Pass the ECCouncil ECSA ECSAv10 Questions and answers with CertsForce

Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions
Questions # 51:

Hackers today have an ever-increasing list of weaknesses in the web application structure at their disposal, which they can exploit to accomplish a wide variety of malicious tasks.

Question # 51

New flaws in web application security measures are constantly being researched, both by hackers and by security professionals. Most of these flaws affect all dynamic web applications whilst others are dependent on specific application technologies.

In both cases, one may observe how the evolution and refinement of web technologies also brings about new exploits which compromise sensitive databases, provide access to theoretically secure networks, and pose a threat to the daily operation of online businesses.

What is the biggest threat to Web 2.0 technologies?

Options:

A.

SQL Injection Attacks


B.

Service Level Configuration Attacks


C.

Inside Attacks


D.

URL Tampering Attacks


Expert Solution
Questions # 52:

Firewall is an IP packet filter that enforces the filtering and security policies to the flowing network traffic. Using firewalls in IPv6 is still the best way of protection from low level attacks at the network and transport layers.

Which one of the following cannot handle routing protocols properly?

Options:

A.

“Internet-router-firewall-net architecture”


B.

“Internet-firewall-router-net architecture”


C.

“Internet-firewall/router(edge device)-net architecture”


D.

“Internet-firewall -net architecture”


Expert Solution
Questions # 53:

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code.

While searching through the code, you come across something abnormal:

What have you found?

Options:

A.

Trojan.downloader


B.

Blind bug


C.

Web bug


D.

CGI code


Expert Solution
Questions # 54:

Which of the following equipment could a pen tester use to perform shoulder surfing?

Options:

A.

Binoculars


B.

Painted ultraviolet material


C.

Microphone


D.

All the above


Expert Solution
Questions # 55:

Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and it works well for direct scanning and often works well through firewalls?

Options:

A.

SYN Scan


B.

Connect() scan


C.

XMAS Scan


D.

Null Scan


Expert Solution
Questions # 56:

The framework primarily designed to fulfill a methodical and organized way of addressing five threat classes to network and that can be used to access, plan, manage, and maintain secure computers and communication networks is:

Options:

A.

Nortells Unified Security Framework


B.

The IBM Security Framework


C.

Bell Labs Network Security Framework


D.

Microsoft Internet Security Framework


Expert Solution
Questions # 57:

Identify the port numbers used by POP3 and POP3S protocols.

Options:

A.

113 and 981


B.

111 and 982


C.

110 and 995


D.

109 and 973


Expert Solution
Questions # 58:

An antenna is a device that is designed to transmit and receive the electromagnetic waves that are generally called radio waves. Which one of the following types of antenna is developed from waveguide technology?

Options:

A.

Leaky Wave Antennas


B.

Aperture Antennas


C.

Reflector Antenna


D.

Directional Antenna


Expert Solution
Questions # 59:

Rules of Engagement (ROE) document provides certain rights and restriction to the test team for performing the test and helps testers to overcome legal, federal, and policy-related restrictions to use different penetration testing tools and techniques.

Question # 59

What is the last step in preparing a Rules of Engagement (ROE) document?

Options:

A.

Conduct a brainstorming session with top management and technical teams


B.

Decide the desired depth for penetration testing


C.

Conduct a brainstorming session with top management and technical teams


D.

Have pre-contract discussions with different pen-testers


Expert Solution
Questions # 60:

DNS information records provide important data about:

Options:

A.

Phone and Fax Numbers


B.

Location and Type of Servers


C.

Agents Providing Service to Company Staff


D.

New Customer


Expert Solution
Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions