Discount Offer
Go Back on 412-79 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

412-79 Practice Test


Page 6 out of 40 Pages

What sort of vulnerability assessment approach starts by building an inventory of protocols
found on the machine?


A.

 Inference-based Assessment


B.

Service-based Assessment Solutions


C.

Product-based Assessment Solutions


D.

 Tree-based Assessment





A.
  

 Inference-based Assessment



Reference:http://www.businessweek.com/adsections/2005/pdf/wp_mva.pdf(page 26, first
para on the page)

Which of the following statement holds true for TCP Operation?



A.

Port numbers are used to know which application the receiving host should pass the
data to


B.

Sequence numbers are used to track the number of packets lost in transmission


C.


Flow control shows the trend of a transmitting host overflowing the buffers in the
receiving host


D.

Data transfer begins even before the connection is established





D.
  

Data transfer begins even before the connection is established



You work as an IT security auditor hired by a law firm in Boston. You have been assigned
the responsibility to audit the client for security risks. When assessing the risk to the clients
network, what step should you take first?


A.

Analyzing, categorizing and prioritizing resources


B.

Evaluating the existing perimeter and internal security


C.

Checking fora written security policy


D.

Analyzing the use of existing management and control architecture





C.
  

Checking fora written security policy



John, the penetration tester in a pen test firm, was asked to find whether NTP services are
opened on the target network (10.0.0.7) using Nmap tool.

Which one of the following Nmap commands will he use to findit?


A.

nmap -sU –p 389 10.0.0.7


B.

nmap -sU –p 123 10.0.0.7


C.

nmap -sU –p 161 10.0.0.7


D.

nmap -sU –p 135 10.0.0.7





B.
  

nmap -sU –p 123 10.0.0.7



Passwords protect computer resources and files from unauthorized access by malicious
users. Using passwords is the most capableand effective way to protect information and to
increase the security level of a company.
Password cracking is the process of recovering passwords from data that have been stored
in or transmitted by a computer system to gain unauthorized access to a system.
Which of the following password cracking attacks tries every combination of characters
until the password is broken?


A.

Brute-force attack


B.

 Rule-based attack


C.

Hybrid attack


D.

Dictionary attack





A.
  

Brute-force attack



Reference:http://books.google.com.pk/books?id=m2qZNW4dcyIC&pg=PA237&lpg=PA237
&dq=password+cracking+attacks+tries+every+combination+of+characters+until+the+pass
word+is+broken&source=bl&ots=RKEUUo6LYj&sig=MPEfFBEpoO0yvOwMxYCoPQuqM5
g&hl=en&sa=X&ei=ZdwdVJm3CoXSaPXsgPgM&ved=0CCEQ6AEwAQ#v=onepage&q=pa
ssword-cracking-attacks-tries-every-combination-of-characters%
20until-the-password-is-broken&f=false


Page 6 out of 40 Pages
Previous