Vendor
: EC-Council
Exam Code : 412-79v8
Version: Free Demo
IT Certification Guaranteed, The Easy Way!
Cheat-Test.us - The Worldwide Renowned IT Certification Material Provider! The safer, easier way to help you pass any IT Certification exams.
We provide high quality IT Certification exams practice questions and answers (Q&A). Especially Cisco, Microsoft, HP, IBM, Oracle, CompTIA, Adobe, Apple, Citrix, EMC, Isaca, Avaya, SAP and so on. And help you pass an IT Certification exams at the first try.
Cheat-Test product Features: •
Verified Answers Researched by Industry Experts
•
Questions updated on regular basis
•
Like actual certification exams our product is in multiple-choice questions (MCQs).
•
Our questions and answers are backed by our GUARANTEE.
7x24 online customer service: support@cheat-test.us
Click Here to get more Free Cheat-Test Certification exams!
http://www.Cheat-Test.us
Q: 1 James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network? A. Smurf B. Trinoo C. Fraggle D. SYN flood Answer: A Q: 2 In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts? A. IPS evasion technique B. IDS evasion technique C. UDP evasion technique D. TTL evasion technique Answer: B Q: 3 Which of the following attacks does a hacker perform in order to obtain UDDI information such as businessEntity, businesService, bindingTemplate, and tModel? A. Web Services Footprinting Attack B. Service Level Configuration Attacks C. URL Tampering Attacks D. Inside Attacks Answer: A Q: 4 DNS information records provide important data about: A. Phone and Fax Numbers B. Location and Type of Servers C. Agents Providing Service to Company Staff D. New Customer Answer: B Q: 5 Identify the port numbers used by POP3 and POP3S protocols. A. 113 and 981 B. 111 and 982 C. 110 and 995 D. 109 and 973 Answer: C Q: 6 To locate the firewall, SYN packet is crafted using Hping or any other packet crafter and sent to the firewall. If ICMP unreachable type 13 message (which is an admin prohibited packet) with a source IP address of the access control device is received, then it means which of the following type of firewall is in place? A. Circuit level gateway
B. Stateful multilayer inspection firewall C. Packet filter D. Application level gateway Answer: B Q: 7 An automated electronic mail message from a mail system which indicates that the user does not exist on that server is called as? A. SMTP Queue Bouncing B. SMTP Message Bouncing C. SMTP Server Bouncing D. SMTP Mail Bouncing Answer: B Q: 8 In the example of a /etc/passwd file below, what does the bold letter string indicate? nomad:HrLNrZ3VS3TF2:501:100: Simple Nomad:/home/nomad:/bin/bash A. Maximum number of days the password is valid B. Group number C. GECOS information D. User number Answer: D Q: 9 Which of the following policy forbids everything with strict restrictions on all usage of the company systems and network? A. Information-Protection Policy B. Paranoid Policy C. Promiscuous Policy D. Prudent Policy Answer: B Q: 10 Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits? A. Hash Key Length B. C/R Value Length C. C/R Key Length D. Hash Value Length Answer: B