Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ECCouncil 412-79v10 Practice Exam with Questions & Answers | Set: 4

Questions 31

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities:

<script>alert("This is a test.")</script>

When you type this and click on search, you receive a pop-up window that says:

"This is a test."

What is the result of this test?

Options:
A.

Your website is vulnerable to web bugs

B.

Your website is vulnerable to XSS

C.

Your website is not vulnerable

D.

Your website is vulnerable to SQL injection

ECCouncil 412-79v10 Premium Access
Questions 32

Identify the type of authentication mechanism represented below:

412-79v10 Question 32

Options:
A.

NTLMv1

B.

NTLMv2

C.

LAN Manager Hash

D.

Kerberos

Questions 33

In the process of hacking a web application, attackers manipulate the HTTP requests to subvert the application authorization schemes by modifying input fields that relate to the user ID, username, access group, cost, file names, file identifiers, etc.

They first access the web application using a low privileged account and then escalate privileges to access protected resources. What attack has been carried out?

Options:
A.

XPath Injection Attack

B.

Authorization Attack

C.

Authentication Attack

D.

Frame Injection Attack

Questions 34

Rules of Engagement (ROE) document provides certain rights and restriction to the test team for performing the test and helps testers to overcome legal, federal, and policy-related restrictions to use different penetration testing tools and techniques.

412-79v10 Question 34

What is the last step in preparing a Rules of Engagement (ROE) document?

Options:
A.

Conduct a brainstorming session with top management and technical teams

B.

Decide the desired depth for penetration testing

C.

Conduct a brainstorming session with top management and technical teams

D.

Have pre-contract discussions with different pen-testers

Questions 35

George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs.

The state bill requires that an IDS with a "time-based induction machine" be used. What IDS feature must George implement to meet this requirement?

Options:
A.

Pattern matching

B.

Statistical-based anomaly detection

C.

Real-time anomaly detection

D.

Signature-based anomaly detection

Questions 36

In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?

Options:
A.

IPS evasion technique

B.

IDS evasion technique

C.

UDP evasion technique

D.

TTL evasion technique

Questions 37

Which of the following statements is true about the LM hash?

Options:
A.

Disabled in Windows Vista and 7 OSs

B.

Separated into two 8-character strings

C.

Letters are converted to the lowercase

D.

Padded with NULL to 16 characters

Questions 38

The Web parameter tampering attack is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials and permissions, price and quantity of products, etc.

Usually, this information is stored in cookies, hidden form fields, or URL Query Strings, and is used to increase application functionality and control. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag in a form or a parameter in a URL) as the only security measure for certain operations.

Attackers can easily modify these parameters to bypass the security mechanisms that rely on them.

412-79v10 Question 38

What is the best way to protect web applications from parameter tampering attacks?

Options:
A.

Validating some parameters of the web application

B.

Minimizing the allowable length of parameters

C.

Using an easily guessable hashing algorithm

D.

Applying effective input field filtering parameters

Questions 39

Information gathering is performed to:

i) Collect basic information about the target company and its network

ii) Determine the operating system used, platforms running, web server versions, etc.

iii) Find vulnerabilities and exploits

412-79v10 Question 39

Which of the following pen testing tests yields information about a company’s technology infrastructure?

Options:
A.

Searching for web page posting patterns

B.

Analyzing the link popularity of the company’s website

C.

Searching for trade association directories

D.

Searching for a company’s job postings

Questions 40

Output modules allow Snort to be much more flexible in the formatting and presentation of output to its users. Snort has 9 output plug-ins that push out data in different formats. Which one of the following output plug-ins allows alert data to be written in a format easily importable to a database?

Options:
A.

unified

B.

csv

C.

alert_unixsock

D.

alert_fast

Exam Code: 412-79v10
Certification Provider: ECCouncil
Exam Name: EC-Council Certified Security Analyst (ECSA) V10
Last Update: Mar 23, 2025
Questions: 201