EC-Council 412-79V9 Exam Questions
EC-Council Certified Security Analyst (ECSA) v9 (Page 7 )

Updated On: 16-Feb-2026

Which of the following methods is used to perform server discovery?

  1. Banner Grabbing
  2. Whois Lookup
  3. SQL Injection
  4. Session Hijacking

Answer(s): B


Reference:

http://luizfirmino.blogspot.com/2011/09/server-discovery.html



In Linux, /etc/shadow file stores the real password in encrypted format for user's account with added properties associated with the user's password.



In the example of a /etc/shadow file below, what does the bold letter string indicate?
Vivek: $1$fnffc$GteyHdicpGOfffXX40w#5:13064:0:99999:7

  1. Number of days the user is warned before the expiration date
  2. Minimum number of days required between password changes
  3. Maximum number of days the password is valid
  4. Last password changed

Answer(s): B


Reference:

http://www.cyberciti.biz/faq/understanding-etcshadow-file/ (bullet # 4)



Why is a legal agreement important to have before launching a penetration test?

  1. Guarantees your consultant fees
  2. Allows you to perform a penetration test without the knowledge and consent of the organization's upper management
  3. It establishes the legality of the penetration test by documenting the scope of the project and the consent of the company.
  4. It is important to ensure that the target organization has implemented mandatory security policies

Answer(s): C



Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?

  1. Hash Key Length
  2. C/R Value Length
  3. C/R Key Length
  4. Hash Value Length

Answer(s): B


Reference:

http://books.google.com.pk/books?id=QWQRSTnkFsQC&pg=SA4- PA5&lpg=SA4-
PA5&dq=attributes+has+a+LM+and+NTLMv1+value+as+64bit+%2B+64bit+%2B+64bit+an d+NTLMv2+value+as+128+bits&source=bl&ots=wJPR32BaF6&sig=YEt9LNfQAbm2M- c6obVggKCkQ2s&hl=en&sa=X&ei=scMfVMfdC8u7ygP4xYGQDg&ved=0CCkQ6AEwAg#v =onepage&q=attributes%20has%20a%20LM%20and%20NTLMv1%20value%20as%2064 bit%20%2B%2064bit%20%2B%2064bit%20and%20NTLMv2%20value%20as%20128%20 bits&f=false (see Table 4-1)



The SnortMain () function begins by associating a set of handlers for the signals, Snort receives. It does this using the signal () function. Which one of the following functions is used as a programspecific signal and the handler for this calls the DropStats() function to output the current Snort statistics?

  1. SIGUSR1
  2. SIGTERM
  3. SIGINT
  4. SIGHUP

Answer(s): A






Post your Comments and Discuss EC-Council 412-79V9 exam dumps with other Community members:

Join the 412-79V9 Discussion