Free 412-79 Exam Braindumps (page: 3)

Page 3 of 52

Which of the following methods is used to perform server discovery?

  1. Banner Grabbing
  2. Who is Lookup
  3. SQL Injection
  4. Session Hijacking

Answer(s): B



A penetration test will show you the vulnerabilities in the target system and the risks associated with it. An educated valuation of the risk will be performed so that the vulnerabilities can be reported as High/Medium/Low risk issues.



What are the two types of `white-box' penetration testing?

  1. Announced testing and blind testing
  2. Blind testing and double blind testing
  3. Blind testing and unannounced testing
  4. Announced testing and unannounced testing

Answer(s): D



The objective of social engineering pen testing is to test the strength of human factors in a security chain within the organization. It is often used to raise the level of security awareness among employees.



The tester should demonstrate extreme care and professionalism during a social engineering pen test as it might involve legal issues such as violation of privacy and may result in an embarrassing situation for the organization.

Which of the following methods of attempting social engineering is associated with bribing, handing out gifts, and becoming involved in a personal relationship to befriend someone inside the company?

  1. Accomplice social engineering technique
  2. Identity theft
  3. Dumpster diving
  4. Phishing social engineering technique

Answer(s): A



What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?

  1. Server Side Includes
  2. Sort Server Includes
  3. Server Sort Includes
  4. Slide Server Includes

Answer(s): A






Post your Comments and Discuss EC-Council 412-79 exam with other Community members:

412-79 Exam Discussions & Posts