PrepAway - Latest Free Exam Questions & Answers

Category: 412-79v8

Exam 412-79v8: EC-Council Certified Security Analyst (ECSA) v8

What is the best way to protect web applications from parameter tampering attacks?

The Web parameter tampering attack is based on the manipulation of parameters
exchanged between client and server in order to modify application data, such as user
credentials and permissions, price and quantity of products, etc. Usually, this information is
stored in cookies, hidden form fields, or URL Query Strings, and is used to increase
application functionality and control. This attack takes advantage of the fact that many
programmers rely on hidden or fixed fields (such as a hidden tag in a form or a parameter in
a URL) as the only security measure for certain operations. Attackers can easily modify
these parameters to bypass the security mechanisms that rely on them.

What is the best way to protect web applications from parameter tampering attacks?

What type of attack would you launch after successfully deploying ARP spoofing?

ARP spoofing is a technique whereby an attacker sends fake (“spoofed”) Address
Resolution Protocol (ARP) messages onto a Local Area Network. Generally, the aim is to
associate the attacker’s MAC address with the IP address of another host (such as the
default gateway), causing any traffic meant for that IP address to be sent to the attacker
instead. ARP spoofing attack is used as an opening for other attacks.

What type of attack would you launch after successfully deploying ARP spoofing?

Which agreement requires a signature from both the parties (the penetration tester and the company)?

Amazon Consulting Corporation provides penetration testing and managed security services
to companies. Legality and regulatory compliance is one of the important components in
conducting a successful security audit. Before starting a test, one of the agreements both the
parties need to sign relates to limitations, constraints, liabilities, code of conduct, and
indemnification considerations between the parties.

Which agreement requires a signature from both the parties (the penetration tester and the company)?


Page 3 of 1512345...10...Last »