EC-Council 412-79V9 Exam Questions
EC-Council Certified Security Analyst (ECSA) v9 (Page 5 )

Updated On: 16-Feb-2026

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs) are identified by a TYPE field. If the destination is not reachable, which one of the following are generated?

  1. Type 8 ICMP codes
  2. Type 12 ICMP codes
  3. Type 3 ICMP codes
  4. Type 7 ICMP codes

Answer(s): C



You are conducting a penetration test against a company and you would like to know a personal email address of John, a crucial employee. What is the fastest, cheapest way to find out John's email address.

  1. Call his wife and ask for his personal email account
  2. Call a receptionist and ask for John Stevens' personal email account
  3. Search in Google for his personal email ID
  4. Send an email to John stating that you cannot send him an important spreadsheet attachment file to his business email account and ask him if he has any other email accounts

Answer(s): D



NTP protocol is used to synchronize the system clocks of computers with a remote time server or time source over a network. Which one of the following ports is used by NTP as its transport layer?

  1. TCP port 152
  2. UDP port 177
  3. UDP port 123
  4. TCP port 113

Answer(s): C



A framework is a fundamental structure used to support and resolve complex issues. The framework that delivers an efficient set of technologies in order to develop applications which are more secure in using Internet and Intranet is:

  1. Microsoft Internet Security Framework
  2. Information System Security Assessment Framework (ISSAF)
  3. Bell Labs Network Security Framework
  4. The IBM Security Framework

Answer(s): A



In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?

  1. IPS evasion technique
  2. IDS evasion technique
  3. UDP evasion technique
  4. TTL evasion technique

Answer(s): D


Reference:

http://is.muni.cz/th/172999/fi_m/MT_Bukac.pdf (page 24)






Post your Comments and Discuss EC-Council 412-79V9 exam dumps with other Community members:

Join the 412-79V9 Discussion