Pass the ECCouncil ECSA 412-79v10 Questions and answers with CertsForce

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

What operating system would respond to the following command?

Question # 11

Options:

A.

Mac OS X


B.

Windows XP


C.

Windows 95


D.

FreeBSD


Expert Solution
Questions # 12:

Firewall and DMZ architectures are characterized according to its design. Which one of the following architectures is used when routers have better high-bandwidth data stream handling capacity?

Options:

A.

Weak Screened Subnet Architecture


B.

"Inside Versus Outside" Architecture


C.

"Three-Homed Firewall" DMZ Architecture


D.

Strong Screened-Subnet Architecture


Expert Solution
Questions # 13:

SQL injection attacks are becoming significantly more popular amongst hackers and there has been an estimated 69 percent increase of this attack type.

This exploit is used to great effect by the hacking community since it is the primary way to steal sensitive data from web applications. It takes advantage of non-validated input vulnerabilities to pass SQL commands through a web application for execution by a back-end database.

The below diagram shows how attackers launched SQL injection attacks on web applications.

Question # 13

Which of the following can the attacker use to launch an SQL injection attack?

Options:

A.

Blah' “2=2 –“


B.

Blah' and 2=2 --


C.

Blah' and 1=1 --


D.

Blah' or 1=1 --


Expert Solution
Questions # 14:

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

Options:

A.

Passive IDS


B.

Active IDS


C.

Progressive IDS


D.

NIPS


Expert Solution
Questions # 15:

A WHERE clause in SQL specifies that a SQL Data Manipulation Language (DML) statement should only affect rows that meet specified criteria. The criteria are expressed in the form of predicates. WHERE clauses are not mandatory clauses of SQL DML statements, but can be used to limit the number of rows affected by a SQL DML statement or returned by a query.

Question # 15

A pen tester is trying to gain access to a database by inserting exploited query statements with a WHERE clause. The pen tester wants to retrieve all the entries from the database using the WHERE clause from a particular table (e.g. StudentTable).

What query does he need to write to retrieve the information?

Options:

A.

EXTRACT* FROM StudentTable WHERE roll_number = 1 order by 1000


B.

DUMP * FROM StudentTable WHERE roll_number = 1 AND 1=1—


C.

SELECT * FROM StudentTable WHERE roll_number = '' or '1' = '1‘


D.

RETRIVE * FROM StudentTable WHERE roll_number = 1'#


Expert Solution
Questions # 16:

TCP/IP provides a broad range of communication protocols for the various applications on the network. The TCP/IP model has four layers with major protocols included within each layer. Which one of the following protocols is used to collect information from all the network devices?

Options:

A.

Simple Network Management Protocol (SNMP)


B.

Network File system (NFS)


C.

Internet Control Message Protocol (ICMP)


D.

Transmission Control Protocol (TCP)


Expert Solution
Questions # 17:

Attackers create secret accounts and gain illegal access to resources using backdoor while bypassing the authentication procedures. Creating a backdoor is a where an attacker obtains remote access to a computer on a network.

Question # 17

Which of the following techniques do attackers use to create backdoors to covertly gather critical information about a target machine?

Options:

A.

Internal network mapping to map the internal network of the target machine


B.

Port scanning to determine what ports are open or in use on the target machine


C.

Sniffing to monitor all the incoming and outgoing network traffic


D.

Social engineering and spear phishing attacks to install malicious programs on the target machine


Expert Solution
Questions # 18:

What is the difference between penetration testing and vulnerability testing?

Question # 18

Options:

A.

Penetration testing goes one step further than vulnerability testing; while vulnerability tests check for known vulnerabilities, penetration testing adopts the concept of ‘in-depth ethical hacking’


B.

Penetration testing is based on purely online vulnerability analysis while vulnerability testing engages ethical hackers to find vulnerabilities


C.

Vulnerability testing is more expensive than penetration testing


D.

Penetration testing is conducted purely for meeting compliance standards while vulnerability testing is focused on online scans


Expert Solution
Questions # 19:

Which of the following approaches to vulnerability assessment relies on the administrator providing baseline of system configuration and then scanning continuously without incorporating any information found at the time of scanning?

Question # 19

Options:

A.

Service-based Assessment Solutions


B.

Product-based Assessment Solutions


C.

Tree-based Assessment


D.

Inference-based Assessment


Expert Solution
Questions # 20:

Which Wireshark filter displays all the packets where the IP address of the source host is 10.0.0.7?

Question # 20

Options:

A.

ip.dst==10.0.0.7


B.

ip.port==10.0.0.7


C.

ip.src==10.0.0.7


D.

ip.dstport==10.0.0.7


Expert Solution
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions