www.cert24.com,test dumps, practice test, pdf 412-79 EC-COUNCIL cert24

www.cert24.com,test dumps, practice test, pdf 412-79 EC-COUNCIL cert24
www.cert24.com,test dumps, practice test, pdf 412-79 EC-COUNCIL cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

412-79 EC-Council Certified Security Analyst (ECSA) We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 412-79 EC-COUNCIL cert24

QUESTION NO: 1
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?
A. CVE
B. IANA
C. RIPE
D. APIPA

Answer: A

Explanation:
Answer A is the correct answer. CVE (Common Vulnerabilities and Exposures) is a dictionary of publically known vulnerabilities and exposure maintained by Mitre.

QUESTION NO: 2
George is a senior security analyst working for a state agency in Florida. His state’s congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a “time-based induction machine” be used. What IDS feature must George implement to meet this requirement?
A. Pattern matching
B. Statistical-based anomaly detection
C. Real-time anomaly detection
D. Signature-based anomaly detection

Answer: C

QUESTION NO: 3
Software firewalls work at which layer of the OSI model?
A. Data Link
B. Network
C. Transport
D. Application

Answer: A

www.cert24.com,test dumps, practice test, pdf 412-79 EC-COUNCIL cert24

Comments are closed.