Pass the ECCouncil ECSA ECSAv10 Questions and answers with CertsForce

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

The SnortMain () function begins by associating a set of handlers for the signals, Snort receives. It does this using the signal () function. Which one of the following functions is used as a programspecific signal and the handler for this calls the DropStats() function to output the current Snort statistics?

Options:

A.

SIGUSR1


B.

SIGTERM


C.

SIGINT


D.

SIGHUP


Expert Solution
Questions # 22:

John, the penetration testing manager in a pen testing firm, needs to prepare a pen testing pricing report for a client. Which of the following factors does he need to consider while preparing the pen testing pricing report?

Question # 22

Options:

A.

Number of employees in the client organization


B.

Complete structure of the organization


C.

Number of client computers to be tested and resources required to perform a pen test


D.

Number of servers available in the client organization


Expert Solution
Questions # 23:

O: 18

Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette's duties include logging on to all the company's network equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as possible.

Paulette presents the following screenshot to her boss so he can inform the clients about necessary changes need to be made. From the screenshot, what changes should the client company make?

Exhibit:

Question # 23

Options:

A.

The banner should not state "only authorized IT personnel may proceed"


B.

Remove any identifying numbers, names, or version information


C.

The banner should include the Cisco tech support contact information as well


D.

The banner should have more detail on the version numbers for the network equipment


Expert Solution
Questions # 24:

Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?

Options:

A.

Project Goal


B.

Success Factors


C.

Objectives


D.

Assumptions


Expert Solution
Questions # 25:

Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?

Options:

A.

Hash Key Length


B.

C/R Value Length


C.

C/R Key Length


D.

Hash Value Length


Expert Solution
Questions # 26:

SQL injection attacks are becoming significantly more popular amongst hackers and there has been an estimated 69 percent increase of this attack type.

This exploit is used to great effect by the hacking community since it is the primary way to steal sensitive data from web applications. It takes advantage of non-validated input vulnerabilities to pass SQL commands through a web application for execution by a back-end database.

The below diagram shows how attackers launched SQL injection attacks on web applications.

Question # 26

Which of the following can the attacker use to launch an SQL injection attack?

Options:

A.

Blah' “2=2 –“


B.

Blah' and 2=2 --


C.

Blah' and 1=1 --


D.

Blah' or 1=1 --


Expert Solution
Questions # 27:

What operating system would respond to the following command?

Question # 27

Options:

A.

Mac OS X


B.

Windows XP


C.

Windows 95


D.

FreeBSD


Expert Solution
Questions # 28:

In the process of hacking a web application, attackers manipulate the HTTP requests to subvert the application authorization schemes by modifying input fields that relate to the user ID, username, access group, cost, file names, file identifiers, etc.

They first access the web application using a low privileged account and then escalate privileges to access protected resources. What attack has been carried out?

Options:

A.

XPath Injection Attack


B.

Authorization Attack


C.

Authentication Attack


D.

Frame Injection Attack


Expert Solution
Questions # 29:

Windows stores user passwords in the Security Accounts Manager database (SAM), or in the Active Directory database in domains. Passwords are never stored in clear text; passwords are hashed and the results are stored in the SAM.

NTLM and LM authentication protocols are used to securely store a user's password in the SAM database using different hashing methods.

Question # 29

The SAM file in Windows Server 2008 is located in which of the following locations?

Options:

A.

c:\windows\system32\config\SAM


B.

c:\windows\system32\drivers\SAM


C.

c:\windows\system32\Setup\SAM


D.

c:\windows\system32\Boot\SAM


Expert Solution
Questions # 30:

Transmission Control Protocol (TCP) is a connection-oriented four layer protocol. It is responsible for breaking messages into segments, re-assembling them at the destination station, and re-sending. Which one of the following protocols does not use the TCP?

Options:

A.

Reverse Address Resolution Protocol (RARP)


B.

HTTP (Hypertext Transfer Protocol)


C.

SMTP (Simple Mail Transfer Protocol)


D.

Telnet


Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions