EC-Council Certified Security Analyst v1.0

Page:    1 / 10   
Exam contains 150 questions

You have just completed a database security audit and writing the draft pen testing report.
Which of the following will you include in the recommendation section to enhance the security of the database server?

  • A. Allow direct catalog updates
  • B. Install SQL Server on a domain controller
  • C. Install a certificate to enable SSL connections
  • D. Grant permissions to the public database role


Answer : C

George, a freelance Security Auditor and Penetration Tester, was working on a pen testing assignment for Xsecurity. George is an ESCA certified professional and was following the LPT methodology in performing a comprehensive security assessment of the company. After the initial reconnaissance, scanning and enumeration phases, he successfully recovered a user password and was able to log on to a Linux machine located on the network. He was also able to access the /etc/passwd file; however, the passwords were stored as a single ג€xג€ character.
What will George do to recover the actual encrypted passwords?

  • A. George will perform sniffing to capture the actual passwords
  • B. George will perform replay attack to collect the actual passwords
  • C. George will escalate his privilege to root level and look for /etc/shadow file
  • D. George will perform a password attack using the pre-computed hashes also known as a rainbow attack


Answer : C

An attacker targeted to attack network switches of an organization to steal confidential information such as network subscriber information, passwords, etc. He started transmitting data through one switch to another by creating and sending two 802.1Q tags, one for the attacking switch and the other for victim switch. By sending these frames. The attacker is fooling the victim switch into thinking that the frame is intended for it. The target switch then forwards the frame to the victim port.
Identify the type of attack being performed by the attacker?

  • A. SNMP brute forcing
  • B. MAC flooding
  • C. IP spoofing
  • D. VLAN hopping


Answer : D

Joe, an ECSA certified professional, is working on a pen testing engagement for one of his SME clients. He discovered the host file in one of the Windows machines has the following entry:
213.65.172.55 microsoft.com
After performing a Whois lookup, Joe discovered the IP does not refer to Microsoft.com. The network admin denied modifying the host files.
Which type of attack does this scenario present?

  • A. DNS starvation
  • B. DNS poisoning
  • C. Phishing
  • D. MAC spoofing


Answer : B

The Rhythm Networks Pvt Ltd firm is a group of ethical hackers. Rhythm Networks was asked by their client Zombie to identify how the attacker penetrated their firewall. Rhythm discovered the attacker modified the addressing information of the IP packet header and the source address bits field to bypass the firewall.
What type of firewall bypassing technique was used by the attacker?

  • A. Source routing
  • B. Proxy Server
  • C. HTTP Tunneling
  • D. Anonymous Website Surfing Sites


Answer : C

Todd is working on an assignment involving auditing of a web service. The scanning phase reveals the web service is using an Oracle database server at the backend. He wants to check the TNS Listener configuration file for configuration errors.
Which of the following directories contains the TNS Listener configuration file, by default:

  • A. $ORACLE_HOME/bin
  • B. $ORACLE_HOME/network /admin
  • C. $ORACLE_HOME/network /bin
  • D. $ORACLE_HOME/network


Answer : B

Cedric, who is a software support executive working for Panacx Tech. Inc., was asked to install Ubuntu operating system in the computers present in the organization. After installing the OS, he came to know that there are many unnecessary services and packages in the OS that were automatically installed without his knowledge. Since these services or packages can be potentially harmful and can create various security threats to the host machine, he was asked to disable all the unwanted services.
In order to stop or disable these unnecessary services or packages from the Ubuntu distributions, which of the following commands should Cedric employ?

  • A. # update-rc.d -f [service name] remove
  • B. # chkconfig [service name] ג€"del
  • C. # chkconfig [service name] off
  • D. # service [service name] stop


Answer : C

Jack, a network engineer, is working on an IPv6 implementation for one of his clients. He deployed IPv6 on IPv4 networks using a mechanism where a node can choose from IPv6 or IPv4 based on the DNS value. This makes the network resources work simpler.
What kind of technique did Jack use?

  • A. Dual stacks
  • B. Filtering
  • C. Translation
  • D. Tunneling


Answer : A

Arnold is trying to gain access to a database by inserting exploited query statements with a WHERE clause. He wants to retrieve all the entries from a particular table (e. g. StudName) using the WHERE clause.
What query does Arnold need to write to retrieve the information?

  • A. EXTRACT * FROM StudName WHERE roll_number = 1 order by 1000
  • B. DUMP * FROM StudName WHERE roll_number = 1 AND 1=1ג€"
  • C. SELECT * FROM StudName WHERE roll_number = " or '1' = '1'
  • D. RETRIVE * FROM StudName WHERE roll_number = 1'#


Answer : C

Edward is a penetration tester hired by the OBC Group. He was asked to gather information on the clientג€™s network. As part of the work assigned, Edward needs to find the range of IP addresses and the subnet mask used by the target organization.
What does Edward need to do to get the required information?

  • A. Search for web pages posting patterns and revision numbers
  • B. Search for an appropriate Regional Internet Registry (RIR)
  • C. Search for link popularity of the companyג€™s website
  • D. Search for Trade Association Directories


Answer : B

Karen is a Network engineer at ITSec, a reputed MNC based in Philadelphia, USA. She wants to retrieve the DNS records from the publicly available servers. She searched using Google for the providers DNS Information and found the following sites: http://www.dnsstuff.com https://dnsquery.org
Through these sites she got the DNS records information as she wished.
What information is contained in DNS records?

  • A. Information about the DNS logs.
  • B. Information about local MAC addresses.
  • C. Information such as mail server extensions, IP addresses etc.
  • D. Information about the database servers and its services.


Answer : C

As a part of information gathering, you are given a website URL and asked to identify the operating system using passive OS fingerprinting. When you begin to use p0f tool and browse the website URL, the tool captures the header information of all the packets sent and received, and decodes them. Which among the decoded request/response packets hold the operating system information of the remote operating system?

  • A. SYN
  • B. SYN-ACK
  • C. ACK
  • D. RST


Answer : B

The Finger service displays information such as currently logged-on users, email address, full name, etc. Which among the following ports would you scan to identify this service during a penetration test?

  • A. Port 89
  • B. Port 99
  • C. Port 69
  • D. Port 79


Answer : D

Stuart has successfully cracked the WPA-PSK password during his wireless pen testing assignment. However, he is unable to connect to the access point using this password.
What could be the probable reason?

  • A. It is a rogue access point
  • B. The access point implements another layer of WEP encryption
  • C. The access point implements a signal jammer to protect from attackers
  • D. The access point implements MAC filtering


Answer : D

Veronica, a penetration tester at a top MNC company, is trying to breach the companyג€™s database as a part of SQLi penetration testing. She began to use the
SQLi techniques to test the database security level. She inserted new database commands into the SQL statement and appended a SQL Server EXECUTE command to the vulnerable SQL statements.
Which of the following SQLi techniques was used to attack the database?

  • A. Function call injection
  • B. File inclusion
  • C. Buffer Overflow
  • D. Code injection


Answer : A

Page:    1 / 10   
Exam contains 150 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy