ECCouncil ECSAv8 - EC-Council Certified Security Analyst (ECSA) Exam

Question #1 (Topic: )
Which one of the following is a supporting tool for 802.11 (wireless) packet injections, it
spoofs 802.11 packets to verify whether the access point is valid or not?
A. Airsnort B. Aircrack C. Airpwn D. WEPCrack
Answer: C
Question #2 (Topic: )
During the process of fingerprinting a web application environment, what do you need to do
in order to analyze HTTP and HTTPS request headers and the HTML source code?
A. Examine Source of the Available Pages B. Perform Web Spidering C. Perform Banner Grabbing D. Check the HTTP and HTML Processing by the Browser
Answer: D
Question #3 (Topic: )
The Web parameter tampering attack is based on the manipulation of parameters
exchanged between client and server in order to modify application data, such as user
credentials and permissions, price and quantity of products, etc. Usually, this information is
stored in cookies, hidden form fields, or URL Query Strings, and is used to increase
application functionality and control.
This attack takes advantage of the fact that many programmers rely on hidden or fixed
fields (such as a hidden tag in a form or a parameter in a URL) as the only security
measure for certain operations. Attackers can easily modify these parameters to bypass
the security mechanisms that rely on them.
[ECCouncil-ECSAv8-10.3/ECCouncil-ECSAv8-3_2.png]
What is the best way to protect web applications from parameter tampering attacks?
A. Validating some parameters of the web application B. Minimizing the allowable length of parameters C. Using an easily guessable hashing algorithm D. Applying effective input field filtering parameters
Answer: D
Question #4 (Topic: )
In the process of hacking a web application, attackers manipulate the HTTP requests to
subvert the application authorization schemes by modifying input fields that relate to the
user ID, username, access group, cost, file names, file identifiers, etc. They first access the
web application using a low privileged account and then escalate privileges to access
protected resources. What attack has been carried out?
A. XPath Injection Attack B. Authorization Attack C. Authentication Attack D. Frame Injection Attack
Answer: B
Question #5 (Topic: )
Metasploit framework in an open source platform for vulnerability research, development,
and penetration testing. Which one of the following metasploit options is used to exploit
multiple systems at once?
A. NinjaDontKill B. NinjaHost C. RandomNops D. EnablePython
Answer: A
Download Exam
Page: 1 / 40
Total 200 questions