Eccouncil Certified Security Analyst (ECSA) v10 ECSAv10 ECSA v10 Exam Practice Test

Page: 1 / 14
Total 201 questions
Question 1

A WHERE clause in SQL specifies that a SQL Data Manipulation Language (DML) statement should only affect rows that meet specified criteria. The criteria are expressed in the form of predicates. WHERE clauses are not mandatory clauses of SQL DML statements, but can be used to limit the number of rows affected by a SQL DML statement or returned by a query.

A pen tester is trying to gain access to a database by inserting exploited query statements with a WHERE clause. The pen tester wants to retrieve all the entries from the database using the WHERE clause from a particular table (e.g. StudentTable).

What query does he need to write to retrieve the information?



Answer : C


Question 2

Which of the following statements is true about the LM hash?



Answer : A


Question 3

A framework is a fundamental structure used to support and resolve complex issues. The framework that delivers an efficient set of technologies in order to develop applications which are more secure in using Internet and Intranet is:



Answer : A


Question 4

Software firewalls work at which layer of the OSI model?



Answer : A


Question 5

Which of the following is not a characteristic of a firewall?



Answer : D


Question 6

From where can clues about the underlying application environment can be collected?



Answer : D


Question 7

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitiveinformation about the company clients. You have rummaged through their trash and found very little information.

You do not want to set off any alarms on their network, so you plan on performing passivefoot printing against their Web servers.What tool should you use?



Answer : B


Page:    1 / 14   
Total 201 questions