Free EC-Council 412-79V9 Exam Questions (page: 2)

TCP/IP model is a framework for the Internet Protocol suite of computer network protocols that defines the communication in an IP-based network. It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.




Which of the following TCP/IP layers selects the best path through the network for packets to travel?

  1. Transport layer
  2. Network Access layer
  3. Internet layer
  4. Application layer

Answer(s): C



A Demilitarized Zone (DMZ) is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. Usage of a protocol within a DMZ environment is highly variable based on the specific needs of an organization. Privilege escalation, system is compromised when the code runs under root credentials, and DoS attacks are the basic weakness of which one of the following Protocol?

  1. Lightweight Directory Access Protocol (LDAP)
  2. Simple Network Management Protocol (SNMP)
  3. Telnet
  4. Secure Shell (SSH)

Answer(s): D



Which of the following is not a condition specified by Hamel and Prahalad (1990)?

  1. Core competency should be aimed at protecting company interests
  2. Core competency is hard for competitors to imitate
  3. Core competency provides customer benefits
  4. Core competency can be leveraged widely to many products and markets

Answer(s): A


Reference:

http://www.studymode.com/essays/Hamel-Prahalad-Core-Competency- 1228370.html



An automated electronic mail message from a mail system which indicates that the user does not exist on that server is called as?

  1. SMTP Queue Bouncing
  2. SMTP Message Bouncing
  3. SMTP Server Bouncing
  4. SMTP Mail Bouncing

Answer(s): D


Reference:

http://en.wikipedia.org/wiki/Bounce_message



Timing is an element of port-scanning that can catch one unaware. If scans are taking too long to complete or obvious ports are missing from the scan, various time parameters may need to be adjusted. Which one of the following scanned timing options in NMAP's scan is useful across slow WAN links or to hide the scan?

  1. Paranoid
  2. Sneaky
  3. Polite
  4. Normal

Answer(s): C



Security auditors determine the use of WAPs on their networks with Nessus vulnerability scanner which identifies the commonly used WAPs. One of the plug-ins that the Nessus Vulnerability Scanner uses is ID #11026 and is named "Access Point Detection". This plug- in uses four techniques to identify the presence of a WAP. Which one of the following techniques is mostly used for uploading new firmware images while upgrading the WAP device?

  1. NMAP TCP/IP fingerprinting
  2. HTTP fingerprinting
  3. FTP fingerprinting
  4. SNMP fingerprinting

Answer(s): C



Which of the following has an offset field that specifies the length of the header and data?

  1. IP Header
  2. UDP Header
  3. ICMP Header
  4. TCP Header

Answer(s): D



A firewall's decision to forward or reject traffic in network filtering is dependent upon which of the following?

  1. Destination address
  2. Port numbers
  3. Source address
  4. Protocol used

Answer(s): D


Reference:

http://www.vicomsoft.com/learning-center/firewalls/ (what does a firewall do)






Post your Comments and Discuss EC-Council 412-79V9 exam prep with other Community members:

412-79V9 Exam Discussions & Posts