Pass the ECCouncil ECSA 412-79v10 Questions and answers with CertsForce

Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions
Questions # 51:

In the process of hacking a web application, attackers manipulate the HTTP requests to subvert the application authorization schemes by modifying input fields that relate to the user ID, username, access group, cost, file names, file identifiers, etc.

They first access the web application using a low privileged account and then escalate privileges to access protected resources. What attack has been carried out?

Options:

A.

XPath Injection Attack


B.

Authorization Attack


C.

Authentication Attack


D.

Frame Injection Attack


Expert Solution
Questions # 52:

Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?

Options:

A.

Hash Key Length


B.

C/R Value Length


C.

C/R Key Length


D.

Hash Value Length


Expert Solution
Questions # 53:

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT.

Which firewall would be most appropriate for Harold?

Options:

A.

Application-level proxy firewall


B.

Data link layer firewall


C.

Packet filtering firewall


D.

Circuit-level proxy firewall


Expert Solution
Questions # 54:

The term social engineering is used to describe the various tricks used to fool people (employees, business partners, or customers) into voluntarily giving away information that would not normally be known to the general public.

Question # 54

What is the criminal practice of social engineering where an attacker uses the telephone system in an attempt to scam the user into surrendering private information?

Options:

A.

Phishing


B.

Spoofing


C.

Tapping


D.

Vishing


Expert Solution
Questions # 55:

Which of the following protocols cannot be used to filter VoIP traffic?

Options:

A.

Media Gateway Control Protocol (MGCP)


B.

Real-time Transport Control Protocol (RTCP)


C.

Session Description Protocol (SDP)


D.

Real-Time Publish Subscribe (RTPS)


Expert Solution
Questions # 56:

Metasploit framework in an open source platform for vulnerability research, development, and penetration testing. Which one of the following metasploit options is used to exploit multiple systems at once?

Options:

A.

NinjaDontKill


B.

NinjaHost


C.

RandomNops


D.

EnablePython


Expert Solution
Questions # 57:

One needs to run “Scan Server Configuration” tool to allow a remote connection to Nessus from the remote Nessus clients. This tool allows the port and bound interface of the Nessus daemon to be configured.

By default, the Nessus daemon listens to connections on which one of the following?

Options:

A.

Localhost (127.0.0.1) and port 1241


B.

Localhost (127.0.0.1) and port 1240


C.

Localhost (127.0.0.1) and port 1246


D.

Localhost (127.0.0.0) and port 1243


Expert Solution
Questions # 58:

An "idle" system is also referred to as what?

Options:

A.

Zombie


B.

PC not being used


C.

Bot


D.

PC not connected to the Internet


Expert Solution
Questions # 59:

Which of the following methods is used to perform server discovery?

Options:

A.

Banner Grabbing


B.

Who is Lookup


C.

SQL Injection


D.

Session Hijacking


Expert Solution
Questions # 60:

What are the 6 core concepts in IT security?

Question # 60

Options:

A.

Server management, website domains, firewalls, IDS, IPS, and auditing


B.

Authentication, authorization, confidentiality, integrity, availability, and non-repudiation


C.

Passwords, logins, access controls, restricted domains, configurations, and tunnels


D.

Biometrics, cloud security, social engineering, DoS attack, viruses, and Trojans


Expert Solution
Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions