Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: big60

ECCouncil Updated 412-79 Exam Questions and Answers by mikayla

Page: 3 / 8

ECCouncil 412-79 Exam Overview :

Exam Name: EC-Council Certified Security Analyst (ECSA)
Exam Code: 412-79 Dumps
Vendor: ECCouncil Certification: ECSA
Questions: 203 Q&A's Shared By: mikayla
Question 12

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

Options:

A.

HKEY_LOCAL_MACHINEhardwarewindowsstart

B.

HKEY_LOCAL_USERSSoftware|MicrosoftoldVersionLoad

C.

HKEY_CURRENT_USERMicrosoftDefault

D.

HKEY_LOCAL_MACHINESoftwareMicrosoftCurrentVersionRun

Discussion
Everleigh
I must say that they are updated regularly to reflect the latest exam content, so you can be sure that you are getting the most accurate information. Plus, they are easy to use and understand, so even new students can benefit from them.
Huxley (not set)
That's great to know. So, you think new students should buy these dumps?
River
Hey, I used Cramkey Dumps to prepare for my recent exam and I passed it.
Lewis (not set)
Yeah, I used these dumps too. And I have to say, I was really impressed with the results.
Lennie
I passed my exam and achieved wonderful score, I highly recommend it.
Emelia (not set)
I think I'll give Cramkey a try next time I take a certification exam. Thanks for the recommendation!
Mylo
Excellent dumps with authentic information… I passed my exam with brilliant score.
Dominik (not set)
That's amazing! I've been looking for good study material that will help me prepare for my upcoming certification exam. Now, I will try it.
Question 13

How many sectors will a 125 KB file use in a FAT32 file system?

Options:

A.

32

B.

16

C.

250

D.

25

Discussion
Question 14

With Regard to using an Antivirus scanner during a computer forensics investigation, You should:

Options:

A.

Scan the suspect hard drive before beginning an investigation

B.

Never run a scan on your forensics workstation because it could change your systems configuration

C.

Scan your forensics workstation at intervals of no more than once every five minutes during an investigation

D.

Scan your Forensics workstation before beginning an investigation

Discussion
Question 15

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?

Options:

A.

%systemroot%\system32\drivers\etc

B.

%systemroot%\repair

C.

%systemroot%\LSA

D.

%systemroot%\system32\LSA

Discussion
Page: 3 / 8

412-79
PDF

$40  $99.99

412-79 Testing Engine

$48  $119.99

412-79 PDF + Testing Engine

$64  $159.99