Pass the ECCouncil ECSA 412-79v10 Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the Restrict Anonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server.

Using User info tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

Options:

A.

Restrict Anonymous must be set to "2" for complete security


B.

Restrict Anonymous must be set to "3" for complete security


C.

There is no way to always prevent an anonymous null session from establishing


D.

Restrict Anonymous must be set to "10" for complete security


Expert Solution
Questions # 42:

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

Options:

A.

Avoid cross talk


B.

Avoid over-saturation of wireless signals


C.

So that the access points will work on different frequencies


D.

Multiple access points can be set up on the same channel without any issues


Expert Solution
Questions # 43:

An attacker injects malicious query strings in user input fields to bypass web service authentication mechanisms and to access back-end databases. Which of the following attacks is this?

Options:

A.

Frame Injection Attack


B.

LDAP Injection Attack


C.

XPath Injection Attack


D.

SOAP Injection Attack


Expert Solution
Questions # 44:

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa.

She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for.

What principal of social engineering did Julia use?

Options:

A.

Reciprocation


B.

Friendship/Liking


C.

Social Validation


D.

Scarcity


Expert Solution
Questions # 45:

DNS information records provide important data about:

Options:

A.

Phone and Fax Numbers


B.

Location and Type of Servers


C.

Agents Providing Service to Company Staff


D.

New Customer


Expert Solution
Questions # 46:

Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?

Options:

A.

Threat-Assessment Phase


B.

Pre-Assessment Phase


C.

Assessment Phase


D.

Post-Assessment Phase


Expert Solution
Questions # 47:

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?

Options:

A.

%systemroot%\LSA


B.

%systemroot%\repair


C.

%systemroot%\system32\drivers\etc


D.

%systemroot%\system32\LSA


Expert Solution
Questions # 48:

Which one of the following is a command line tool used for capturing data from the live network and copying those packets to a file?

Options:

A.

Wireshark: Capinfos


B.

Wireshark: Tcpdump


C.

Wireshark: Text2pcap


D.

Wireshark: Dumpcap


Expert Solution
Questions # 49:

Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?

include

#include

int main(int argc, char *argv[])

{

char buffer[10];

if (argc < 2)

{

fprintf(stderr, "USAGE: %s string\n", argv[0]);

return 1;

}

strcpy(buffer, argv[1]);

return 0;

}

Options:

A.

Buffer overflow


B.

Format string bug


C.

Kernal injection


D.

SQL injection


Expert Solution
Questions # 50:

Amazon, an IT based company, conducts a survey on the usage of the Internet. They found that company employees spend most of the time at work surfing the web for their personal use and for inappropriate web site viewing. Management decide to block all such web sites using URL filtering software.

Question # 50

How can employees continue to see the blocked websites?

Options:

A.

Using session hijacking


B.

Using proxy servers


C.

Using authentication


D.

Using encryption


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions