EC-Council 412-79 Exam Questions
EC-Council Certified Security Analyst (ECSA) Exam (Page 7 )

Updated On: 2-Mar-2026

Vulnerability assessment is an examination of the ability of a system or application, including current security procedures and controls, to withstand assault. It recognizes, measures, and classifies security vulnerabilities in a computer system, network, and communication channels. A vulnerability assessment is used to identify weaknesses that could be exploited and predict the effectiveness of additional security measures in protecting information resources from attack.



Which of the following vulnerability assessment technique is used to test the web server infrastructure for any misconfiguration and outdated content?

  1. Passive Assessment
  2. Host-based Assessment
  3. External Assessment
  4. Application Assessment

Answer(s): D



You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks.
When assessing the risk to the clients network, what step should you take first?

  1. Analyzing, categorizing and prioritizing resources
  2. Evaluating the existing perimeter and internal security
  3. Checking for a written security policy
  4. Analyzing the use of existing management and control architecture

Answer(s): C



Firewall is an IP packet filter that enforces the filtering and security policies to the flowing network traffic. Using firewalls in IPv6 is still the best way of protection from low level attacks at the network and transport layers.
Which one of the following cannot handle routing protocols properly?

  1. "Internet-router-firewall-net architecture"
  2. "Internet-firewall-router-net architecture"
  3. "Internet-firewall/router(edge device)-net architecture"
  4. "Internet-firewall -net architecture"

Answer(s): B



You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers.
What type of firewall must you implement to abide by this policy?

  1. Circuit-level proxy firewall
  2. Packet filtering firewall
  3. Application-level proxy firewall
  4. Statefull firewall

Answer(s): D



George is a senior security analyst working for a state agency in Florid

  1. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs.
    The state bill requires that an IDS with a "time-based induction machine" be used.
    What IDS feature must George implement to meet this requirement?
  2. Pattern matching
  3. Statistical-based anomaly detection
  4. Real-time anomaly detection
  5. Signature-based anomaly detection

Answer(s): C



Viewing page 7 of 42
Viewing questions 31 - 35 out of 204 questions



Post your Comments and Discuss EC-Council 412-79 exam dumps with other Community members:

412-79 Exam Discussions & Posts

AI Tutor