EC-Council 412-79V10 EC-Council Certified Security Analyst (ECSA) V10 Online Training
EC-Council 412-79V10 Online Training
The questions for 412-79V10 were last updated at Nov 22,2024.
- Exam Code: 412-79V10
- Exam Name: EC-Council Certified Security Analyst (ECSA) V10
- Certification Provider: EC-Council
- Latest update: Nov 22,2024
A WHERE clause in SQL specifies that a SQL Data Manipulation Language (DML) statement should only affect rows that meet specified criteria. The criteria are expressed in the form of predicates. WHERE clauses are not mandatory clauses of SQL DML statements, but can be used to limit the number of rows affected by a SQL DML statement or returned by a query.
A pen tester is trying to gain access to a database by inserting exploited query statements with a WHERE clause. The pen tester wants to retrieve all the entries from the database using the WHERE clause from a particular table (e.g. StudentTable).
What query does he need to write to retrieve the information?
- A . EXTRACT* FROM StudentTable WHERE roll_number = 1 order by 1000
- B . DUMP * FROM StudentTable WHERE roll_number = 1 AND 1=1―
- C . SELECT * FROM StudentTable WHERE roll_number = ” or ‘1’ = ‘1‘
- D . RETRIVE * FROM StudentTable WHERE roll_number = 1’#
Which of the following has an offset field that specifies the length of the header and data?
- A . IP Header
- B . UDP Header
- C . ICMP Header
- D . TCP Header
War Driving is the act of moving around a specific area, mapping the population of wireless access points for statistical purposes. These statistics are then used to raise awareness of the security problems associated with these types of networks.
Which one of the following is a Linux based program that exploits the weak IV (Initialization Vector) problem documented with static WEP?
- A . Airsnort
- B . Aircrack
- C . WEPCrack
- D . Airpwn
Which one of the following tools of trade is an automated, comprehensive penetration testing product for assessing the specific information security threats to an organization?
- A . Sunbelt Network Security Inspector (SNSI)
- B . CORE Impact
- C . Canvas
- D . Microsoft Baseline Security Analyzer (MBSA)
Which of the following methods is used to perform server discovery?
- A . Banner Grabbing
- B . Who is Lookup
- C . SQL Injection
- D . Session Hijacking
A penetration test will show you the vulnerabilities in the target system and the risks associated with it. An educated valuation of the risk will be performed so that the vulnerabilities can be reported as High/Medium/Low risk issues.
What are the two types of ‘white-box’ penetration testing?
- A . Announced testing and blind testing
- B . Blind testing and double blind testing
- C . Blind testing and unannounced testing
- D . Announced testing and unannounced testing
The objective of social engineering pen testing is to test the strength of human factors in a security chain within the organization. It is often used to raise the level of security awareness among employees.
The tester should demonstrate extreme care and professionalism during a social engineering pen test as it might involve legal issues such as violation of privacy and may result in an embarrassing situation for the organization.
Which of the following methods of attempting social engineering is associated with bribing, handing out gifts, and becoming involved in a personal relationship to befriend someone inside the company?
- A . Accomplice social engineering technique
- B . Identity theft
- C . Dumpster diving
- D . Phishing social engineering technique
What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?
- A . Server Side Includes
- B . Sort Server Includes
- C . Server Sort Includes
- D . Slide Server Includes
During the process of fingerprinting a web application environment, what do you need to do in order to analyze HTTP and HTTPS request headers and the HTML source code?
- A . Examine Source of the Available Pages
- B . Perform Web Spidering
- C . Perform Banner Grabbing
- D . Check the HTTP and HTML Processing by the Browser
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address.
Only five hosts responds to your ICMP pings; definitely not the number of hosts you were expecting.
Why did this ping sweep only produce a few responses?
- A . A switched network will not respond to packets sent to the broadcast address
- B . Only IBM AS/400 will reply to this scan
- C . Only Unix and Unix-like systems will reply to this scan
- D . Only Windows systems will reply to this scan