Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > ECCouncil > ECSA > 412-79v10

412-79v10 EC-Council Certified Security Analyst (ECSA) V10 Question and Answers

Question # 4

Which of the following is a framework of open standards developed by the Internet Engineering Task Force (IETF) that provides secure transmission of the sensitive data over an unprotected medium, such as the Internet?

A.

DNSSEC

B.

Netsec

C.

IKE

D.

IPsec

Full Access
Question # 5

In which of the following firewalls are the incoming or outgoing packets blocked from accessing services for which there is no proxy?

A.

Circuit level firewalls

B.

Packet filters firewalls

C.

Stateful multilayer inspection firewalls

D.

Application level firewalls

Full Access
Question # 6

A penetration test consists of three phases: pre-attack phase, attack phase, and post-attack phase.

Active reconnaissance which includes activities such as network mapping, web profiling, and perimeter mapping is a part which phase(s)?

A.

Post-attack phase

B.

Pre-attack phase and attack phase

C.

Attack phase

D.

Pre-attack phase

Full Access
Question # 7

Which one of the following tools of trade is a commercial shellcode and payload generator written in Python by Dave Aitel?

A.

Microsoft Baseline Security Analyzer (MBSA)

B.

CORE Impact

C.

Canvas

D.

Network Security Analysis Tool (NSAT)

Full Access
Question # 8

Which of the following contents of a pen testing project plan addresses the strengths, weaknesses, opportunities, and threats involved in the project?

A.

Project Goal

B.

Success Factors

C.

Objectives

D.

Assumptions

Full Access
Question # 9

Identify the framework that comprises of five levels to guide agency assessment of their security programs and assist in prioritizing efforts for improvement:

A.

Information System Security Assessment Framework (ISSAF)

B.

Microsoft Internet Security Framework

C.

Nortells Unified Security Framework

D.

Federal Information Technology Security Assessment Framework

Full Access
Question # 10

What is the following command trying to accomplish?

A.

Verify that NETBIOS is running for the 192.168.0.0 network

B.

Verify that TCP port 445 is open for the 192.168.0.0 network

C.

Verify that UDP port 445 is open for the 192.168.0.0 network

D.

Verify that UDP port 445 is closed for the 192.168.0.0 networks

Full Access
Question # 11

Which of the following reports provides a summary of the complete pen testing process, its outcomes, and recommendations?

A.

Vulnerability Report

B.

Executive Report

C.

Client-side test Report

D.

Host Report

Full Access
Question # 12

What operating system would respond to the following command?

A.

Mac OS X

B.

Windows XP

C.

Windows 95

D.

FreeBSD

Full Access
Question # 13

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet.

Why is that?

A.

IPSEC does not work with packet filtering firewalls

B.

NAT does not work with IPSEC

C.

NAT does not work with statefull firewalls

D.

Statefull firewalls do not work with packet filtering firewalls

Full Access
Question # 14

Which one of the following acts related to the information security in the US fix the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting?

A.

California SB 1386

B.

Sarbanes-Oxley 2002

C.

Gramm-Leach-Bliley Act (GLBA)

D.

USA Patriot Act 2001

Full Access
Question # 15

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities:

When you type this and click on search, you receive a pop-up window that says:

"This is a test."

What is the result of this test?

A.

Your website is vulnerable to web bugs

B.

Your website is vulnerable to XSS

C.

Your website is not vulnerable

D.

Your website is vulnerable to SQL injection

Full Access
Question # 16

SQL injection attack consists of insertion or "injection" of either a partial or complete SQL query via the data input or transmitted from the client (browser) to the web application. A successful SQL injection attack can:

i) Read sensitive data from the database

iii) Modify database data (insert/update/delete)

iii) Execute administration operations on the database (such as shutdown the DBMS)

iV) Recover the content of a given file existing on the DBMS file system or write files into the file system

v) Issue commands to the operating system

Pen tester needs to perform various tests to detect SQL injection vulnerability. He has to make a list of all input fields whose values could be used in crafting a SQL query, including the hidden fields of POST requests and then test them separately, trying to interfere with the query and to generate an error.

In which of the following tests is the source code of the application tested in a non-runtime environment to detect the SQL injection vulnerabilities?

A.

Automated Testing

B.

Function Testing

C.

Dynamic Testing

D.

Static Testing

Full Access
Question # 17

Information gathering is performed to:

i) Collect basic information about the target company and its network

ii) Determine the operating system used, platforms running, web server versions, etc.

iii) Find vulnerabilities and exploits

Which of the following pen testing tests yields information about a company’s technology infrastructure?

A.

Searching for web page posting patterns

B.

Analyzing the link popularity of the company’s website

C.

Searching for trade association directories

D.

Searching for a company’s job postings

Full Access
Question # 18

Which one of the following log analysis tools is a Cisco Router Log Format log analyzer and it parses logs, imports them into a SQL database (or its own built-in database), aggregates them, and generates the dynamically filtered reports, all through a web interface?

A.

Event Log Tracker

B.

Sawmill

C.

Syslog Manager

D.

Event Log Explorer

Full Access
Question # 19

Which one of the following architectures has the drawback of internally considering the hosted services individually?

A.

Weak Screened Subnet Architecture

B.

"Inside Versus Outside" Architecture

C.

"Three-Homed Firewall" DMZ Architecture

D.

Strong Screened-Subnet Architecture

Full Access
Question # 20

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

A.

OSPF

B.

BPG

C.

ATM

D.

UDP

Full Access
Question # 21

In Linux, /etc/shadow file stores the real password in encrypted format for user’s account with added properties associated with the user’s password.

In the example of a /etc/shadow file below, what does the bold letter string indicate? 

Vivek: $1$fnffc$GteyHdicpGOfffXX40w#5:13064:0:99999:7

A.

Number of days the user is warned before the expiration date

B.

Minimum number of days required between password changes

C.

Maximum number of days the password is valid

D.

Last password changed

Full Access
Question # 22

Mason is footprinting an organization to gather competitive intelligence. He visits the company's website for contact information and telephone numbers but does not find any. He knows the entire staff directory was listed on their website 12 months. How can he find the directory?

A.

Visit Google’s search engine and view the cached copy

B.

Crawl and download the entire website using the Surfoffline tool and save them to his computer

C.

Visit the company's partners’ and customers' website for this information

D.

Use Way Back Machine in Archive.org web site to retrieve the Internet archive

Full Access
Question # 23

If a web application sends HTTP cookies as its method for transmitting session tokens, it may be vulnerable which of the following attacks?

A.

Parameter tampering Attack

B.

Sql injection attack

C.

Session Hijacking

D.

Cross-site request attack

Full Access
Question # 24

Which Wireshark filter displays all the packets where the IP address of the source host is 10.0.0.7?

A.

ip.dst==10.0.0.7

B.

ip.port==10.0.0.7

C.

ip.src==10.0.0.7

D.

ip.dstport==10.0.0.7

Full Access
Question # 25

Hackers today have an ever-increasing list of weaknesses in the web application structure at their disposal, which they can exploit to accomplish a wide variety of malicious tasks.

New flaws in web application security measures are constantly being researched, both by hackers and by security professionals. Most of these flaws affect all dynamic web applications whilst others are dependent on specific application technologies.

In both cases, one may observe how the evolution and refinement of web technologies also brings about new exploits which compromise sensitive databases, provide access to theoretically secure networks, and pose a threat to the daily operation of online businesses.

What is the biggest threat to Web 2.0 technologies?

A.

SQL Injection Attacks

B.

Service Level Configuration Attacks

C.

Inside Attacks

D.

URL Tampering Attacks

Full Access
Question # 26

You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks. When assessing the risk to the clients network, what step should you take first?

A.

Analyzing, categorizing and prioritizing resources

B.

Evaluating the existing perimeter and internal security

C.

Checking for a written security policy

D.

Analyzing the use of existing management and control architecture

Full Access
Question # 27

You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London.

After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?

A.

RaidSniff

B.

Snort

C.

Ettercap

D.

Airsnort

Full Access
Question # 28

Which of the following acts is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards and applies to all entities involved in payment card processing?

A.

PIPEDA

B.

PCI DSS

C.

Human Rights Act 1998

D.

Data Protection Act 1998

Full Access
Question # 29

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

A.

Use attack as a launching point to penetrate deeper into the network

B.

Demonstrate that no system can be protected against DoS attacks

C.

List weak points on their network

D.

Show outdated equipment so it can be replaced

Full Access
Question # 30

War Driving is the act of moving around a specific area, mapping the population of wireless access points for statistical purposes. These statistics are then used to raise awareness of the security problems associated with these types of networks.

Which one of the following is a Linux based program that exploits the weak IV (Initialization Vector) problem documented with static WEP?

A.

Airsnort

B.

Aircrack

C.

WEPCrack

D.

Airpwn

Full Access