Free ECSAv10 Exam Braindumps (page: 14)

Page 14 of 52

An automated electronic mail message from a mail system which indicates that the user does not exist on that server is called as?

  1. SMTP Queue Bouncing
  2. SMTP Message Bouncing
  3. SMTP Server Bouncing
  4. SMTP Mail Bouncing

Answer(s): D



You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks. When assessing the risk to the clients network, what step should you take first?

  1. Analyzing, categorizing and prioritizing resources
  2. Evaluating the existing perimeter and internal security
  3. Checking for a written security policy
  4. Analyzing the use of existing management and control architecture

Answer(s): C



Today, most organizations would agree that their most valuable IT assets reside within applications and databases. Most would probably also agree that these are areas that have the weakest levels of security, thus making them the prime target for malicious activity from system administrators, DBAs, contractors, consultants, partners, and customers.



Which of the following flaws refers to an application using poorly written encryption code to securely encrypt and store sensitive data in the database and allows an attacker to steal or modify weakly protected data such as credit card numbers, SSNs, and other authentication credentials?

  1. SSI injection attack
  2. Insecure cryptographic storage attack
  3. Hidden field manipulation attack
  4. Man-in-the-Middle attack

Answer(s): B



A pen tester has extracted a database name by using a blind SQL injection. Now he begins to test the table inside the database using the below query and finds the table:
http://juggyboy.com/page.aspx?id=1; IF (LEN(SELECT TOP 1 NAME from sysobjects where xtype='U')=3) WAITFOR DELAY '00:00:10'--

http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),1,1)))=101) WAITFOR DELAY '00:00:10'--
http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),2,1)))=109) WAITFOR DELAY '00:00:10'--
http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),3,1)))=112) WAITFOR DELAY '00:00:10'--
What is the table name?

  1. CTS
  2. QRT
  3. EMP
  4. ABC

Answer(s): C



Page 14 of 52



Post your Comments and Discuss EC-Council ECSAv10 exam with other Community members:

Calisto MF Moniz commented on October 12, 2024
No comment for this form for the time being.
Anonymous
upvote

Calisto MF Moniz commented on October 12, 2024
Good mechanism for Security expertise practices!
Anonymous
upvote

Raymond commented on July 06, 2021
This is my second purchase. I passed first exam already.
MEXICO
upvote