Where should Harold navigate on the computer to find the file?
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?
What search string will you use to locate them?
You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?
What are the security risks of running a “repair” installation for Windows XP?
What are the security risks of running a “repair” installation for Windows XP?
What will the following command produce on a website login page?What will the following command produce on a w
What will the following command produce on a website login page?What will the following command produce on a website? login page?
SELECT email, passwd, login_id, full_name
FROM members
WHERE email = ‘someone@somehwere.com’; DROP TABLE members; –‘
“What is the result of this test?
You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities:
alert(“This is a test.”)
When you type this and click on search, you receive a pop-up window that says:
“This is a test.”
What is the result of this test?
When setting up a wireless network with multiple access points, why is it important to set each access point o
When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?
How would you answer?
You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company’s network. How would you answer?
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
Software firewalls work at which layer of the OSI model?
Software firewalls work at which layer of the OSI model?
Why will this not be viable?
Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?