exam Questions
EC-Council Certified Security Analyst (ECSA) Exam (Page 3 )

Updated On: 2-Mar-2026

A penetration test will show you the vulnerabilities in the target system and the risks associated with it. An educated valuation of the risk will be performed so that the vulnerabilities can be reported as High/Medium/Low risk issues.



What are the two types of `white-box' penetration testing?

  1. Announced testing and blind testing
  2. Blind testing and double blind testing
  3. Blind testing and unannounced testing
  4. Announced testing and unannounced testing

Answer(s): D



The objective of social engineering pen testing is to test the strength of human factors in a security chain within the organization. It is often used to raise the level of security awareness among employees.



The tester should demonstrate extreme care and professionalism during a social engineering pen test as it might involve legal issues such as violation of privacy and may result in an embarrassing situation for the organization.

Which of the following methods of attempting social engineering is associated with bribing, handing out gifts, and becoming involved in a personal relationship to befriend someone inside the company?

  1. Accomplice social engineering technique
  2. Identity theft
  3. Dumpster diving
  4. Phishing social engineering technique

Answer(s): A



What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?

  1. Server Side Includes
  2. Sort Server Includes
  3. Server Sort Includes
  4. Slide Server Includes

Answer(s): A



During the process of fingerprinting a web application environment, what do you need to do in order to analyze HTTP and HTTPS request headers and the HTML source code?

  1. Examine Source of the Available Pages
  2. Perform Web Spidering
  3. Perform Banner Grabbing
  4. Check the HTTP and HTML Processing by the Browser

Answer(s): D



After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts responds to your ICMP pings; definitely not the number of hosts you were expecting.
Why did this ping sweep only produce a few responses?

  1. A switched network will not respond to packets sent to the broadcast address
  2. Only IBM AS/400 will reply to this scan
  3. Only Unix and Unix-like systems will reply to this scan
  4. Only Windows systems will reply to this scan

Answer(s): C



Viewing page 3 of 42
Viewing questions 11 - 15 out of 204 questions



Post your Comments and Discuss EC-Council 412-79 exam dumps with other Community members:

412-79 Exam Discussions & Posts

AI Tutor