Free EC-Council 412-79V9 Exam Questions (page: 9)

Which of the following is an ARP cache poisoning technique aimed at network switches?

  1. Replay Attack
  2. Mac Flooding
  3. Man-in-the Middle Attack
  4. DNS Poisoning

Answer(s): B


Reference:

http://www.watchguard.com/infocenter/editorial/135324.asp (see mac flooding)



Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?


  1. Client-Side Test Report
  2. Activity Report
  3. Host Report
  4. Vulnerability Report

Answer(s): A



Mason is footprinting an organization to gather competitive intelligence. He visits the company's website for contact information and telephone numbers but does not find any. He knows the entire staff directory was listed on their website 12 months. How can he find the directory?

  1. Visit Google's search engine and view the cached copy
  2. Crawl and download the entire website using the Surfoffline tool and save them to his computer
  3. Visit the company's partners' and customers' website for this information
  4. Use WayBackMachine in Archive.org web site to retrieve the Internet archive

Answer(s): D



Which of the following shields Internet users from artificial DNS data, such as a deceptive or mischievous address instead of the genuine address that was requested?

  1. DNSSEC
  2. Firewall
  3. Packet filtering
  4. IPSec

Answer(s): A


Reference:

http://tools.ietf.org/html/draft-osterweil-dane-ipsec-01 (abstract, first para)



John, the penetration testing manager in a pen testing firm, needs to prepare a pen testing pricing report for a client.
Which of the following factors does he need to consider while preparing the pen testing pricing report?

  1. Number of employees in the client organization
  2. Complete structure of the organization
  3. Number of client computers to be tested and resources required to perform a pen test
  4. Number of servers available in the client organization

Answer(s): C



Which one of the following 802.11 types has WLAN as a network support?

  1. 802.11b
  2. 802.11-Legacy
  3. 802.11n
  4. 802.11g

Answer(s): C



What information can be collected by dumpster diving?

  1. Sensitive documents
  2. Email messages
  3. Customer contact information
  4. All the above

Answer(s): A


Reference:

http://www.spamlaws.com/dumpster-diving.html



Nessus can test a server or a network for DoS vulnerabilities. Which one of the following script tries to kill a service?

  1. ACT_DENIAL
  2. ACT_FLOOD
  3. ACT_KILL_HOST
  4. ACT_ATTACK

Answer(s): A






Post your Comments and Discuss EC-Council 412-79V9 exam prep with other Community members:

412-79V9 Exam Discussions & Posts