PrepAway - Latest Free Exam Questions & Answers

Category: 412-79v8

Exam 412-79v8: EC-Council Certified Security Analyst (ECSA) v8

Which of the following methods of attempting social engineering is associated with bribing, handing out gifts&

The objective of social engineering pen testing is to test the strength of human factors in a
security chain within the organization. It is often used to raise the level of security awareness
among employees.

The tester should demonstrate extreme care and professionalism during a social
engineering pen test as it might involve legal issues such as violation of privacy and may
result in an embarrassing situation for the organization. Which of the following methods of
attempting social engineering is associated with bribing, handing out gifts, and becoming
involved in a personal relationship to befriend someone inside the company?

Which of the following can the attacker use to launch an SQL injection attack?

SQL injection attacks are becoming significantly more popular amongst hackers and there
has been an estimated 69 percent increase of this attack type. This exploit is used to great
effect by the hacking community since it is the primary way to steal sensitive data from web
applications. It takes advantage of non-validated input vulnerabilities to pass SQL
commands through a web application for execution by a backend database. The below
diagram shows how attackers launchedSQL injection attacks on web applications.

Which of the following can the attacker use to launch an SQL injection attack?


Page 13 of 15« First...1112131415