Free EC-Council 412-79V9 Exam Questions (page: 3)

The framework primarily designed to fulfill a methodical and organized way of addressing five threat classes to network and that can be used to access, plan, manage, and maintain secure computers and communication networks is:

  1. Nortells Unified Security Framework
  2. The IBM Security Framework
  3. Bell Labs Network Security Framework
  4. Microsoft Internet Security Framework

Answer(s): C



Identify the policy that defines the standards for the organizational network connectivity and security standards for computers that are connected in the organizational network.

  1. Information-Protection Policy
  2. Special-Access Policy
  3. Remote-Access Policy
  4. Acceptable-Use Policy

Answer(s): C



Which of the following equipment could a pen tester use to perform shoulder surfing?

  1. Binoculars
  2. Painted ultraviolet material
  3. Microphone
  4. All the above

Answer(s): A


Reference:

http://en.wikipedia.org/wiki/Shoulder_surfing_(computer_security)



Which one of the following is a supporting tool for 802.11 (wireless) packet injections, it spoofs 802.11 packets to verify whether the access point is valid or not?

  1. Airsnort
  2. Aircrack
  3. Airpwn
  4. WEPCrack

Answer(s): C



Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?

  1. Threat-Assessment Phase
  2. Pre-Assessment Phase
  3. Assessment Phase
  4. Post-Assessment Phase

Answer(s): B



Before performing the penetration testing, there will be a pre-contract discussion with different pen-testers (the team of penetration testers) to gather a quotation to perform pen testing.



Which of the following factors is NOT considered while preparing a price quote to perform pen testing?

  1. Total number of employees in the client organization
  2. Type of testers involved
  3. The budget required
  4. Expected time required to finish the project

Answer(s): A



A security policy is a document or set of documents that describes, at a high level, the security controls that will be implemented by the company. Which one of the following policies forbids everything and restricts usage of company computers, whether it is system usage or network usage?

  1. Paranoid Policy
  2. Prudent Policy
  3. Promiscuous Policy
  4. Information-Protection Policy

Answer(s): A



Which type of vulnerability assessment tool provides security to the IT system by testing for vulnerabilities in the applications and operation system?

  1. Active/Passive Tools
  2. Application-layer Vulnerability Assessment Tools
  3. Location/Data Examined Tools
  4. Scope Assessment Tools

Answer(s): D


Reference:

http://books.google.com.pk/books?id=7dwEAAAAQBAJ&pg=SA7- PA11&lpg=SA7-
PA11&dq=vulnerability+assessment+tool+provides+security+to+the+IT+system+by+testing +for+vulnerabilities+in+the+applications+and+operation+system&source=bl&ots=SQCLHR nnjI&sig=HpenOheCU4GBOnkA4EurHCMfND4&hl=en&sa=X&ei=DqYfVJCLHMTnyQODn 4C4Cw&ved=0CDQQ6AEwAw#v=onepage&q=vulnerability%20assessment%20tool%20pr ovides%20security%20to%20the%20IT%20system%20by%20testing%20for%20vulnerabili ties%20in%20the%20applications%20and%20operation%20system&f=false






Post your Comments and Discuss EC-Council 412-79V9 exam prep with other Community members:

412-79V9 Exam Discussions & Posts