Certbus > EC-COUNCIL > ECSA > ECSAv8 > ECSAv8 Online Practice Questions and Answers

ECSAv8 Online Practice Questions and Answers

Questions 4

Which of the following is an application alert returned by a web application that helps an attacker guess a valid username?

A. Invalid username or password

B. Account username was not found

C. Incorrect password

D. Username or password incorrect

Browse 200 Q&As
Questions 5

Which of the following appendices gives detailed lists of all the technical terms used in the report?

A. Required Work Efforts

B. References

C. Research

D. Glossary

Browse 200 Q&As
Questions 6

An external intrusion test and analysis identify security weaknesses and strengths of the client's systems and networks as they appear from outside the client's security perimeter, usually from the Internet. The goal of an external intrusion test and analysis is to demonstrate the existence of known vulnerabilities that could be exploited by an external attacker.

During external penetration testing, which of the following scanning techniques allow you to determine a port's state without making a full connection to the host?

A. XMAS Scan

B. SYN scan

C. FIN Scan

D. NULL Scan

Browse 200 Q&As
Questions 7

From where can clues about the underlying application environment can be collected?

A. From the extension of the file

B. From executable file

C. From file types and directories

D. From source code

Browse 200 Q&As
Questions 8

What is a goal of the penetration testing report?

A. The penetration testing report helps you comply with local laws and regulations related to environmental conditions in the organization.

B. The penetration testing report allows you to sleep better at night thinking your organization is protected

C. The pen testing report helps executive management to make decisions on implementing security controls in the organization and helps the security team implement security controls and patch any flaws discovered during testing.

D. The penetration testing report allows you to increase sales performance by effectively communicating with the internal security team.

Browse 200 Q&As
Questions 9

A penetration test will show you the vulnerabilities in the target system and the risks associated with it. An educated valuation of the risk will be performed so that the vulnerabilities can be reported as High/ Medium/Low risk issues.

What are the two types of `white-box' penetration testing?

A. Announced testing and blind testing

B. Blind testing and double blind testing

C. Blind testing and unannounced testing

D. Announced testing and unannounced testing

Browse 200 Q&As
Questions 10

In a TCP packet filtering firewall, traffic is filtered based on specified session rules, such as when a session is initiated by a recognized computer.

Identify the level up to which the unknown traffic is allowed into the network stack.

A. Level 5 ?Application

B. Level 2 ?Data Link

C. Level 4 ?TCP

D. Level 3 ?Internet Protocol (IP)

Browse 200 Q&As
Questions 11

What is the maximum value of a "tinyint" field in most database systems?

A. 222

B. 224 or more

C. 240 or less

D. 225 or more

Browse 200 Q&As
Questions 12

In Linux, /etc/shadow file stores the real password in encrypted format for user's account with added properties associated with the user's password.

In the example of a /etc/shadow file below, what does the bold letter string indicate? Vivek: $1$fnffc$GteyHdicpGOfffXX40w#5:13064:0:99999:7

A. Number of days the user is warned before the expiration date

B. Minimum number of days required between password changes

C. Maximum number of days the password is valid

D. Last password changed

Browse 200 Q&As
Questions 13

Transmission control protocol accepts data from a data stream, divides it into chunks, and adds a TCP header creating a TCP segment.

The TCP header is the first 24 bytes of a TCP segment that contains the parameters and state of an endto-end TCP socket. It is used to track the state of communication between two TCP endpoints.

For a connection to be established or initialized, the two hosts must synchronize. The synchronization requires each side to send its own initial sequence number and to receive a confirmation of exchange in an acknowledgment (ACK) from the other side

The below diagram shows the TCP Header format: How many bits is a acknowledgement number?

A. 16 bits

B. 32 bits

C. 8 bits

D. 24 bits

Browse 200 Q&As
Questions 14

An attacker injects malicious query strings in user input fields to bypass web service authentication mechanisms and to access back-end databases. Which of the following attacks is this?

A. Frame Injection Attack

B. LDAP Injection Attack

C. XPath Injection Attack

D. SOAP Injection Attack

Browse 200 Q&As
Questions 15

Which of the following methods is used to perform server discovery?

A. Banner Grabbing

B. Whois Lookup

C. SQL Injection

D. Session Hijacking

Browse 200 Q&As
Questions 16

Which of the following documents helps in creating a confidential relationship between the pen tester and client to protect critical and confidential information or trade secrets?

A. Penetration Testing Agreement

B. Rules of Behavior Agreement

C. Liability Insurance

D. Non-Disclosure Agreement

Browse 200 Q&As
Questions 17

DNS information records provide important data about:

A. Phone and Fax Numbers

B. Location and Type of Servers

C. Agents Providing Service to Company Staff

D. New Customer

Browse 200 Q&As
Questions 18

A firewall's decision to forward or reject traffic in network filtering is dependent upon which of the following?

A. Destination address

B. Port numbers

C. Source address

D. Protocol used

Browse 200 Q&As
Exam Code: ECSAv8
Exam Name: EC-Council Certified Security Analyst (ECSA)
Last Update: Apr 12, 2024
Questions: 200 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99