Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

ECCouncil Updated 412-79 Exam Questions and Answers by edgar

Page: 5 / 8

ECCouncil 412-79 Exam Overview :

Exam Name: EC-Council Certified Security Analyst (ECSA)
Exam Code: 412-79 Dumps
Vendor: ECCouncil Certification: ECSA
Questions: 232 Q&A's Shared By: edgar
Question 20

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

Options:

A.

Fraggle

B.

SYN flood

C.

Trinoo

D.

Smurf

Discussion
Osian
Dumps are fantastic! I recently passed my certification exam using these dumps and I must say, they are 100% valid.
Azaan Apr 12, 2026
They are incredibly accurate and valid. I felt confident going into my exam because the dumps covered all the important topics and the questions were very similar to what I saw on the actual exam. The team of experts behind Cramkey Dumps make sure the information is relevant and up-to-date.
Miley
Hey, I tried Cramkey Dumps for my IT certification exam. They are really awesome and helped me pass my exam with wonderful score.
Megan Apr 3, 2026
That’s great!!! I’ll definitely give it a try. Thanks!!!
Joey
I highly recommend Cramkey Dumps to anyone preparing for the certification exam. They have all the key information you need and the questions are very similar to what you'll see on the actual exam.
Dexter Apr 14, 2026
Agreed. It's definitely worth checking out if you're looking for a comprehensive and reliable study resource.
Aryan
Absolutely rocked! They are an excellent investment for anyone who wants to pass the exam on the first try. They save you time and effort by providing a comprehensive overview of the exam content, and they give you a competitive edge by giving you access to the latest information. So, I definitely recommend them to new students.
Jessie Mar 31, 2026
did you use PDF or Engine? Which one is most useful?
Question 21

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

Options:

A.

Ping trace

B.

Tracert

C.

Smurf scan

D.

ICMP ping sweep

Discussion
Question 22

What should you do when approached by a reporter about a case that you are working on or have worked on?

Options:

A.

Refer the reporter to the attorney that retained you

B.

Say, “no comment”

C.

Answer all the reporters questions as completely as possible

D.

Answer only the questions that help your case

Discussion
Question 23

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?

Options:

A.

the File Allocation Table

B.

the file header

C.

the file footer

D.

the sector map

Discussion
Page: 5 / 8

412-79
PDF

$36.75  $104.99

412-79 Testing Engine

$43.75  $124.99

412-79 PDF + Testing Engine

$57.75  $164.99