EC-Council Certified Security Analyst (ECSA)
Question No: 91 – (Topic 2)
In Linux, what is the smallest possible shellcode?
Question No: 92 – (Topic 2)
After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?
Statefull firewalls do not work with packet filtering firewalls
NAT does not work with statefull firewalls
NAT does not work with IPSEC
IPSEC does not work with packet filtering firewalls
Question No: 93 – (Topic 2)
Click on the Exhibit Button
Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette#39;s duties include logging on to all the company#39;s network equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as possible. Paulette presents the following screenshot to her boss so he can inform the client about necessary changes need to be made. From the screenshot, what changes should the client company make?
The banner should not state quot;only authorized IT personnel may proceedquot;
Remove any identifying numbers, names, or version information
The banner should have more detail on the version numbers for the network equipment
The banner should include the Cisco tech support contact information as well
Question No: 94 – (Topic 2)
At what layer of the OSI model do routers function on?
Question No: 95 – (Topic 2)
What is the target host IP in the following command?
A. Firewalk does not scan target hosts
C. This command is using FIN packets, which cannot scan target hosts
Question No: 96 – (Topic 2)
You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls (Select 2)
Question No: 97 – (Topic 2)
What are the security risks of running a quot;repairquot; installation for Windows XP?
Pressing Shift F10 gives the user administrative rights
Pressing Ctrl F10 gives the user administrative rights
There are no security risks when running the quot;repairquot; installation for Windows XP
Pressing Shift F1 gives the user administrative rights
Question No: 98 – (Topic 2)
What will the following command produce on a website login page?What will the following command produce on a website? login page?
SELECT email, passwd, login_id, full_name FROM members
WHERE email = #39;firstname.lastname@example.org#39;; DROP TABLE members; -#39;
This command will not produce anything since the syntax is incorrect
Inserts the Error! Reference source not found. email address into the members table
Retrieves the password for the first user in the members table
Deletes the entire members table
Question No: 99 – (Topic 2)
You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your
product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities:
lt;scriptgt;alert(quot;This is a test.quot;)lt;/scriptgt;
When you type this and click on search, you receive a pop-up window that says: quot;This is a test.quot;
What is the result of this test?
Your website is vulnerable to CSS
Your website is not vulnerable
Your website is vulnerable to SQL injection
Your website is vulnerable to web bugs
Question No: 100 – (Topic 2)
You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?
Topic 3, Volume C
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|