Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

ECCouncil Updated 412-79 Exam Questions and Answers by edgar

Page: 5 / 8

ECCouncil 412-79 Exam Overview :

Exam Name: EC-Council Certified Security Analyst (ECSA)
Exam Code: 412-79 Dumps
Vendor: ECCouncil Certification: ECSA
Questions: 232 Q&A's Shared By: edgar
Question 20

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

Options:

A.

Fraggle

B.

SYN flood

C.

Trinoo

D.

Smurf

Discussion
Zayaan
Successfully aced the exam… Thanks a lot for providing amazing Exam Dumps.
Harmony Mar 7, 2026
That's fantastic! I'm glad to hear that their dumps helped you. I also used them and found it accurate.
Cody
I used Cramkey Dumps to prepare and a lot of the questions on the exam were exactly what I found in their study materials.
Eric Mar 12, 2026
Really? That's great to hear! I used Cramkey Dumps too and I had the same experience. The questions were almost identical.
Freddy
I passed my exam with flying colors and I'm confident who will try it surely ace the exam.
Aleksander Mar 13, 2026
Thanks for the recommendation! I'll check it out.
Neve
Will I be able to achieve success after using these dumps?
Rohan Mar 6, 2026
Absolutely. It's a great way to increase your chances of success.
Question 21

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

Options:

A.

Ping trace

B.

Tracert

C.

Smurf scan

D.

ICMP ping sweep

Discussion
Question 22

What should you do when approached by a reporter about a case that you are working on or have worked on?

Options:

A.

Refer the reporter to the attorney that retained you

B.

Say, “no comment”

C.

Answer all the reporters questions as completely as possible

D.

Answer only the questions that help your case

Discussion
Question 23

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?

Options:

A.

the File Allocation Table

B.

the file header

C.

the file footer

D.

the sector map

Discussion
Page: 5 / 8

412-79
PDF

$36.75  $104.99

412-79 Testing Engine

$43.75  $124.99

412-79 PDF + Testing Engine

$57.75  $164.99