Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

ECCouncil Updated 412-79 Exam Questions and Answers by edgar

Page: 5 / 8

ECCouncil 412-79 Exam Overview :

Exam Name: EC-Council Certified Security Analyst (ECSA)
Exam Code: 412-79 Dumps
Vendor: ECCouncil Certification: ECSA
Questions: 232 Q&A's Shared By: edgar
Question 20

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

Options:

A.

Fraggle

B.

SYN flood

C.

Trinoo

D.

Smurf

Discussion
Question 21

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

Options:

A.

Ping trace

B.

Tracert

C.

Smurf scan

D.

ICMP ping sweep

Discussion
Freddy
I passed my exam with flying colors and I'm confident who will try it surely ace the exam.
Aleksander Mar 13, 2026
Thanks for the recommendation! I'll check it out.
Honey
I highly recommend it. They made a big difference for me and I'm sure they'll help you too. Just make sure to use them wisely and not solely rely on them. They should be used as a supplement to your regular studies.
Antoni Mar 17, 2026
Good point. Thanks for the advice. I'll definitely keep that in mind.
Kingsley
Do anyone guide my how these dumps would be helpful for new students like me?
Haris Mar 23, 2026
Absolutely! They are highly recommended for anyone looking to pass their certification exam. The dumps are easy to understand and follow, making it easier for you to study and retain the information.
Amy
I passed my exam and found your dumps 100% relevant to the actual exam.
Lacey Mar 14, 2026
Yeah, definitely. I experienced the same.
Question 22

What should you do when approached by a reporter about a case that you are working on or have worked on?

Options:

A.

Refer the reporter to the attorney that retained you

B.

Say, “no comment”

C.

Answer all the reporters questions as completely as possible

D.

Answer only the questions that help your case

Discussion
Question 23

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?

Options:

A.

the File Allocation Table

B.

the file header

C.

the file footer

D.

the sector map

Discussion
Page: 5 / 8

412-79
PDF

$36.75  $104.99

412-79 Testing Engine

$43.75  $124.99

412-79 PDF + Testing Engine

$57.75  $164.99