Pass the ECCouncil ECSA 412-79v10 Questions and answers with CertsForce

Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which type of vulnerability assessment tool provides security to the IT system by testing for vulnerabilities in the applications and operation system?

Options:

A.

Active/Passive Tools


B.

Application-layer Vulnerability Assessment Tools


C.

Location/Data Examined Tools


D.

Scope Assessment Tools


Expert Solution
Questions # 2:

Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.

Options:

A.

Unannounced Testing


B.

Double Blind Testing


C.

Announced Testing


D.

Blind Testing


Expert Solution
Questions # 3:

Traffic on which port is unusual for both the TCP and UDP ports?

Options:

A.

Port 81


B.

Port 443


C.

Port 0


D.

Port 21


Expert Solution
Questions # 4:

Which of the following statements is true about the LM hash?

Options:

A.

Disabled in Windows Vista and 7 OSs


B.

Separated into two 8-character strings


C.

Letters are converted to the lowercase


D.

Padded with NULL to 16 characters


Expert Solution
Questions # 5:

The objective of this act was to protect consumers personal financial information held by financial institutions and their service providers.

Options:

A.

HIPAA


B.

Sarbanes-Oxley 2002


C.

Gramm-Leach-Bliley Act


D.

California SB 1386a


Expert Solution
Questions # 6:

Which of the following statement holds true for TCP Operation?

Question # 6

Options:

A.

Port numbers are used to know which application the receiving host should pass the data to


B.

Sequence numbers are used to track the number of packets lost in transmission


C.

Flow control shows the trend of a transmitting host overflowing the buffers in the receiving host


D.

Data transfer begins even before the connection is established


Expert Solution
Questions # 7:

Which of the following acts is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards and applies to all entities involved in payment card processing?

Options:

A.

PIPEDA


B.

PCI DSS


C.

Human Rights Act 1998


D.

Data Protection Act 1998


Expert Solution
Questions # 8:

Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and Zombies? What type of Penetration Testing is Larry planning to carry out?

Options:

A.

Internal Penetration Testing


B.

Firewall Penetration Testing


C.

DoS Penetration Testing


D.

Router Penetration Testing


Expert Solution
Questions # 9:

The Web parameter tampering attack is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials and permissions, price and quantity of products, etc.

Usually, this information is stored in cookies, hidden form fields, or URL Query Strings, and is used to increase application functionality and control. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag in a form or a parameter in a URL) as the only security measure for certain operations.

Attackers can easily modify these parameters to bypass the security mechanisms that rely on them.

Question # 9

What is the best way to protect web applications from parameter tampering attacks?

Options:

A.

Validating some parameters of the web application


B.

Minimizing the allowable length of parameters


C.

Using an easily guessable hashing algorithm


D.

Applying effective input field filtering parameters


Expert Solution
Questions # 10:

The objective of social engineering pen testing is to test the strength of human factors in a security chain within the organization. It is often used to raise the level of security awareness among employees.

Question # 10

The tester should demonstrate extreme care and professionalism during a social engineering pen test as it might involve legal issues such as violation of privacy and may result in an embarrassing situation for the organization.

Which of the following methods of attempting social engineering is associated with bribing, handing out gifts, and becoming involved in a personal relationship to befriend someone inside the company?

Options:

A.

Accomplice social engineering technique


B.

Identity theft


C.

Dumpster diving


D.

Phishing social engineering technique


Expert Solution
Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions