[Free] 2018(Jan) EnsurePass Testking ECCouncil ECSAv8 Dumps with VCE and PDF 21-30

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released ECSAv8
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified Security Analyst (ECSA)

Question No: 21

Which of the following is not the SQL injection attack character?

  1. $

  2. PRINT

  3. #

  4. @@variable

Answer: A

Question No: 22

Application security assessment is one of the activity that a pen tester performs in the attack phase. It is designed to identify and assess threats to the organization through bespoke, proprietary applications or systems. It checks the application so that a malicious user cannot access, modify, or destroy data or services within the system.

Ensurepass 2018 PDF and VCE

Identify the type of application security assessment which analyzes the application-based code to confirm that it does not contain any sensitive information that an attacker might use to exploit an application.

  1. Web Penetration Testing

  2. Functionality Testing

  3. Authorization Testing

  4. Source Code Review

Answer: D

Question No: 23

Why is a legal agreement important to have before launching a penetration test?

Ensurepass 2018 PDF and VCE

  1. Guarantees your consultant fees

  2. Allows you to perform a penetration test without the knowledge and consent of the organization#39;s upper management

  3. It establishes the legality of the penetration test by documenting the scope of the project and the consent of the company.

  4. It is important to ensure that the target organization has implemented mandatory security policies

Answer: C

Question No: 24

Which Wireshark filter displays all the packets where the IP address of the source host is

Ensurepass 2018 PDF and VCE

A. ip.dst==

B. ip.port==

C. ip.src==

D. ip.dstport==

Answer: C

Question No: 25

One needs to run “Scan Server Configuration” tool to allow a remote connection to Nessus from the remote Nessus clients. This tool allows the port and bound interface of the Nessus daemon to be configured. By default, the Nessus daemon listens to connections on which one of the following?

  1. Localhost ( and port 1241

  2. Localhost ( and port 1240

  3. Localhost ( and port 1246

  4. Localhost ( and port 1243

Answer: A

Question No: 26

Identify the type of authentication mechanism represented below:

Ensurepass 2018 PDF and VCE

  1. NTLMv1

  2. NTLMv2

  3. LAN Manager Hash

  4. Kerberos

Answer: D Explanation:

The client authenticates itself to the Authentication Server (AS) which forwards the username to a key distribution center (KDC). The KDC issues a ticket granting ticket (TGT), which is time stamped, encrypts it using the user#39;s password and returns the encrypted result to the user#39;s workstation. This is done infrequently, typically at user logon; the TGT expires at some point, though may be transparently renewed by the user#39;s session manager while they are logged in.

When the client needs to communicate with another node (quot;principalquot; in Kerberos parlance) the client sends the TGT to the ticket granting service (TGS), which usually shares the

same host as the KDC. After verifying the TGT is valid and the user is permitted to access the requested service, the TGS issues a ticket and session keys, which are returned to the client. The client then sends the ticket to the service server (SS) along with its service request.

Reference: http://en.wikipedia.org/wiki/Kerberos_(protocol)

Question No: 27

Identify the injection attack represented in the diagram below:

Ensurepass 2018 PDF and VCE

  1. XPath Injection Attack

  2. XML Request Attack

  3. XML Injection Attack

  4. Frame Injection Attack

Answer: C

Reference: http://projects.webappsec.org/w/page/13247004/XML Injection

Question No: 28

In Linux, /etc/shadow file stores the real password in encrypted format for user’s account with added properties associated with the user’s password.

Ensurepass 2018 PDF and VCE

In the example of a /etc/shadow file below, what does the bold letter string indicate? Vivek: $1$fnffc$GteyHdicpGOfffXX40w#5:13064:0:99999:7

  1. Number of days the user is warned before the expiration date

  2. Minimum number of days required between password changes

  3. Maximum number of days the password is valid

  4. Last password changed

Answer: B

Reference: http://www.cyberciti.biz/faq/understanding-etcshadow-file/ (bullet # 4)

Question No: 29

Which of the following is NOT generally included in a quote for penetration testing services?

  1. Type of testing carried out

  2. Type of testers involved

  3. Budget required

  4. Expected timescale required to finish the project

Answer: B

Question No: 30

Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?

  1. Threat-Assessment Phase

  2. Pre-Assessment Phase

  3. Assessment Phase

  4. Post-Assessment Phase

Answer: B

100% Ensurepass Free Download!
Download Free Demo:ECSAv8 Demo PDF
100% Ensurepass Free Guaranteed!
ECSAv8 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No