Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 6
Total 60 questions
Exam Code: 412-79v10                Update: Oct 15, 2025
Exam Name: EC-Council Certified Security Analyst (ECSA) V10

ECCouncil EC-Council Certified Security Analyst (ECSA) V10 412-79v10 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

Which of the following policy forbids everything with strict restrictions on all usage of the company systems and network?

A.

Information-Protection Po

B.

Paranoid Policy

C.

Promiscuous Policy

D.

Prudent Policy

Question # 2

Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?

A.

California SB 1386

B.

Sarbanes-Oxley 2002

C.

Gramm-Leach-Bliley Act (GLBA)

D.

USA Patriot Act 2001

Question # 3

What is a difference between host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS)?

A.

NIDS are usually a more expensive solution to implement compared to HIDS.

B.

Attempts to install Trojans or backdoors cannot be monitored by a HIDS whereas NIDS can monitor and stop such intrusion events.

C.

NIDS are standalone hardware appliances that include network intrusion detection capabilities whereas HIDS consist of software agents installed on individual computers within the system.

D.

HIDS requires less administration and training compared to NIDS.

Question # 4

Identify the correct formula for Return on Investment (ROI).

A.

ROI = ((Expected Returns – Cost of Investment) / Cost of Investment) * 100

B.

ROI = (Expected Returns + Cost of Investment) / Cost of Investment

C.

ROI = (Expected Returns Cost of Investment) / Cost of Investment

D.

ROI = ((Expected Returns + Cost of Investment) / Cost of Investment) * 100

Question # 5

After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address.

Only five hosts responds to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

A.

A switched network will not respond to packets sent to the broadcast address

B.

Only IBM AS/400 will reply to this scan

C.

Only Unix and Unix-like systems will reply to this scan

D.

Only Windows systems will reply to this scan

Question # 6

What is the maximum value of a “tinyint” field in most database systems?

A.

222

B.

224 or more

C.

240 or less

D.

225 or more

Question # 7

Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?

A.

Project Goal

B.

Success Factors

C.

Objectives

D.

Assumptions

Question # 8

Which among the following information is not furnished by the Rules of Engagement (ROE) document?

A.

Techniques for data collection from systems upon termination of the test

B.

Techniques for data exclusion from systems upon termination of the test

C.

Details on how data should be transmitted during and after the test

D.

Details on how organizational data is treated throughout and after the test

Question # 9

One needs to run “Scan Server Configuration” tool to allow a remote connection to Nessus from the remote Nessus clients. This tool allows the port and bound interface of the Nessus daemon to be configured.

By default, the Nessus daemon listens to connections on which one of the following?

A.

Localhost (127.0.0.1) and port 1241

B.

Localhost (127.0.0.1) and port 1240

C.

Localhost (127.0.0.1) and port 1246

D.

Localhost (127.0.0.0) and port 1243

Question # 10

You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses.

You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

A.

Metamorphic

B.

Oligomorhic

C.

Polymorphic

D.

Transmorphic

Page: 1 / 6
Total 60 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025