Pass the ECCouncil ECSA 412-79v10 Questions and answers with CertsForce

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

Identify the injection attack represented in the diagram below:

Question # 31

Options:

A.

XPath Injection Attack


B.

XML Request Attack


C.

XML Injection Attack


D.

Frame Injection Attack


Expert Solution
Questions # 32:

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities:

<script>alert("This is a test.")</script>

When you type this and click on search, you receive a pop-up window that says:

"This is a test."

What is the result of this test?

Options:

A.

Your website is vulnerable to web bugs


B.

Your website is vulnerable to XSS


C.

Your website is not vulnerable


D.

Your website is vulnerable to SQL injection


Expert Solution
Questions # 33:

A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools.

The system monitors the radio spectrum used by wireless LANs, and immediately alerts a systems administrator whenever a rogue access point is detected. Conventionally it is achieved by comparing the MAC address of the participating wireless devices.

Which of the following attacks can be detected with the help of wireless intrusion detection system (WIDS)?

Question # 33

Options:

A.

Social engineering


B.

SQL injection


C.

Parameter tampering


D.

Man-in-the-middle attack


Expert Solution
Questions # 34:

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using Idp.exe.

What are you trying to accomplish here?

Options:

A.

Poison the DNS records with false records


B.

Enumerate MX and A records from DNS


C.

Establish a remote connection to the Domain Controller


D.

Enumerate domain user accounts and built-in groups


Expert Solution
Questions # 35:

John, a penetration tester from a pen test firm, was asked to collect information about the host file in a Windows system directory. Which of the following is the location of the host file in Window system directory?

Options:

A.

C:\Windows\System32\Boot


B.

C:\WINNT\system32\drivers\etc


C.

C:\WINDOWS\system32\cmd.exe


D.

C:\Windows\System32\restore


Expert Solution
Questions # 36:

Which one of the following tools of trade is a commercial shellcode and payload generator written in Python by Dave Aitel?

Options:

A.

Microsoft Baseline Security Analyzer (MBSA)


B.

CORE Impact


C.

Canvas


D.

Network Security Analysis Tool (NSAT)


Expert Solution
Questions # 37:

To locate the firewall, SYN packet is crafted using Hping or any other packet crafter and sent to the firewall. If ICMP unreachable type 13 message (which is an admin prohibited packet) with a source IP address of the access control device is received, then it means which of the following type of firewall is in place?

Options:

A.

Circuit level gateway


B.

Stateful multilayer inspection firewall


C.

Packet filter


D.

Application level gateway


Expert Solution
Questions # 38:

What does ICMP Type 3/Code 13 mean?

Options:

A.

Host Unreachable


B.

Port Unreachable


C.

Protocol Unreachable


D.

Administratively Blocked


Expert Solution
Questions # 39:

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum.

Different types of Internet Control Message Protocols (ICMPs) are identified by a type and code field.

Question # 39

Which of the following ICMP messages will be generated if the destination port is not reachable?

Options:

A.

ICMP Type 11 code 1


B.

ICMP Type 5 code 3


C.

ICMP Type 3 code 2


D.

ICMP Type 3 code 3


Expert Solution
Questions # 40:

An external intrusion test and analysis identify security weaknesses and strengths of the client's systems and networks as they appear from outside the client's security perimeter, usually from the Internet.

The goal of an external intrusion test and analysis is to demonstrate the existence of known vulnerabilities that could be exploited by an external attacker.

Question # 40

During external penetration testing, which of the following scanning techniques allow you to determine a port’s state without making a full connection to the host?

Options:

A.

XMAS Scan


B.

SYN scan


C.

FIN Scan


D.

NULL Scan


Expert Solution
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions