Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player


Lets prepare for ECSA exam...

05-Dec.-11


1) Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish?

A. Perform a zone transfer *
B. Perform DNS poisoning
C. Send DOS commands to crash the DNS servers
D. Enumerate all the users in the domain


2) You are a security analyst who has compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. After enumerating the network you discover the Domain Controllers of the company's network. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish?

A. Enumerate domain user accounts and built-in groups *
B. Enumerate MX and A records from DNS
C. Establish a remote connection to the Domain Controller
D. Poison the DNS records with false records


3) You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based in HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.org and view the HTML code of news.com from three years ago. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: What have you found?

A. Web bug *
B. CGI code
C. Trojan.downloader
D. Blind bug


4) Harold is a web designer who completed a website for ghttech.net about a month ago. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure that site has received so far. Harold navigates to google.com and types in the following search What will this search produce?

A. All sites that link to ghttech.net *
B. All sites that ghttech.net links to
C. All search engines that link to .net domains
D. Sites that contain the code: link:www.ghttech.net


5) As part of the reconnaissance you are performing on a network, you use dnstracer to find valuable information. You type in the following command: What information will this return?

A. The PTR record(s) for 164.58.245.134 *
B. The A record(s) for 164.58.245.134
C. The in-addr.arpa record(s) for 164.58.245.134
D. The host file record for 164.58.245.134


6) Larry is the network administrator of a Windows environment. Larry uses a sniffing tool called WinDump to monitor traffic on his network. Larry's friend, who works as a network administrator for another company, saw Larry use WinDump one day and really liked its functionality. The only problem is that Larry's friend administrates a Linux network environment. What equivalent tool could Larry's friend use to monitor network traffic?

A. Tcpdump *
B. Pwdump
C. Httport
D. Xdump



7) You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You do a search for IT jobs on Dice.com and find the following information for an open position: What is this information posted on the job website considered?

A. Information vulnerability *
B. Competitive exploit
C. Social engineering exploit
D. Trade secret


8) What is the following command trying to accomplish?

A. Verify that UDP port 445 is open for the 192.168.0.0 network *
B. Verify that TCP port 445 is open for the 192.168.0.0 network
C. Verify that Netbios is running for the 192.168.0.0 network
D. Verify that UDP port 445 is closed for the 192.168.0.0 network


9) You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

A. List weak points in their network *
B. Show outdated equipment so it can be replaced
C. Use attack as a launching point to penetrate deeper into the network
D. Demonstrate that no system can be protected against DoS attacks


10) Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?

A. %systemroot%\repair *
B. %systemroot%\system32\drivers\etc
C. %systemroot%\system32\LSA
D. %systemroot%\LSA


11) Tom is a systems administrator for a Unix network. He needs to run some brute force attacks on the passwords of his users to ensure that they are abiding by the corporate password policy. Where can Tom find these passwords?

A. /etc/passwd *
B. /drivers/etc/shadow
C. /root/hidden
D. /etc/pwd


12) You are a security analyst performing a penetration test on a company in the Midwest. After some initial reconnaissance, you discover the IP of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers : http://172.168.4.131/level/99/exec/show/config
After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?


A. HTTP Configuration Arbitrary Administrative Access Vulnerability *
B. HTML Configuration Arbitrary Administrative Access Vulnerability
C. Cisco IOS Arbitrary Administrative Access Online Vulnerability
D. URL Obfuscation Arbitrary Administrative Access Vulnerability


13)What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

A. Service account passwords in plain text *
B. Cached password hashes for the past 20 users
C. IAS account names and passwords
D. Local store PKI Kerberos certificates


14) A security analyst is setting up a false survey website that will require users to create a username and a strong password. He sends the link to the site to all the employees of a company. What information will he be able to gather?

A. The employees' network usernames and passwords *
B. Bank account numbers and the corresponding routing numbers
C. The IP address of the employees' computers
D. The MAC address of the employees' computers


15) Why is it essential that security analysts know Cisco routers inside and out?

A. 75% of enterprise routers are Cisco *
B. 90% of enterprise routers are Cisco
C. 75% of Internet core routers are Cisco
D. 90% of Internet core routers are Cisco


16) 30. Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use?

A. Reciprocation *
B. Scarcity
C. Friendship/Liking
D. Social Validation


17) You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks, you change the Group Policy to force 14 character passwords. The next week you dump the SAM database from a domain controller and run a password cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so quickly?

A. Passwords of 14 characters or less are broken up into two 7-character hashes *
B. A password Group Policy change takes at least 3 weeks to completely replicate
throughout a network
C. Networks using Active Directory never use SAM databases so the SAM database
pulled was empty
D. The passwords that were cracked we local accounts on the Domain Controller


18) Why is it a good idea to perform a penetration test from the inside?

A. Because 70% of attacks are from the inside *
B. It is never a good idea to perform a penetration test from the inside
C. To attack a network from a hacker's perspective
D. Because 90% of attacks are from the inside


19) What is the smallest possible Windows shellcode?

A. 800 bytes *
B. 1000 bytes
C. 600 bytes
D. 100 bytes


20) On Linux/Unix based web servers, what privilege should the daemon service be run under?

A. Something other than root *
B. Root
C. You cannot determine what privilege runs the daemon service
D. Guest


21) Jim has performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify that the vulnerability test was correct. The second utility actually is able to execute five known exploits against his network that the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

A. False negatives *
B. False positives
C. True negatives
D. True positives


22) You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code actually rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

A. Metamorphic *
B. Polymorphic
C. Oligomorhic
D. Transmorphic


23) After attending a security seminar on the state of network security, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using a utility mentioned at the seminar, Userinfo, you attempt to establish a null session with one of the servers, and are successful. Why is that?

A. RestrictAnonymous must be set to "2" for complete security *
B. RestrictAnonymous must be set to "3" for complete security
C. RestrictAnonymous must be set to "10" for complete security
D. There is no way to always prevent an anonymous null session from establishing


24) John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located in a subnet that resides deep inside his network. After analyzing the sniffer's logs, he does not see any of the traffic produced by Firewalk. Why is that?

A. Firewalk sets all packets with a TTL of one *
B. Firewalk sets all packets with a TTL of zero
C. Firewalk cannot be detected by network sniffers
D. Firewalk cannot pass through Cisco firewalls


25) Where would you find a list of well known ports on your Windows Server 2003?

A. %systemroot%\system32\drivers\etc\services *
B. %systemroot%\system32\services
C. %systemroot%\system32\WBEM\services
D. %systemroot%\drivers\etc\services


26) An "idle" system is also referred to as what?

A. Zombie *
B. PC not connected to the Internet
C. PC not being used
D. Bot


27) Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

A. Windows computers are constantly talking *
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers will not respond to idle scans


28) If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port, what will be the response?

A. 31401 *
B. 31402
C. 31399
D. The zombie will not send a response


29) Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using NMAP, of a user connected to his web server. Why will Jonathan not be successful?

A. HTTP does not keep a constant session *
B. Only an HTTPS session can be hijacked
C. Only FTP traffic can be hijacked
D. Only DNS traffic can be hijacked


30) How many possible sequence number combinations are there?

A. 4 billion *
B. 320 billion
C. 1 billion
D. 32 million


31) You have SNMP set up in multiple offices of your company. Your SNMP software manager is not receiving data from the other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should be open for SNMP to talk properly? (Select 2)

A. 162 *
B. 161 *
C. 389
D. 445


32) Harold is the senior security analyst for a law firm on the East coast. He wants to test the security of his company's web pages, so he decides to use Form Scalpel from an outside connection through a proxy server over HTTPS. What will be the results from Harold's test?

A. He will be able to extract all the forms from the pages *
B. Form Scalpel will not work over an HTTPS connection
C. Form Scalpel will not work through a proxy server connection
D. Form Scalpel will extract all javascript and perl code


33) In Linux, what is the smallest possible shellcode?

A. 24 bytes *
B. 8 bytes
C. 800 bytes
D. 80 bytes


34) At what layer of the OSI model do routers function on?

A. Three *
B. Four
C. Two
D. Five


35) A packet is sent to a router that does not have the packet's destination address in its route table, how will the packet get to its proper destination?

A. Gateway of last resort *
B. Border Gateway Protocol
C. Root Internet servers
D. Reverse DNS


36) Kim is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

A. OSPF *
B. UDP
C. BPG
D. ATM


37) James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

A. Smurf *
B. Trinoo
C. Fraggle
D. SYN flood


38) You are monitoring your internal network while a security consulting firm attempts various means of network intrusion from the outside. Using ethereal, you notice a large amount of traffic on TCP ports 16660 and 65000. What tool is the consulting firm attempting to use?

A. Stacheldraht *
B. Trinoo
C. TFN 2K
D. Beast


39) After undergoing an external IT audit, George found out that his network was vulnerable to DDoS attacks. What countermeasure could he take to prevent DDoS attacks?

A. Disable direct broadcasts *
B. Enable direct broadcasts
C. Disable BGP
D. Enable BGP


40) You are testing to see if your network is susceptible to ARP poisoning. You set this up by redirecting packets between two hosts to travel through your computer. You set up the packets to use your MAC address. After a short time, both hosts become unresponsive and freeze up completely. What do you need to do to prevent this?

A. You must retransmit the packets to their intended destinations *
B. You must force the packets to transmit to the hosts MAC addresses
C. You must force the packets to send to your IP address first, then to the hosts' IP
addresses
D. You must retransmit the packets through the broadcast address of your computer first


41) Your company's network just finished going through a SAS 70 audit. This audit found that overall, your network is secure, but there are some areas that need improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network?

A. Change the default community string names *
B. Block access to UDP port 171
C. Block access to TCP port 171
D. Block all internal MAC address from using SNMP


42) Victor, who owns a large ISP in Texas, wants to make sure that his company's infrastructure is as secure as possible. He hires an outside security consulting firm that performs tests on his routers. The first test they perform is an attempted DoS attack against his routers' BGP implementation. Fortunately, the DoS attack is not successful. What attempted attack did the consulting company perform?

A. Fuzzing *
B. Blurring
C. Smurfing
D. Ruffing


43) In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

A. The change in the routing fabric to bypass the affected router *
B. More RESET packets to the affected router to get it to power back up
C. RESTART packets to the affected router to get it to power back up
D. STOP packets to all other routers warning of where the attack originated


44) Paulette works for an IT security consulting company that is currently performing an audit for the company ACE Unlimited. Paulette's duties include logging in to all the company's network equipment to ensure the IOS versions are up to date and all the other security settings are as stringent as possible. Paulette presents the following screenshot to her boss so he can inform the client that changes need to be made. From the screenshot, what changes should the client company make?

A. Remove any identifying numbers, names, or version numbers *
B. The banner should have more detail on the version numbers for the network
equipment
C. The banner should not state that only authorized IT personnel may proceed
D. The banner should include the CISCO contact information as well


45) What technology changes all source IP addresses of every packet with its own address before sending out?

A. NAT *
B. MAC filtering
C. AMT
D. Anonymizer


46) What will the following command accomplish?

A. Test ability of a router to handle over-sized packets *
B. Test the ability of a router to handle under-sized packets
C. Test the ability of a WLAN to handle fragmented packets
D. Test the ability of a router to handle fragmented packets


47) Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to asses the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. By turning off what feature would eliminate the ability to easily enumerate this information on your Cisco routers?

A. Cisco Discovery Protocol *
B. Border Gateway Protocol
C. Broadcast System Protocol
D. Simple Network Management Protocol


48) Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

A. CVE *
B. IANA
C. APIPA
D. RIPE


49) Software firewalls work at which layer of the OSI model?

A. Data Link *
B. Network
C. Transport
D. Application


50) Why is a static packet filter firewall not as secure as other types of firewalls?

A. They do not look into the packet past the header information *
B. They cannot restrict IP packets based on their source
C. They cannot restrict IP packets based on their destination
D. They cannot look into the packet at all


51) After attending a security class, William decides to set up a dual-homed proxy for the network of his small business. He installs an extra network card on his computer, creates ACL rules, and enables packet forwarding. William also turns on a sniffer to monitor traffic on his new proxy. He quickly notices that source IPs he added to his ACL are still able to send to his network and through his proxy. Why is William seeing this result?

A. Packet forwarding should be disabled *
B. ACL rules should not be used with a proxy
C. Only one network card should be used for a dual-homed proxy
D. Dual-homed proxies need at least three network cards, two for functionality and one
for monitoring


52) Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers in his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold's needs?

A. Application-level proxy firewall *
B. Packet filtering firewall
C. Circuit-level proxy firewall
D. Data link layer firewall


53) You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow in connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?

A. Statefull firewall *
B. Circuit-level proxy firewall
C. Application-level proxy firewall
D. Packet filtering firewall


54) After undergoing a security audit, it was suggested that a hardened computer be placed in the DMZ to run firewall software. What is this hardened computer called?

A. Bastion host *
B. Perimeter host
C. Bastion firewall
D. Perimeter firewall


55) At what layer of the OSI model does a screened router function on?

A. Network layer *
B. Session layer
C. Data link layer
D. Physical layer


56) For security reasons and to conserve the number of public IP addresses owned by his company, Jason uses NAT to translate the private IPs on his internal network to a private IP. Jason decides to use 192.169.0.0 through 192.169.255.255 for his internal IPs. Jason's company decides to pay for a security audit. Why would the security audit company recommend that Jason change his internal IP address scheme?

A. His IP scheme does not fall under RFC 1918 *
B. His IP scheme does not fall under RFC 19872
C. His IP scheme includes too many Class C networks
D. His IP scheme includes too many class B networks


57) After passing her ECSA exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?

A. NAT does not work with IPSEC *
B. NAT does not work with statefull firewalls



source- by Chan




26-Nov.-11

1) 30. Cat is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Cat calls the main number for the accounting firm and talks to the receptionist. Cat says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Cat says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Cat all the information she asked for. What principal of social engineering did Cat use?

A. Reciprocation *
B. Scarcity
C. Friendship/Liking
D. Social Validation


2) You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks, you change the Group Policy to force 14 character passwords. The next week you dump the SAM database from a domain controller and run a password cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so quickly?

A. Passwords of 14 characters or less are broken up into two 7-character hashes *
B. A password Group Policy change takes at least 3 weeks to completely replicate
throughout a network
C. Networks using Active Directory never use SAM databases so the SAM database
pulled was empty
D. The passwords that were cracked we local accounts on the Domain Controller


3) Why is it a good idea to perform a penetration test from the inside?

A. Because 70% of attacks are from the inside *
B. It is never a good idea to perform a penetration test from the inside
C. To attack a network from a hacker's perspective
D. Because 90% of attacks are from the inside

4) What is the smallest possible Windows shellcode?

A. 800 bytes *
B. 1000 bytes
C. 600 bytes
D. 100 bytes


5) On Linux/Unix based web servers, what privilege should the daemon service be run under?

A. Something other than root *
B. Root
C. You cannot determine what privilege runs the daemon service
D. Guest

6) Micheal has performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify that the vulnerability test was correct. The second utility actually is able to execute five known exploits against his network that the vulnerability analysis said were not exploitable. What kind of results did Micheal receive from his vulnerability analysis?>

A. False negatives *
B. False positives
C. True negatives
D. True positives

7) You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code actually rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

B. Polymorphic
C. Oligomorhic
D. Transmorphic


source- by Chan



23-Nov.-11
1) Micheal is a systems administrator working for a large electronics company in the Midwest. She wants to scan her network quickly to find all the hosts that are alive using ICMP ECHO Requests. What type of scan is Micheal going to perform


A. ICMP ping sweep *
B. Smurf scan
C. Ping trace
D. Tracert


2) John works in an office with about one hundred other employees. John works in the Accounting department, but is very technically savvy. His ex-girlfriend, Cat, works in the Sales department. John wants to find out Cat's network password so he can take a look at her documents on the file server. While Cat is at lunch one day, John logs onto her computer and installs LophtCrack and sets the program to sniff all traffic. John sends Cat an email with a link to \\FileServer1\sales.xls telling her that the file included the sales for last quarter. What information will John be able to gather from this?


A. Cat's network username and password hash *
B. The SID of Cat's network account
C. The SAM file from Cat's computer
D. The network shares that Cat has permissions for


3) Micheal is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Micheal remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Micheal trying to accomplish?

A. Perform a zone transfer *
B. Perform DNS poisoning
C. Send DOS commands to crash the DNS servers
D. Enumerate all the users in the domain


4) You are a security analyst who has compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. After enumerating the network you discover the Domain Controllers of the company's network. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish?

A. Enumerate domain user accounts and built-in groups *
B. Enumerate MX and A records from DNS
C. Establish a remote connection to the Domain Controller
D. Poison the DNS records with false records


5) You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based in HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.org and view the HTML code of news.com from three years ago. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: What have you found?

A. Web bug *
B. CGI code
C. Trojan.downloader
D. Blind bug


6) Micheal is a web designer who completed a website for ghttech.net about a month ago. As part of the maintenance agreement he signed with the client, Micheal is performing research online and seeing how much exposure that site has received so far. Micheal navigates to google.com and types in the following search What will this search produce?


A. All sites that link to ghttech.net *
B. All sites that ghttech.net links to
C. All search engines that link to .net domains
D. Sites that contain the code: link:www.ghttech.net


7) As part of the reconnaissance you are performing on a network, you use dnstracer to find valuable information. You type in the following command: What information will this return?

A. The PTR record(s) for 164.58.245.134 *
B. The A record(s) for 164.58.245.134
C. The in-addr.arpa record(s) for 164.58.245.134
D. The host file record for 164.58.245.134


8) Micheal is the network administrator of a Windows environment. Micheal uses a sniffing tool called WinDump to monitor traffic on his network. Micheal's friend, who works as a network administrator for another company, saw Micheal use WinDump one day and really liked its functionality. The only problem is that Micheal's friend administrates a Linux network environment. What equivalent tool could Micheal's friend use to monitor network traffic?

A. Tcpdump *
B. Pwdump
C. Httport
D. Xdump


9) You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You do a search for IT jobs on Dice.com and find the following information for an open position: What is this information posted on the job website considered?

A. Information vulnerability *
B. Competitive exploit
C. Social engineering exploit
D. Trade secret


10) What is the following command trying to accomplish?


A. Verify that UDP port 445 is open for the 192.168.0.0 network *
B. Verify that TCP port 445 is open for the 192.168.0.0 network
C. Verify that Netbios is running for the 192.168.0.0 network
D. Verify that UDP port 445 is closed for the 192.168.0.0 network


11) You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

A. List weak points in their network *
B. Show outdated equipment so it can be replaced
C. Use attack as a launching point to penetrate deeper into the network
D. Demonstrate that no system can be protected against DoS attacks


source- by Chan





22-Nov.-11
1) Michael is the accounting manager for Grummon and Sons LLC. On a regular basis, he has to send PDF documents containing sensitive information outside his company through email. Michael protects the PDF documents with a password and sends them to their intended recipients. When the IT manager of Michael's company discovers that Michael is only using the password protect feature in Adobe Acrobat, he tells Michael that the password is not enough protection. Why is this?

A. PDF passwords can easily be cracked by software brute force tools*
B. PDF passwords are converted to clear text when sent in email
C. PDF passwords are not considered safe by Sarbanes-Oxley
D. When sent in email, PDF passwords are stripped from the document completely


2) You are an IT security consultant attempting to gain access to the state of New Hampshire's network. After trying numerous routes of attack, you are still unsuccessful. You decide to perform a Google search for ftp.nh.st.us to see if the New Hampshire's network utilized an FTP site. You find information about their FTP site and from there, you are able to perform a thorough scan of the New Hampshire state network. What type of scan have you just performed?

A. FTP bounce scan *
B. FTP backdoor scan
C. SYN scan
D. RPC scan


3) Cat works for a security consulting firm that is currently performing a penetration test on a financial institution. Cat's duties include bypassing the firewalls and switches to gain access to the network. From an outside address, Cat sends an IP packet to one of the company's switches with the ACK bit and the source address of her machine. What is Cat trying to accomplish by sending this IP packet?

A. Trick the switch into thinking it already has a session with Cat's computer *
B. Poison the switch's MAC address table by flooding it with ACK bits
C. Crash the switch with a DoS attack since ACK bits cannot be sent by computers, only
switches
D. Macof attack


4) Michael is the senior security analyst of Kimball Construction Company in Miami, Florida. As part of a yearly security audit, Michael is scanning his entire network to check for vulnerabilities, unknown hosts, and open ports that do not need to be open. Using Nmap, Michael performs an XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

A. Open *
B. Closed
C. Stealth
D. Filtered


5) You are a security analyst working for a private party out of Michaelce. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank's security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of SSH packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?

A. Ettercap *
B. Snort
C. Airsnort
D. Ethercap


6) Michael is a systems administrator working for a large electronics company in the Midwest. She wants to scan her network quickly to find all the hosts that are alive using ICMP ECHO Requests. What type of scan is Michael going to perform?

A. ICMP ping sweep *
B. Smurf scan
C. Ping trace
D. Tracert


7) Michael works in an office with about one hundred other employees. Michael works in the Accounting department, but is very technically savvy. His ex-girlfriend, Cat, works in the Sales department. Michael wants to find out Cat's network password so he can take a look at her documents on the file server. While Cat is at lunch one day, Michael logs onto her computer and installs LophtCrack and sets the program to sniff all traffic. Michael sends Cat an email with a link to \\FileServer1\sales.xls telling her that the file included the sales for last quarter. What information will Michael be able to gather from this?


A. Cat's network username and password hash *
B. The SID of Cat's network account
C. The SAM file from Cat's computer
D. The network shares that Cat has permissions for


8) Michael is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Michael remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Michael trying to accomplish?

A. Perform a zone transfer *
B. Perform DNS poisoning
C. Send DOS commands to crash the DNS servers
D. Enumerate all the users in the domain


9) You are a security analyst who has compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. After enumerating the network you discover the Domain Controllers of the company's network. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish?

A. Enumerate domain user accounts and built-in groups *
B. Enumerate MX and A records from DNS
C. Establish a remote connection to the Domain Controller
D. Poison the DNS records with false records


10) You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based in HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.org and view the HTML code of news.com from three years ago. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: What have you found?

A. Web bug *
B. CGI code
C. Trojan.downloader
D. Blind bug


11) Michael is a web designer who completed a website for ghttech.net about a month ago. As part of the maintenance agreement he signed with the client, Michael is performing research online and seeing how much exposure that site has received so far. Michael navigates to google.com and types in the following search What will this search produce?

A. All sites that link to ghttech.net *
B. All sites that ghttech.net links to
C. All search engines that link to .net domains
D. Sites that contain the code: link:www.ghttech.net


source- by Chan




19-Nov.-11
A. src port 22 and dst port 22 *
B. udp port 22 and host 172.16.28.1/24
C. net port 22
D. src port 23 and dst port 23

A. Anonymizer *
B. FTP proxy
C. Hping2
D. HTTrack

A. Only Unix and Unix-like systems will reply to this scan *
B. Only Windows systems will reply to this scan
C. A switched network will not respond to packets sent to the broadcast address
D. Only servers will reply to this scan


source- by Chan



18-Nov.-11

You just passed your ECSA exam a couple of months ago and are about to start your firstconsulting job running security audits for a financial institution.


1) The IT manager of thecompany you will be working for tries to see if you remember your ECSA class. He asksyou what methodology will you be using to test the company's network.

A. Microsoft Methodology
B. LPT Methodology*
C. Cisco Methodology
D. Google Methodology


2) You are working as an IT security auditor hired by a law firm to test whether you can gain access to sensitive information about the company's clients. You have rummagedthrough their trash and found very little information. You do not want to set off anyalarms on their network, so you plan on performing some passive scans against their system. What tool should you use?

A. Netcraft *
B. Nmap
C. Ping sweep
D. Dig


3) Michael is the accounting manager for Grummon and Sons LLC. On a regular basis, he has to send PDF documents containing sensitive information outside his company through email. Michael protects the PDF documents with a password and sends them to their intended recipients. When the IT manager of Michael's company discovers that Michael is only using the password protect feature in Adobe Acrobat, he tells Michael that the password is not enough protection. Why is this?

A. PDF passwords can easily be cracked by software brute force tools*
B. PDF passwords are converted to clear text when sent in email
C. PDF passwords are not considered safe by Sarbanes-Oxley
D. When sent in email, PDF passwords are stripped from the document completely


source- by Chan




17-Nov.-11

1) Michael is performing a security analysis for Hammond and Sons LLC. His next task will be to test the security of the wireless network. He plans on remaining as "stealthy" as
possible during the scan. Why would a scanner like Nessus not work for his needs?

A. Nessus is too loud *

B. Nessus cannot perform wireless testing

C. Nessus is not a network scanner

D. There are no ways of performing a "stealthy" wireless scan

A. DRDoS *

B. DDoS

C. DoS

D. Smurf

A. Microsoft Methodology

B. LPT Methodology *

C. Cisco Methodology

D. Google Methodology

source- by Chan

 

Copyright © 2010 by cattechie.com. All right reserved:: Designed by: Newsmakers Broadcasting &Communication Pvt.Ltd.