EC-Council 412-79 Exam Questions
EC-Council Certified Security Analyst (ECSA) Exam (Page 4 )

Updated On: 2-Mar-2026

Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?

  1. Client-Side Test Report
  2. Activity Report
  3. Host Report
  4. Vulnerability Report

Answer(s): A



The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 64K, most transmission links enforce a smaller maximum packet length limit, called a MTU.
The value of the MTU depends on the type of the transmission link. The design of IP accommodates

MTU differences by allowing routers to fragment IP datagrams as necessary. The receiving station is responsible for reassembling the fragments back into the original full size IP datagram. IP fragmentation involves breaking a datagram into a number of pieces that can be reassembled later. The IP source, destination, identification, total length, and fragment offset fields in the IP header, are used for IP fragmentation and reassembly.



The fragment offset is 13 bits and indicates where a fragment belongs in the original IP datagram.
This value is a:

  1. Multiple of four bytes
  2. Multiple of two bytes
  3. Multiple of eight bytes
  4. Multiple of six bytes

Answer(s): C



The Web parameter tampering attack is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials and permissions, price and quantity of products, etc.

Usually, this information is stored in cookies, hidden form fields, or URL Query Strings, and is used to increase application functionality and control. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag in a form or a parameter in a URL) as the only security measure for certain operations.
Attackers can easily modify these parameters to bypass the security mechanisms that rely on them.



What is the best way to protect web applications from parameter tampering attacks?

  1. Validating some parameters of the web application
  2. Minimizing the allowable length of parameters
  3. Using an easily guessable hashing algorithm
  4. Applying effective input field filtering parameters

Answer(s): D



Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and it works well for direct scanning and often works well through firewalls?

  1. SYN Scan
  2. Connect() scan
  3. XMAS Scan
  4. Null Scan

Answer(s): A



The first and foremost step for a penetration test is information gathering. The main objective of this test is to gather information about the target system which can be used in a malicious manner to gain access to the target systems.



Which of the following information gathering terminologies refers to gathering information through social engineering on-site visits, face-to-face interviews, and direct questionnaires?

  1. Active Information Gathering
  2. Pseudonymous Information Gathering
  3. Anonymous Information Gathering
  4. Open Source or Passive Information Gathering

Answer(s): A



Viewing page 4 of 42
Viewing questions 16 - 20 out of 204 questions



Post your Comments and Discuss EC-Council 412-79 exam dumps with other Community members:

412-79 Exam Discussions & Posts

AI Tutor