ECCouncil 412-79v8 - EC-Council Certified Security Analyst (ECSA) Exam
Page: 2 / 40
Total 196 questions
Question #6 (Topic: )
What is the maximum value of a “tinyint” field in most database systems?
A. 222
B. 224 or more
C. 240 or less
D. 225 or more
Answer: D
Question #7 (Topic: )
Network scanning is used to identify the available network resources. Which one of the
following is also known as a half-open scan, because a full TCP connection is never
completed and it is used to determine which ports are open and listening on a target
device?
following is also known as a half-open scan, because a full TCP connection is never
completed and it is used to determine which ports are open and listening on a target
device?
A. SYN Scan
B. TCP Connect Scan
C. XMAS Scan
D. Null Scan
Answer: A
Question #8 (Topic: )
TCP/IP provides a broad range of communication protocols for the various applications on
the network. The TCP/IP model has four layers with major protocols included within each
layer. Which one of the following protocols is used to collect information from all the
network devices?
the network. The TCP/IP model has four layers with major protocols included within each
layer. Which one of the following protocols is used to collect information from all the
network devices?
A. Simple Network Management Protocol (SNMP)
B. Network File system (NFS)
C. Internet Control Message Protocol (ICMP)
D. Transmission Control Protocol(TCP)
Answer: A
Question #9 (Topic: )
The IP protocol was designed for use on a wide variety of transmission links. Although the
maximum length of an IP datagram is 64K, most transmission links enforce a smaller
maximum packet length limit, called a MTU.
The value of the MTU depends on the type of the transmission link. The design of IP
accommodates MTU differences by allowing routers to fragment IP datagrams as
necessary. The receiving station is responsible for reassembling the fragments back into
the original full size IP datagram.
IP fragmentation involves breaking a datagram into a number of pieces that can be
reassembled later. The IP source, destination,identification, total length, and fragment
offset fields in the IP header, are used for IP fragmentation and reassembly.
[ECCouncil-412-79v8-10.3/ECCouncil-412-79v8-7_2.png]
The fragment offset is 13 bits and indicates where a fragment belongs in the original IP
datagram. This value is a:
maximum length of an IP datagram is 64K, most transmission links enforce a smaller
maximum packet length limit, called a MTU.
The value of the MTU depends on the type of the transmission link. The design of IP
accommodates MTU differences by allowing routers to fragment IP datagrams as
necessary. The receiving station is responsible for reassembling the fragments back into
the original full size IP datagram.
IP fragmentation involves breaking a datagram into a number of pieces that can be
reassembled later. The IP source, destination,identification, total length, and fragment
offset fields in the IP header, are used for IP fragmentation and reassembly.
[ECCouncil-412-79v8-10.3/ECCouncil-412-79v8-7_2.png]
The fragment offset is 13 bits and indicates where a fragment belongs in the original IP
datagram. This value is a:
A. Multipleof four bytes
B. Multiple of two bytes
C. Multiple of eight bytes
D. Multiple of six bytes
Answer: C
Question #10 (Topic: )
Many security and compliance projects begin with a simple idea: assess the organization's
risk, vulnerabilities, and breaches. Implementing an IT security risk assessment is critical to
the overall security posture of any organization.
An effective security risk assessment can prevent breaches and reduce the impact of
realized breaches.
[ECCouncil-412-79v8-10.3/ECCouncil-412-79v8-8_2.png]
What is the formula to calculate risk?
risk, vulnerabilities, and breaches. Implementing an IT security risk assessment is critical to
the overall security posture of any organization.
An effective security risk assessment can prevent breaches and reduce the impact of
realized breaches.
[ECCouncil-412-79v8-10.3/ECCouncil-412-79v8-8_2.png]
What is the formula to calculate risk?
A. Risk = Budget x Time
B. Risk = Goodwill x Reputation
C. Risk = Loss x Exposure factor
D. Risk = Threats x Attacks
Answer: C