Free 412-79 Exam Braindumps (page: 4)

Page 4 of 52

During the process of fingerprinting a web application environment, what do you need to do in order to analyze HTTP and HTTPS request headers and the HTML source code?

  1. Examine Source of the Available Pages
  2. Perform Web Spidering
  3. Perform Banner Grabbing
  4. Check the HTTP and HTML Processing by the Browser

Answer(s): D



After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts responds to your ICMP pings; definitely not the number of hosts you were expecting.
Why did this ping sweep only produce a few responses?

  1. A switched network will not respond to packets sent to the broadcast address
  2. Only IBM AS/400 will reply to this scan
  3. Only Unix and Unix-like systems will reply to this scan
  4. Only Windows systems will reply to this scan

Answer(s): C



Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?

  1. Client-Side Test Report
  2. Activity Report
  3. Host Report
  4. Vulnerability Report

Answer(s): A



The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU.
The value of the MTU depends on the type of the transmission link. The design of IP accommodates

MTU differences by allowing routers to fragment IP datagrams as necessary. The receiving station is responsible for reassembling the fragments back into the original full size IP datagram. IP fragmentation involves breaking a datagram into a number of pieces that can be reassembled later. The IP source, destination, identification, total length, and fragment offset fields in the IP header, are used for IP fragmentation and reassembly.



The fragment offset is 13 bits and indicates where a fragment belongs in the original IP datagram.
This value is a:

  1. Multiple of four bytes
  2. Multiple of two bytes
  3. Multiple of eight bytes
  4. Multiple of six bytes

Answer(s): C






Post your Comments and Discuss EC-Council 412-79 exam with other Community members:

412-79 Exam Discussions & Posts