Free EC-Council 412-79V9 Exam Questions (page: 4)

The term social engineering is used to describe the various tricks used to fool people (employees, business partners, or customers) into voluntarily giving away information that would not normally be known to the general public.



What is the criminal practice of social engineering where an attacker uses the telephone system in an attempt to scam the user into surrendering private information?

  1. Phishing
  2. Spoofing
  3. Tapping
  4. Vishing

Answer(s): D



Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.



What characteristics do phishing messages often have that may make them identifiable?

  1. Invalid email signatures or contact information
  2. Suspiciously good grammar and capitalization
  3. They trigger warning pop-ups
  4. Suspicious attachments

Answer(s): C



Information gathering is performed to:

i). Collect basic information about the target company and its network
ii). Determine the operating system used, platforms running, web server versions, etc.
iii). Find vulnerabilities and exploits



Which of the following pen testing tests yields information about a company's technology infrastructure?

  1. Searching for web page posting patterns
  2. Analyzing the link popularity of the company's website
  3. Searching for trade association directories
  4. Searching for a company's job postings

Answer(s): D



Passwords protect computer resources and files from unauthorized access by malicious users. Using passwords is the most capable and effective way to protect information and to increase the security level of a company.
Password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system to gain unauthorized access to a system.



Which of the following password cracking attacks tries every combination of characters until the password is broken?

  1. Brute-force attack
  2. Rule-based attack
  3. Hybrid attack
  4. Dictionary attack

Answer(s): A


Reference:

http://books.google.com.pk/books?id=m2qZNW4dcyIC&pg=PA237&lpg=PA237&dq=passw ord+cracking+attacks+tries+every+combination+of+characters+until+the+password+is+bro ken&source=bl&ots=RKEUUo6LYj&sig=MPEfFBEpoO0yvOwMxYCoPQuqM5g&hl=en&sa= X&ei=ZdwdVJm3CoXSaPXsgPgM&ved=0CCEQ6AEwAQ#v=onepage&q=password%20cr acking%20attacks%20tries%20every%20combination%20of%20characters%20until%20th e%20password%20is%20broken&f=false



What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

  1. Connect Scanning Techniques
  2. SYN Scanning Techniques
  3. Stealth Scanning Techniques
  4. Port Scanning Techniques

Answer(s): C


Reference:

http://wwww.pc-
freak.net/tutorials/hacking_info/arkin%20network%20scanning%20techniques.pdf (page 7



What are the 6 core concepts in IT security?

  1. Server management, website domains, firewalls, IDS, IPS, and auditing
  2. Authentication, authorization, confidentiality, integrity, availability, and non-repudiation
  3. Passwords, logins, access controls, restricted domains, configurations, and tunnels
  4. Biometrics, cloud security, social engineering, DoS attack, viruses, and Trojans

Answer(s): B



TCP/IP provides a broad range of communication protocols for the various applications on the network. The TCP/IP model has four layers with major protocols included within each layer. Which one of the following protocols is used to collect information from all the network devices?

  1. Simple Network Management Protocol (SNMP)
  2. Network File system (NFS)
  3. Internet Control Message Protocol (ICMP)
  4. Transmission Control Protocol (TCP)

Answer(s): A



Which of the following statement holds true for TCP Operation?

  1. Port numbers are used to know which application the receiving host should pass the data to
  2. Sequence numbers are used to track the number of packets lost in transmission
  3. Flow control shows the trend of a transmitting host overflowing the buffers in the receiving host
  4. Data transfer begins even before the connection is established

Answer(s): D






Post your Comments and Discuss EC-Council 412-79V9 exam prep with other Community members:

412-79V9 Exam Discussions & Posts