EC-Council 412-79V9 Exam Questions
EC-Council Certified Security Analyst (ECSA) v9 (Page 2 )

Updated On: 15-Feb-2026

TCP/IP model is a framework for the Internet Protocol suite of computer network protocols that defines the communication in an IP-based network. It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.




Which of the following TCP/IP layers selects the best path through the network for packets to travel?

  1. Transport layer
  2. Network Access layer
  3. Internet layer
  4. Application layer

Answer(s): C



Firewall is an IP packet filter that enforces the filtering and security policies to the flowing network traffic. Using firewalls in IPv6 is still the best way of protection from low level attacks at the network and transport layers. Which one of the following cannot handle routing protocols properly?

  1. "Internet-router-firewall-net architecture"
  2. "Internet-firewall-router-net architecture"
  3. "Internet-firewall/router(edge device)-net architecture"
  4. "Internet-firewall -net architecture"

Answer(s): B



Port numbers are used to keep track of different conversations crossing the network at the same time. Both TCP and UDP use port (socket) numbers to pass information to the upper layers. Port numbers have the assigned ranges.



Port numbers above 1024 are considered which one of the following?

  1. Dynamically assigned port numbers
  2. Statically assigned port numbers
  3. Well-known port numbers
  4. Unregistered port numbers

Answer(s): A


Reference:

http://stackoverflow.com/questions/136709/what-port-number-should-i-use- when-testing-connections-in-my-local-intranet-in (see post 4)



This is a group of people hired to give details of the vulnerabilities present in the system found after a penetration test. They are elite and extremely competent penetration testers and intrusion analysts. This team prepares a report on the vulnerabilities in the system, attack methods, and how to defend against them.



What is this team called?

  1. Blue team
  2. Tiger team
  3. Gorilla team
  4. Lion team

Answer(s): B



You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks. When assessing the risk to the clients network, what step should you take first?

  1. Analyzing, categorizing and prioritizing resources
  2. Evaluating the existing perimeter and internal security
  3. Checking for a written security policy
  4. Analyzing the use of existing management and control architecture

Answer(s): C






Post your Comments and Discuss EC-Council 412-79V9 exam dumps with other Community members:

Join the 412-79V9 Discussion