ECSA Exam Preparation Questions
1. A
company has asked a security professional, William to analyze one of
its client’s networks, which was apparently compromised recently.
William performed a penetration test to identify the vulnerability
which allowed the attack. He used a buffer overflow exploit to carry
some hidden malicious code in encrypted format bypassing the IDS and
compromised the network.
Which
of the following techniques did William use to bypass the IDS and
penetrate through the network?
- Signature Encoding
- Unicode Evasion
- Ping Flooding
- Polymorphic Shellcode
2.
Joe,
an ECSA certified professional, is working on a pen testing
engagement for one of his SME clients. He discovered the host file in
one of the Windows machines has the following entry:
213.65.172.55
microsoft.com
After
performing a Whois lookup, Joe discovered the IP does not refer to
Microsoft.com. The network admin denied modifying the host files.
Which
type of attack does this scenario present?
- DNS starvation
- MAC spoofing
- Phishing
- DNS poisoning
3.
Which
type of penetration testing will require you to send the Internal
Control
Questionnaires (ICQ) to the client?
- Black-box testing
- Unannounced testing
- Blind testing
- White-box testing
4.
During
the reconnaissance phase of a penetration test, you discovered that
the client has deployed a firewall that only checks the TCP header
information.
Which
of the following techniques would you use to bypass the firewall?
- Bypassing the firewall source routing
- Bypassing the firewall by manipulating the IPID sequence number
- Bypassing the firewall using the IP address in place of an URL
- Bypassing the firewall using tiny fragments
5.
The
security team found the network switch has changed its behavior to
learning mode and is functioning like a hub. The CAM table of the
switch was filled with unnecessary traffic. Someone tried to
penetrate into the network space by attacking the network switches.
They wrote a report and submitted to higher authorities.
What
kind of an attack did the attackers perform against the network
switch?
- MAC Flooding
- DNS Poisoning
- MITM Attack
- ARP Poisoning
6.
A large IT based company hired Gary, a penetration tester, to perform
mobile penetration testing in the organization. Gary knows that
mobile penetration testing requires rooting/jailbreaking of mobile
devices. Gary observed that most of the employees in the organization
are using iPhones.
Which
of the following tools should Gary use to jailbreak the mobile
devices?
- SuperOneClick
- One Click Root
- Pangu
- Superboot
7.
Alisa
is a Network Security Manager at Adios Cyber Security. During a
regular network audit, she sent specially crafted ICMP packet
fragments with different offset values into the network, causing a
system crash.
Which
attack is Alisa trying to perform?
- Fraggle attack
- Smurf attack
- Ping-of-death attack
- Session hijacking
8.
Analyze the packet capture from Wireshark below and mark the correct
statement.
- It is a DNS response message
- It is an invalid DNS query
- It is Host ( A record ) DNS query message
- It is an answer to the iterative query from Microsoft.com DNS server
What
phase of the penetration testing is the Anthony currently in?
- Remediation phase
- Post-attack phase
- Attack phase
- Pre-attack phase
10.
While
auditing a web application for vulnerabilities, Donald uses Burp
proxy and modifies the get request as below:
What
Donald is trying to achieve?
- Donald is trying to upload /etc/password file to the web server root folder
- Donald is modifying process.php file to extract /etc/password file
- Donald is trying directory traversal to extract /etc/password file
- Donald is trying SQL injection to extract the contents of /etc/password file
11.
WinSoftech
hired Steven a penetration tester to check if the company’s SQL
database is vulnerable to attacks or not. He performed a penetration
test on the company’s database by appending an additional SQL query
after escaping the original query and found the database is
vulnerable to SQL injection.
Which
of the following SQL injection techniques is performed by Steven?
- Command Injection
- Batch Query injection
- Union Query Injection
- Tautological injection
12.
Frank
is performing a wireless pen testing for an organization. Using
different wireless attack techniques, he successfully cracked the
WPA-PSK key. He is trying to connect to the wireless network using
the WPA-PSK key. However, he is unable to connect to the WLAN as the
target is using MAC filtering.
What
would be the easiest way for Frank to circumvent this and connect to
the WLAN?
- Crack the Wi-Fi router login credentials and disable the ACL
- Sniff traffic off the WLAN and spoof his MAC address to the one that he has captured
- Use deauth command from aircrack-ng to deauthenticate a connected user and hijack the session
- Attempt to crack the WEP key
13.
Alice is working a pentesting assignment. She succeeded in stealing a
secure cookie via a XSS attack. She is able to replay the cookie even
while the session is valid on the server.
Why
is possible?
- Any cookie can be replayed irrespective of the session status
- It works because encryption is performed at the application layer (single encryption key)
- The scenario is invalid as a secure cookie cannot be replayed
- She passes the cookie through an HTTPS session
14.
Analyze the WSDL document below:
<?xml
version="l.O・encoding="U
TF-S' standalone= ' no' ?>
-
<SOAP-ENV: Envelope )(mlns: SOAPSDK1="http://www.w3.org/2001/
XMLschema'
xmlns:
SOAPSDK2="http ://www .w3 .org/200 l/XMLSchem.o- inst.once"
xmlns:
SOAPSDK3="http://schemas .xmlso.op .org/soap/ encoding/' xmlns:
SOAPENV=
'
http://schemas .xmlsoap .org/soap/ envelope/'>
-
<SOAP- ENV:Body>
-
<SOAPSDK 4: GetProdLJctInformationByName
xmlns:
SOAPSDK4=' http://sfaustlap/ProductInfo/'>
<SOAPSDK4:
name>' </SOAPSDK4: name>
<SOAPSDK4:
uid>312 - 111 - 8543</SOAPSDK4: uid>
<SOAPSDK4:
password> 5648</SOAPSDK4: password>
</SOAPSDK
4: GetProduct Information B y Name>
</SOAP-ENV:
Body>
</SOAP-ENV:
Envelope>
Thomas,
a pen tester, enters a tick mark (‘) for user name. What Thomas is
trying to achieve?
- The tick mark (‘) will result in error and Jason can gather information about the web service
- The tick mark (‘) will enable Jason to extract usernames of all the users using the web service
- The tick mark (‘) will result in buffer overflow and crash the web service
- The tick mark (‘) will help Jason to extract the underlying database
15.
Karen was running port scans on each machine of her network in order
to identify suspicious ports on the target machines. She observed the
following results during the port scan of a particular machine.
I.
Some of the ports were not being acknowledged, i.e. no
acknowledgement from the target machine
II.
Some ports were responding with SYN + ACK packets
III.
Some ports were responding with a RST packet
What
should she interpret for the ports that did not return the
acknowledgment?
- She should treat those ports as Open ports
- She should treat those ports as Closed ports
- She should treat those ports as Half Open ports
- She should treat those ports as Stealth ports
16.
Martin
is performing an internal pentest for one of his clients. The client
has provided him with the necessary information. The scope of the
test allows Martin to exploit the vulnerabilities discovered during
the vulnerability scans. He is permitted to attempt attacks including
Denial-of-Service (DoS) and Buffer Overflow.
How
can you categorize the scope of this pentest?
- Nondestructive black-box test
- Black-box test
- Destructive black-box test
- Destructive test
17.
A
firm named SYS networks suffers from a wireless attack. They hired
Mr. Shaw, a wireless penetration test engineer to rectify the
problem. Mr. Shaw proceeds with the standard steps of wireless
penetrating testing. He was trying to crack static WEP keys, where he
first monitors the wireless traffic with airmon-ng tool and then
tries to collect the wireless traffic data using airodump-ng.
Which
of the following airodump-ng commands will help him to do this?
- C:\>airodump-ng -d 11 wlan0
- C:\>aircrack-ng -s capture.ivs
- C:\>airodump-ng --ivs --write capture eth1
- C:\>airodump-ng -c 11 wlan0
18.
Richard,
a penetration tester was asked to assess a web application. During
the assessment, he discovered a file upload field where users can
upload their profile pictures. While scanning the page for
vulnerabilities, Richard found a file upload exploit on the web site.
Richard wants to test the web application by uploading a malicious
PHP shell, but the web page denied the file upload. Trying to get
around the security, Richard added the ‘jpg’ extension to the end
of the file. The new file name ended with ‘.php.jpg’. He then
used the Burp suite tool and removed the ‘jpg’ extension from the
request while uploading the file. This enabled him to successfully
upload the PHP shell.
Which
of the following techniques has Richard implemented to upload the PHP
shell?
- Session stealing
- Parameter tampering
- Cross site scripting
- Cookie tampering
19.
Jack,
a network engineer, is working on an IPv6 implementation for one of
his clients. He deployed IPv6 on IPv4 networks using a mechanism
where a node can choose from IPv6 or IPv4 based on the DNS value.
This makes the network resources work simpler.
What
kind of a technique did Jack use?
- Tunneling
- Dual stacks
- Translation
- Filtering
20.
Jacob,
a compliance officer with a top MNC based out of Florida, has
received reports that a competitor of the company has used and
branded some of its copyrighted software application codes. He wants
to pursue a case against the competitor.
Which
of the following laws will Jacob specifically invoke in this case?
- Health Insurance Portability and Accountability Act (HIPAA)
- Sarbanes Oxley Act (SOX)
- Gramm-Leach-Bliley Act (GLBA)
- The Digital Millennium Copyright Act (DMCA)
21.
National
Insurance, a large insurance services provider based out of Atlanta,
US, was worried about the security of their information assets due to
an increase in the number of data breaches occurring around the
world. The company requested Anthony, to perform a comprehensive
security audit of the company’s information systems. Anthony,
decided to collect some preliminary information about National
Insurance’s network. During this phase, Anthony used the 46Bouncer
utility to understand the complexity of his new assignment.
What
is Anthony trying to ascertain by using the 46Bouncer utility?
- The use of IPv6 in the company’s network
- The type of perimeter security solutions used in the company’s network
- Deployment of a honeypot in the company’s network
- The use of mail servers in the company’s network
22.
Stanley,
a pen tester needs to perform various tests to detect SQL injection
vulnerabilities. He has to make a list of all input fields whose
values could be used in crafting a SQL query. This includes the
hidden fields of POST requests and then test them separately,
attempting to interfere with the query and cause an error to generate
as a result. In which of the following tests is the source code of
the application tested in a nonruntime environment to detect the SQL
injection vulnerabilities?
- Function Testing
- Static Testing
- Dynamic Testing
- Source Code Testing
23.
Adam
is working as a senior penetration tester at Eon Tech Services Ltd.
The company asked him to perform penetration testing on their
database. The company informs Adam they use Microsoft SQL Server. As
a part of the penetration testing, Adam wants to know the complete
information about the company’s database. He uses the Nmap tool to
get the information.
Which
of the following Nmap commands will Adam use to get the information?
- nmap -p1443 --script ms-sql-info
- nmap -p1521 --script ms-sql-info
- nmap -p1801 --script ms-sql-info
- nmap -p2051 --script ms-sql-info
24.
Lee
has established a new startup where they develop android
applications. In order to meet memory requirements of the company,
Lee has hired a Cloud Service Provider, who offered memory space
along with virtual systems. Lee was dissatisfied with their service
and wanted to move to another CSP, but was denied as a part of the
contract, which reads that the user cannot switch to another CSP.
What
is this condition called?
- Virtualization
- Lock-in
- Resource Isolation
- Lock-up
25.
Watson
is a security analyst specialized in mobile penetration testing who
works at Regional Secure Inc. The company’s senior management asked
him to check the company’s mobile communication network for
vulnerabilities. He performed a penetration test and determined that
the network is vulnerable to MITM attacks.
Which
of the following mobile penetration tests did Watson execute to
determine the attack?
- Server-side Infrastructure Pen Testing
- Application Penetration Testing
- Communication Channel Penetration Testing
26. Which
port does DHCP use for client connections?
- UDP port 68
- UDP port 69
- UDP port 66
- UDP port 67
27.
Sam
is auditing a web application for SQL injection vulnerabilities.
During the testing, Sam discovered that the web application is
vulnerable to SQL injection. He starts fuzzing the search field in
the web application with UNION based SQL queries, however, he
realized that the underlying WAF is blocking the requests. To avoid
this, Sam is trying the following query:
UNION/**/SELECT/**/
'/**/OR/**/1/**/=/**/1
Which
of the following evasion technique is Sam using?
- Sam is using char encoding to bypass WAF
- Sam is using inline comments to bypass WAF
- Sam is using obfuscated code to bypass WAF
- Sam is manipulating white spaces to bypass WAF
28.
Which
of the following tasks is done after submitting the final pen testing
report?
- Exploiting vulnerabilities
- Kick-off meeting
- System patching and hardening
- Mission briefing
29.
Joseph,
a penetration tester, was hired by Xsecurity Services. Joseph was
asked to perform a pen test on a client’s network. He was not
provided with any information about the client organization except
the company name.
Identify
the type of testing Joseph is going to perform for the client
organization?
- Announced Testing
- Black-box Penetration Testing
- White-box Penetration Testing
- Grey-box Penetration Testing
30. Analyze
the ARP packet below and mark the correct statement.
- It is a multicast ARP packet from a broadcast address to the other hosts in the network
- It is an ARP request packet from a broadcast address to the requesting host
- It is a unicast ARP packet from responding host to the broadcast address
- It is an ARP request packet from the requesting host to a broadcast address
31.
Which
of the following SQLMAP commands will allow you to test if a
parameter
in a target URL is vulnerable to SQL injection (injectable)?
- sqlmap –host [ Target URL ]
- sqlmap -g "inurl:\".php?id=1\""
- sqlmap.py -l burp.log --scope="(www)?\.[target]\.(com|net|org)"
- sqlmap –u [ Target URL ]
32.
Kevin
is auditing a cloud infrastructure for vulnerabilities. During the
reconnaissance
phase, he runs a Nmap scan that gives him the following
information:
Which
of the following Metasploit commands will allow Kevin to decrypt the
SSL traffic to the cloud?
- use exploit/scanner/ssl/openssl_heartbleed → exploit
- use auxiliary/scanner/ssl/openssl_heartbleed → exploit
- set payload/scanner/ssl/openssl_heartbleed → exploit
- use exploit/ssl/openssl_heartbleed → exploit
33.
ABC
Technologies, a large financial company, hired a penetration tester
to do physical penetration testing. On the first day of his
assessment, the penetration tester goes to the company posing as a
repairman and starts checking trash bins to collect the sensitive
information.
What
is the penetration tester trying to do?
- Trying to attempt social Engineering using phishing
- Trying to attempt social engineering by shoulder surfing
- Trying to attempt social engineering by dumpster diving
- Trying to attempt social engineering by eavesdropping
34.
Stuart
is a database penetration tester working with Regional Server
Technologies.
He was asked by the company to identify vulnerabilities in its SQL
database. Stuart wanted to perform a SQL penetration by passing some
SQL commands through a web application for execution and succeeded
with a command using a wildcard attribute indicator.
Which
of the following strings is a wildcard attribute indicator?
- %
- @@variable
- @variable
- ?Param1=foo&Param2=bar
35.
Sam
was asked to conduct penetration tests on one of the client’s
internal networks. As part of the testing process, Sam performed
enumeration to gain information about computers belonging to a
domain, list of shares on the individual hosts in the network,
policies and passwords.
Identify
the enumeration technique.
- NetBIOS Enumeration
- DNS Enumeration
- NTP Enumeration
- SMTP Enumeration
36. Frank
is a senior security analyst at Roger Data Systems Inc. The company
asked him to perform a database penetration test on its client
network to determine whether the database is vulnerable to attacks or
not. The client did not reveal any information about the database
they are using.
As
a pen tester Frank knows that each database runs on its own default
port. So he started database port scanning using the Nmap tool and
tried different commands using default port numbers and succeeded
with the following command.
nmap
-sU –p 1521 <client ip-address>
Identify
the database used by the company?
- SQLite
- Microsoft SQL Server
- Oracle
- MySQL
37. Martin
works as a professional Ethical Hacker and Penetration Tester. He is
an ECSA certified professional and was following the LPT methodology
to perform the penetration testing. He is assigned a project for
information gathering on a client’s network. He started penetration
testing and was trying to find out the company’s internal URLs,
(mostly by trial and error), looking for any information about the
different departments and business units. Martin was unable find any
information.
What
should Martin do to get the information he needs?
- Martin should use website mirroring tools such as HTTrack Web Site Copier to find the company’s internal URLs
- Martin should use WayBackMachine in Archive.org to find the company’s internal URLs
- Martin should use online services such as netcraft.com to find the company’s internal URLs
- Martin should use email tracking tools such as eMailTrackerPro to find the company’s internal URLs
38.
Edward
is a penetration tester hired by the OBC Group. He was asked to
gather information on the client’s network. As part of the work
assigned, Edward needs to find the range of IP addresses and the
subnet mask used by the target organization.
What
does Edward need to do to get the required information?
- Search for an appropriate Regional Internet Registry (RIR)
- Search for link popularity of the company’s website
- Search for web pages posting patterns and revision numbers
- Search for Trade Association Directories
39.
As
a normal three-way handshake mechanism system A sends an ACK
packet
to system B. However, system A does not send an ACK packet to system
B. In this case, client B is waiting for an ACK packet from client A.
What
is the status of client B?
- “Half-open”
- “Full-open”
- “Filtered”
- “Half-closed”
40.
Kevin
is trying to pen test an Android mobile device. He wants to extract
the PIN and gesture key from the device. Kevin knows that the
gesture.key and password.key hold the information that he is looking
for. He accesses the Android file system from an Android IDE but
could not locate these files.
Which
of the following will allow Kevin to access these files and their
content?
- Rooting
- Jailbreaking
- Tethering
- Debugging
41.
Veronica,
a penetration tester at a top MNC company, is trying to breach the
company’s database as a part of SLQi penetration testing. She began
to use the SLQi techniques to test the database security level. She
inserted new database commands into the SQL statement and appended a
SQL Server EXECUTE command to the vulnerable SQL statements.
Which
of the following SQLi techniques was used to attack the database?
- Buffer Overflow
- Function call injection
- Code injection
- File inclusion
42.
Joe
works as an engagement team lead with Xsecurity Inc. His pentesting
team follows all the standard pentesting procedures, however, one of
the team members inadvertently deletes a document containing the
client’s sensitive information. The client is suing Xsecurity for
damages.
Which
part of the Penetration Testing Contract should Joe have written
better to avoid this lawsuit?
- Fees and project schedule
- Indemnification clause
- Objective of the penetration test
- Non-disclosure clause
43. George
works at 3D-Networks Ltd as a Network Admin. He received an email
from one of his clients stating that the client’s company website
has some flaws and they are receiving continuous emails from
customers about the inconveniences. While checking the web servers,
he found loopholes with the DNS servers and he installed DNSSEC-Aware
lookups. This made the site functional and the client was happy with
the outcome.
What
problem does a Non-DNSSEC-Aware site face?
- A mischievous Internet user can cut off the request and send back incorrect information by spoofing the response.
- The users will get more information than they desired.
- The site becomes slow and vulnerable
- The users commands will be delayed and the information they requested may be not delivered.
44. Dale
is a penetration tester and security expert. He works at Sam Morison
Inc. based in Detroit. He was assigned to do an external penetration
testing on one of its clients. Before digging into the work, we
wanted to start with reconnaissance and grab some details about the
organization. He used tools like Netcraft and SHODAN
and
grabbed the internal URLs of his client.
What
information do the internal URLs provide?
- Internal URLs provide vulnerabilities of the organization
- Internal URLs provide database related information
- Internal URLs provide an insight into various departments and business units in an organization
- Internal URLs provide server related information
45.The
Rhythm Networks Pvt Ltd firm is a group of ethical hackers. Rhythm
Networks was asked by their client Zombie to identify how the
attacker penetrated their firewall. Rhythm discovered the attacker
modified the addressing information of the IP packet header and the
source address bits field to bypass the firewall.
What
type of firewall bypassing technique was used by the attacker?
- HTTP Tunneling
- Proxy Server
- Source routing
- Anonymous Website Surfing Sites
46.Smart
Networks Ltd is an internet service provider based in the UK. The
company hired Thomson as a penetration tester and asked him to check
for vulnerabilities in one of their clients Wi-Fi networks. He
performed Android Penetration Testing on the Wi-Fi network using the
penetration testing tool. He found that the network is vulnerable and
an attacker is able to gain access to some of the employees Android
mobiles devices that are connected to the network.
Which
of the following penetration testing tools did Thomson use to do
this?
- Pangu
- zANTI
- evasion
- Burp suite
47. A
company has recently witnessed a security breach and sensitive
customer data was published online. Arnold has been specifically
asked to check for the different ways insiders can pass data outside
of the company. In order to avoid IDS and data leakage prevention
systems, Arnold hid some data in image files.
Which
of following techniques is Arnold using to pass the data outside of
the company?
- Cryptography
- HTTP tunneling
- Insertion attack
- Steganography
48. Which
of the following pre-engagement documents identifies the systems to
be tested, types of tests, and the depth of the testing?
- Authorization Letter
- Rule of Engagement
- Letter of Intent
- Draft Report
49. JUA
Networking Solutions is a group of certified ethical hacking
professionals with a large client base. Stanley works as a
penetrating tester at this firm. Future Group approached JUA for an
internal pen test. Stanley performs various penetrating testing test
sequences and gains information about the network resources and
shares, routing tables, audit and service settings, SNMP and DNS
details, machine names, users and groups, applications and banners.
Identify
the technique that gave Stanley this information.
- Enumeration
- Sniffing
- Port scanning
- Ping sweeps
50.Analyze
the ICMP packet below and mark the correct statement.
- It is a ping request, but the destination network is unreachable
- It is a ping response, when the destination host is unknown
- It is a ping request, but the destination port is unreachable
- It is a ping packet that requires fragmentation, but the Don't Fragment flag is set
51.As
part of his job role as a Network administrator of a multi-national
company, Steve needs to perform penetration tests of mobile devices
used under the company’s BYOD policy. He chooses the proxy tools
Fiddler and paros to perform penetration testing.
Which
part of the mobile penetration testing methodology has he taken up?
- Android debug bridge testing
- Communication channel penetration testing
- Server-side infrastructure pen testing
- Application penetration testing
52.In
a 3-way handshake process before TCP communication, host A sends a
SYN packet to host B with a sequence number 4444. Host B replies to
the SYN packet with a SYN+ACK packet.
What
will be the sequence number of the SYN+ACK packet?
- 4444
- 4443
- 4445
- The sequence number of the SYN+ACK packet is independent of the sequence number of the SYN packet, and cannot be deduced from the above information
53.Which
of the following is true about Full-duplex TCP service?
- Full-duplex services are the only services that provide error free delivery
- Full-duplex service allows data flow in each direction, independent of the other direction
- Full-duplex service allows sending information in both directions between two nodes, but only one direction or the other can be utilized at a time
- Full-duplex is the only service that provides reliable data delivery
54. Steven
is performing a wireless network audit. As part of the engagement, he
is trying to crack a WPA-PSK key. Steven has captured enough packets
to run aircrackng and discover the key, but aircrack-ng did not yield
any result, as there were no authentication packets in the capture.
Which
of the following commands should Steven use to generate
authentication packets?
- aircrack-ng.exe -a 2 -w capture.cap
- aireplay-ng --deauth 11 -a AA:BB:CC:DD:EE:FF
- airodump-ng --write capture eth0
- airmon-ng start eth0
55. John,
a penetration tester and security auditor, was hired by XSecurity
Services. John was asked to perform a penetration test on the
company’s network. John discovers that a user from the HR
department had a dial-out modem installed. John wanted to check the
organization’s security policies to see whether the dial-out modems
are allowed or not.
Which
of the following security policies should John check?
- Acceptable-use policy
- User account policy
- Firewall-management policy
- Remote-access policy
56. GenSec
Inc, a UK-based Company, uses Oracle database to store all its data.
The company also uses Oracle DataBase Vault to restrict user access
to specific areas of their database. GenSec hired a senior
penetration tester and security auditor named Victor to check the
vulnerabilities of the company’s Oracle DataBase Vault. He was
asked to find all the possible vulnerabilities that can bypass the
company’s Oracle DB Vault. Victor tried different kinds of attacks
to penetrate into the company’s Oracle DB Vault and succeeded.
Which
of the following attacks can help Victor to bypass GenSec’s Oracle
DB Vault?
- Man-in-the-Middle Attack
- Replay Attack
- SQL Injection
- Denial-of-Service Attack
57. Christen
is a renowned SQL penetration testing specialist in the US. A
multinational ecommerce company hired him to check for
vulnerabilities in the SQL database. Christen wanted to perform SQL
penetration testing on the database by entering a massive amount of
data to crash the web application of the company and discover coding
errors that may lead to a SQL injection attack.
Which
of the following testing techniques is Christen using?
- Union Exploitation
- Stored Procedure Injection
- Automated Exploitation
- Fuzz Testing
58. During
penetration testing on some mobile devices, Steve discovered a
suspicious application (apk) installed on a device that had
permissions to access the device's camera, phonebook, storage, etc.
He, then used code analysis tools to gather valauble information
regarding the application's source code, proprietary IP, etc in an
attempt to obtain the origin of the application.
Which
of the following techniques did Steve implement, in order to obtain
the latter information?
- Code signing
- Code encryption
- Reverse coding
- Reverse engineering
59. Dale
is a network admin working in Zero Faults Inc. Recently the company’s
network was compromised and is experiencing very unusual traffic.
Dale checks for the problem that compromised the network. He
performed a penetration test on the network’s IDS and identified
that an attacker sent spoofed packets to a broadcast address in the
network.
Which
of the following attacks compromised the network?
- Amplification attack
- MAC Spoofing
- ARP Spoofing
- Session hijacking
60. Peter
works as a lead penetration tester in a security service firm named
Xsecurity. Recently, Peter was assigned a white-box pen test
assignment testing the security of an IDS system deployed by a
client. During the preliminary information gathering, Peter
discovered the TTL to reach the IDS system from his end is 30. Peter
created a Trojan and fragmented it in to 1‐character
packets using the Colasoft packet builder tool. He then used a packet
flooding utility to bombard the IDS with these fragmented packets
with the destination address of a target host behind the IDS whose
TTL is 35.
What
is Peter trying to achieve?
- Peter is trying to bypass the IDS system using inconsistent packets
- Peter is trying to bypass the IDS system using the broadcast address
- Peter is trying to bypass the IDS system using a Trojan
- Peter is trying to bypass the IDS system using the insertion attack
61. Which
of the following Wireshark options will allow you to view a HTTP
packet in plain text as shown in the screenshot?
- Follow UDP Stream
- Follow HTTP Stream
- Follow TCP Stream
- Follow SSL Stream
62. George,
a freelance Security Auditor and Penetration Tester, was working on a
pen testing assignment for Xsecurity. George is an ECSA certified
professional and was following the LPT methodology in performing a
comprehensive security assessment of the company. After the initial
reconnaissance, scanning and enumeration phases, he successfully
recovered a user password and was able to log on to a Linux machine
located on the network. He was also able to access the /etc/passwd
file; however, the passwords were stored as a single "x"
character.
What
will George do to recover the actual encrypted passwords?
- George will perform sniffing to capture the actual passwords
- George will escalate his privilege to root level and look for /etc/shadow file
- George will perform a password attack using the pre-computed hashes also known as a rainbow attack
- George will perform replay attack to collect the actual passwords
63. Which
of the following snort rules alert all ICMP packets from the Internet
to a local network?
- alert PORT1 $EXTERNAL_NET any -> $HOME_NET 10.10.40.2 (msg:"ICMP-INFO PING"; icode:0; itype:8; reference:arachnids,135; reference:cve,1999-0265; classtype:badunknown; sid:472; rev:7;)
- alert icmp $INTERNET any -> $HOME_NET 10.10.40.2 (msg:"ICMP-INFO PING"; icode:0; itype:8; reference:arachnids,135; reference:cve,1999-0265; classtype:badunknown; sid:472; rev:7;)
- alert icmp $EXTERNAL any -> $INTERNAL any 10.10.40.2 (msg:"ICMP-INFO PING"; icode:0; itype:8; reference:arachnids,135; reference:cve,1999-0265; classtype:badunknown; sid:472; rev:7;)
- alert icmp $EXTERNAL_NET any -> $HOME_NET 10.10.40.2 (msg:"ICMP-INFO PING"; icode:0; itype:8; reference:arachnids,135; reference:cve,1999-0265; classtype:badunknown; sid:472; rev:7;)
64. A
hacker initiates so many invalid requests to a cloud network host
that the host uses all its resources responding to the invalid
requests and ignores the legitimate requests.
Identify
the type of attack
- Denial of Service (DoS) attacks
- Authentication attacks.
- Man-in-the-middle cryptographic attacks
Side Channel attacks.
65. Michel
works as a penetration tester in a firm named ITSecurity inc.
Recently, Michel was given an assignment to test the security of the
firewalls deployed by a client. While conducting the test, Michel
found the company uses the OSI model for network communications. He
also determined the firewall is only monitoring TCP handshaking of
packets at the session layer to determine whether a requested session
is legitimate.
Identify
the type of firewall used by the company?
- Stateful multilayer inspection firewall
- Application level firewall
- Circuit level gateway firewall
- Packet filtering firewall
66. Victor
is performing a wireless network pen test. During a WEP test, he runs
the following aircrack-ng command:
What
Victor is trying to achieve by this command?
- Victor is trying to perform a DoS attack by disassociating a client from the access point
- Victor is trying to dump all the Wi-Fi traffic from a client to the access point in order to capture weak IVs
- Victor is trying to associate his wireless card with the target access point
- Victor is trying to generate traffic so that he can generate enough packets to crack the WEP key
67. Mr.
Smith works as a penetrating test engineer at Lucid Security
Services. Mr. Shan, a frustrated customer, contacts the company and
informs them that he identified some unusual behavior with his
iPhone. After performing several tests, he concludes that the iPhone
is Jail broken.
Which
permission status of the device root confirms that the device is jail
broken?
- Only write permission
- Neither Read nor write permission
- Only Read permission
- Read/ Write permission
68. Watson
works as a Penetrating test engineer at Neo security services. The
company found its wireless networks operating in an unusual manner,
with signs that a possible cyber attack might have happened. Watson
was asked to resolve this problem. Watson starts a wireless
penetrating test, with the first step of discovering wireless
networks by war-driving. After several thorough checks, he identifies
that there is some problem with rogue access points and resolves it.
Identifying rogue access points involves a series of steps.
Which
of the following arguments is NOT valid when identifying the rogue
access points?
- If the MAC of any discovered AP is present in the authorized list of MAC addresses, it would be considered as a rogue AP
- If any new AP which is not present in the authorized list of APs is detected, it would be considered as a rogue AP
- If the radio channel used by any discovered AP is not present in the authorized list of channels, it is considered as a rogue AP
- If a radio media type used by any discovered AP is not present in the authorized list of media types, it is considered as a rogue AP
69. During
a DHCP handshake in an IPv4 network, which of the following messages
contains the actual IP addressing information for the clients to use?
- DHCPACK
- SOLICIT
- REPLY
- DHCPDISCOVER
70.
What is the purpose of a
Get-Out-of-Jail-Free card in a pen testing engagement?
- It gives an understanding of the limitations, constraints, liabilities, and indemnification considerations
- It is a formal approval to start pen test engagement
- It indemnifies the tester against any loss or damage that may result from the testing
- It details standards and penalties imposed by federal, state, or local governments
71.
Why is an appliance-based firewall more
secure than those implemented on top of a commercial operating system
(Software based)?
- Operating system firewalls are highly configured
- Appliance based firewalls cannot be upgraded
- Hardware appliances do not suffer from security vulnerabilities associated with the underlying operating system
- Firewalls implemented on a hardware firewall are highly scalable
72.
Ashton is a mobile penetration tester
and runs a mobile investigation firm. A company hired him to check
the security of the various mobile devices used in their office. As
part of the contract, Ashton needs to perform penetration testing on
the communication channel of the devices.
Which
of the following steps does Ashton need to perform to complete the
task?
- Performing Penetration test of Web server/application
- Intercepting HTTP request
- Reading stored data
- Reverse engineering the applications
73.
Thomas, is trying to simulate a SQL
injection attack on his client’s website. He is trying various
strings provided in the SQL Injection Cheat Sheet. All of his SQL
injection attack attempts failed and he was unable to retrieve any
information from the website’s back-end database. Later, he
discovered the IDS system deployed by his client is blocking all the
SQL injection requests. Thomas decided to bypass the IDS by slightly
modifying the SQL injection queries as below:
Original
query:
/?id=1+union+(select+1,2+from+test.users)
Modified
queries:
/?id=(1)unIon(selEct(1),mid(hash,1,32)from(test.users))
/?id=1+union+(sELect'1',concat(login,hash)from+test.users)
/?id=(1)union(((((((select(1),hex(hash)from(test.users))))))))
Which
encoding techniques did he try to evade the IDS?
- IDS evasion using obfuscated code
- IDS evasion using in-line comments
- IDS evasion using hex encoding
- IDS evasion using char encoding
74.
Arrange the WEP cracking process in the
correct order:
I.
aireplay-ng -1 0 -e SECRET_SSID -a 1e:64:51:3b:ff:3e -h
a7:71:fe:8e:d8:25 eth1
II.
aircrack-ng -s capture.ivs
III.
airmon-ng start eth1
IV.
airodump-ng --ivs --write capture eth1
V.
aireplay-ng -3 -b 1e:64:51:3b:ff:3e -h a7:71:fe:8e:d8:25 eth1
- IV → I → V → III → II
- III → IV → I → V → II
- IV → I → V → III → II
- III → IV → V → II → I
75.
Christine works as a network security
auditor with Xsecurity, a large security assessment firm based out of
San Francisco. During a security audit of a client organization,
Christine tests some of the network switches for an ARP flooding
attack. She tries to flood the ARP cache of the switches.
What
happens when an ARP cache flood is successful?
- The switches will start working as a proxy and route all traffic to the broadcast address.
- If the ARP cache is flooded, the switches will start working as a router, making it less susceptible to attacks.
- Depending on the switch manufacturer, the device will either delete every entry in the ARP cache or reroute packets to the nearest switch.
- The switches will drop into hub mode if the ARP cache is successfully flooded.
76.
Donald is auditing a SQL server machine
for robustness. He performs parameter tampering using SQL scripts
that results in the following query.
http://client.com/link.php?id=1'
union select 1,2,(select tab1 from
(select
decode(encode(convert(compress(post) using
latin1),des_encrypt(concat(post,post,post,post),8)),des_encrypt(sha
1(concat(post,post,post,post)),9))
as tab1 from table_1)a),4—
What
is Donald trying to achieve?
- He is trying to encrypt the complete database
- He is trying to extract password hashes from the database
- He is attempting a DoS Attack against the database server using SQL injection
- He is trying to extract table names from the database server
77.
You have just completed a database
security audit and writing the draft pen testing report.
Which
of the following will you include in the recommendation section to
enhance the security of the database server?
- Install a certificate to enable SSL connections
- Allow direct catalog updates
- Grant permissions to the public database role
- Install SQL Server on a domain controller
78.
Todd is working on an assignment
involving auditing of a web service. The scanning phase reveals the
web service is using an Oracle database server at the backend. He
wants to check the TNS Listener configuration file for configuration
errors.
Which
of following directory contains the TNS Listener configuration file,
by default:
- $ORACLE_HOME/network /admin
- $ORACLE_HOME/network
- $ORACLE_HOME/network /bin
- $ORACLE_HOME/bin
79. Xsecurity
Inc., has developed a web service program and wants to host it on its
web server. However, before deploying the web service, management
asked their security team to assess the security of the web service
against possible service attacks. George is working as the lead
penetration tester on this assignment. To simulate a specific type of
attack on the web service, he performed the following activities:
I.
Trapped the WSDL document from web service traffic and analyzed it in
order to determine whether it is revealing the purpose of the
application, entry points, functional breakdown, and message types on
web service.
II.
Created a set of valid requests by selecting a set of operations, and
formulated the request messages according to the rules of the XML
Schema that can be submitted to the web service
III.
He then used these new requests to include malicious content in SOAP
requests
and analyzed any errors
What
is he trying to do?
- He is assessing the web service security against Web Services Probing Attacks
- He is assessing the web service security against a Web Services Replay Attack
- He is assessing the web service security against a MITM Attack
- He is assessing the web service security against XPath Injection Attacks
80. Sarah
is a pen tester at JK Hopes & Sons based in Las Vegas. As a part
of the penetration testing, she was asked to perform the test without
exposing the test to anyone else in the organization. Only a few
people in the organization know about the test. This test covers the
organization's security monitoring, incidentidentification and its
response procedures.
What
kind of pen testing is Sarah performing?
- Blind Testing
- Announced Testing
- Double-blind Testing
- Unannounced Testing
What
should John do to see past versions and pages of a website that Jason
saw one month back?
- John should run the Web Data Extractor tool to recover the old data
- John can go to Archive.org to see past versions of the company website
- John should use SmartWhois to recover the old pages of the website
- John should recover cached pages of the website from Google search engine cache
82. Alice
is a senior security auditor and pentester, specializing in social
engineering and external penetration tests. Alice has been hired by
Xsecurity, a subcontractor for the Department of Defense. Alice has
been given authority to perform all tests necessary to audit the
company’s network security. No employees for the company, other
than the IT director, know about the work Alice is doing. Alice’s
first step is to obtain a list of employees through the company
website contact pages. She then befriends a female employee of the
company through an online chat website. After
meeting
with the female employee numerous times, Alice is able to gain her
trust and they become friends. One day, Alice steals the employee’s
access badge and uses it to gain unauthorized access to the Xsecurity
offices.
Identify
the type of social engineering attack?
- Vishing
- Insider Accomplice
- Spear phishing
- Eavesdropping
83. You
work as a penetration tester for XSecCorp, a large security
assessment firm based out of Atlanta. You have been assigned a
project to test the strength of the IDS system deployed at a client’s
internal network. You run the Wireshark tool and observe a large
number of SYN/ACK packets originating from an internal host and
hitting a web server, but, surprisingly, you could not find any SYN
requests from the web server to the host.
What
will be the most likely reason for this?
- The NIC card at the web server is running in promiscuous mode
- The TCP implementation is vulnerable to a resource‐exhaustion attack
- The SYN/ACK traffic is false positive alerts generated by the IDS
- The web server is experiencing a backscatter attack
84. Karen
is a Network engineer at ITSec, a reputed MNC based in Philadelphia,
USA. She wants to retrieve the DNS records from the publicly
available servers. She searched using Google for the providers DNS
Information and found the following
sites:
http://www.dnsstuff.com
https://dnsquery.org
Through
these sites she got the DNS records information as she wished.
What
information is contained in DNS records?
- Information such as mail server extensions, IP addresses etc.
- Information about local MAC addresses.
- Information about the database servers and its services.
- Information about the DNS logs.
85. You
are working on a pen testing assignment. Your client has asked for a
document that shows them the detailed progress of the pen testing.
Which
document is the client asking for?
- Scope of work (SOW) document
- Engagement log
- Rule of engagement with signatures of both the parties
- Project plan with work breakdown structure
86. Richard
is working on a web app pen testing assignment for one of his
clients. After preliminary information, gathering and vulnerability
scanning Richard runs the SQLMAP tool to extract the database
information.
Which
of the following commands will give Richard an output as shown in the
screenshot?
- sqlmap –u http://queenhotel.com/about.aspx?name=1 –D queenhotel --tables
- sqlmap –u http://queenhotel.com/about.aspx?name=1 –dbs
- sqlmap –u http://queenhotel.com/about.aspx?name=1 –database queenhotel – tables
- sqlmap –u http://queenhotel.com/about.aspx?name=1 –D queenhotel –T –columns
87. Mike,
a security auditor, was asked to assess the network perimeter
security deployed in the company’s network. As a part of his
assignment, he created a malicious file of 300 KB and used the
Colasoft Packet Builder tool to manipulate its header information to
show the size of the packet data as 50 kB. He then sent the crafted
packet to a target host inside the network.
What
is Mike trying to achieve?
- Bypass the sanity check at the IDS using resource exhaustion technique
- Bypass the sanity check at the IDS using packet fragmentation technique
- Bypass the sanity check at the IDS by ending inconsistent packets
- Bypass the sanity check at the IDS using insertion technique
88. Analyze
the hping3 output below and mark the correct statement.
The
result shows that beta.search.microsoft.com is handled by two
machines behind a load balancer
The
result shows that beta.search.microsoft.com is not available for
public access
The
result shows that beta.search.microsoft.com is intermittently
unavailable
The
result shows that beta.search.microsoft.com webserver is behind two
firewalls
89. In
an attempt to assess the security configuration of the firewall
deployed on the client’s network, you test whether a particular
port on the firewall is open or closed.
You
use the hping utility with the following syntax:
#hping
–S –c 1 –p <port> <IP Address> -t <TTL>
What
response will indicate the particular port is allowed in the
firewall?
- ICMP Port Unreachable
- Host Unreachable
- No Response
- TTL Exceeded
90. Sam
is a penetration tester and network admin at McLaren & McLaren,
based out of Washington. The company has recently deployed IPv6 in
their network. Sam found problems with the protocol implementation
and tried to redeploy IPv6 over Ipv4. This time, he used the
tunneling mechanism while deploying the IPv6 network.
How
does the tunneling mechanism works?
- It transfers IPv4 first and the IPv6
- It encapsulates IPv6 packets in IPv4 packets
- It replaces IPv4 with IPv6
- It splits the IPv4 packets and provide a way to Ipv6
91. Which
of the following statements highlights the difference between a
vulnerability assessment and a penetration test?
- A vulnerability assessment identifies and ranks the vulnerabilities, and a penetration test exploits the identified vulnerabilities for validation and to determine impact.
- A vulnerability assessment focuses on low severity vulnerabilities and pentesting focuses on high severity vulnerabilities
- A vulnerability assessment is performed only on software components of an information system, whereas pentesting is performed on all hardware and software components of the system.
- A vulnerability assessment requires only automated tools to discover the vulnerabilities whereas pentesting also involves manual discovery of vulnerabilities.
92. Your
firm has over 10 years of experience in pentesting and security
auditing fields. The penetration testing team has a mix of qualified
professionals from different domains. Your firm follows all the
standard engagement processes, but still there could be incidents
that may jeopardize your firms interests in a pentesting engagement.
Which
of the following will be the best approach to protect your firm?
- You should have a detailed ROE and well documented formal permission to start the engagement
- You should get the engagement letter vetted by your lawyer
- You should get the confidentiality and non-disclosure agreements (NDAs) signed by the client
- You should obtain Liability and Errors and Omissions insurance
93. Michael,
a Licensed Penetration Tester, wants to create an exact replica of an
original website, so he can browse and spend more time analyzing it.
Which
of the following tools will Michael use to perform this task?
- NetInspector
- BlackWidow
- VisualRoute
- Zaproxy
94. A
company asked Smith to perform a penetration on its subsidiary
network to find vulnerabilities. Smith focused the penetration test
on any vulnerabilities to exploit the company’s IDS. He used the
following command to trick the IDS and successfully bypassed the IDS
to the network: HEAD /cgi-bin/some.cgi
Which
one of the following techniques did Smith use to identify the
vulnerability?
- Pattern Matching
- Method Matching
- Signature Matching
- Reverse Traversal
95. Stuart
has successfully cracked the WPA-PSK password during his wireless pen
testing assignment. However, he is unable to connect to the access
point using this password.
What
could be the probable reason?
- The access point implements another layer of WEP encryption
- It is a rogue access point
- The access point implement a signal jammer to protect from attackers
- The access point implements MAC filtering
96. What
is the purpose of the Traceroute command?
- For extracting information about the server functioning
- For extracting information about closed ports
- For extracting information about opened ports
- For extracting information about the network topology, trusted routers, and firewall locations
97. Three
transition mechanisms are available to deploy IPv6 on IPv4 networks.
Which
of the following is not an IPv6 transition mechanism?
- Positive Acknowledgement and Retransmission (PAR)
- Tunneling
- Translation
- Dual Stacks
98. Which
Oracle database listener mode provides network access to an Oracle
database instance?
- Tnslnsr
- Database
- PLSExtProc
- Executable
99. During
scanning of a test network, Paul sends TCP probe packets with the ACK
flag set to a remote device and then analyzes the header information
(TTL and WINDOW field) of the received RST packets to find whether
the port is open or closed.
Analyze
the scanning result below and identify the open port.
- Port 22
- Port 20
- Port 23
- Port 21
100. Our
local bank uses a firewall which monitors the internal network and
filters the traffic The network team was hardening firewall rules
over the weekend, they ignored a basic rule of making backups of the
firewall configuration before beginning the work. The next day, users
complained about a technical issue and unable to connect to some web
sites. The network team troubleshooted the issue specifically to the
SSL-based web sites. When a web page is opened on any of the
SSL-based sites, there is a message “your session cannot be
established”. The network engineer identified the issue was with
the firewall.
What
should be done to remediate the issue without losing any of the work?
- Resetting the Firewall
- Restoring the default policy rule set
- Changing the firewall rule at the session layer
- Restoring the most recent backup of the firewall
101. Joseph
is performing an internal pen test for one of his clients. He wants
to crack the password for of the system login. Joseph has got a
meterpreter session to the target machine and was able to
successfully dump the password hashes.
Which
of the following password attacks will Joseph perform so he discovers
the clear text password without triggering the system lock out?
- Dictionary attack
- Rainbow attack
- Phishing attack
- Brute force attack
102. Which
type of security policy is described by the configuration below:
Provides
maximum security while allowing known, but necessary, dangers
All
services are blocked; nothing is allowed
Safe
and necessary services are enabled individually
Non-essential
services and procedures that cannot be made safe are NOT allowed
Everything
is logged
- Permissive Policy
- Promiscuous Policy
- Prudent Policy
- Paranoid Policy
103. Sandra,
a wireless network auditor, discovered her client is using WEP. To
prove the point that the WEP encryption is very weak, she wants to
decrypt some WEP packets. She successfully captured the WEP data
packets, but could not read the content as the data is encrypted.
Which
of the following will help Sandra decrypt the data packets without
knowing the key?
- Chopchop Attack
- Packet injection attack
- Fragmentation Attack
- ARP Poisoning Attack
104. Paul
is security analyst at Rex Security Consultation. The company asked
him to investigate malicious activity in one of its client’s
network. Paul is trying to bypass the client’s IDS. He sent some
packets with an encoded attack payload in unicode to bypass IDS
filters. He manipulated the path referenced in the signature to trick
the IDS.
Which
of the following techniques did Paul implement to penetrate through
the client’s IDS?
- False-Positive Generation
- Unicode Evasion
- Packet Overlapping
- Obfuscation
105. Consider
the following code:
URL:http://www.xsecurity.com/search.pl?text=<
script >alert(document.cookie)< /script >
If
an attacker tricks a victim into clicking a link like this, and the
Web application does not validate the input, the victim’s browser
will pop up an alert showing the users current set of cookies. An
attacker can do much more damage, including stealing passwords,
resetting your home page, or redirecting the user to another Web
site.
What
is the countermeasure against XSS scripting?
- Create an IP access list and restrict connections based on port number
- Connect to the server using the HTTPS protocol instead of HTTP
- Replace “<” and “>” characters with ?lt;? and ?gt;?using server scripts
- Disable Javascript in the browsers
106. Arnold,
is trying to gain access to a database by inserting exploited query
statements with a WHERE clause. He wants to retrieve all the entries
from a particular table (e.g. StudName) using the WHERE clause.
What
query does Arnold need to write to retrieve the information?
- RETRIVE * FROM StudName WHERE roll_number = 1'#
- DUMP * FROM StudName WHERE roll_number = 1 AND 1=1—
- EXTRACT* FROM StudName WHERE roll_number = 1 order by 1000
- SELECT * FROM StudName WHERE roll_number = '' or '1' = '1‘
107. How
does OS Fingerprinting help you as a pen tester?
- It doesn’t depend on the patches that have been applied to fix existing security holes
- It helps to research vulnerabilities that you can use to exploit on a target system
- It opens a security-delayed window based on the port being scanned
- It defines exactly what software the target has installed
108. Peter
is working on a pen testing assignment. During the reconnaissance
phase, Peter discovered that the client’s SYSLOG systems are taken
off for four hours on the second Saturday of every month for
maintenance. He wants to analyze the client’s web pages for
sensitive information without triggering their logging mechanism.
There are hundreds of pages on the client’s website and it is
difficult to analyze all the information in just four hours.
What
will Peter do to analyze all the web pages in a stealthy manner?
- Use WayBackMachine
- Perform reverse DNS lookup
- Search the Internet, newsgroups, bulletin boards, and negative websites for information about the client
- Use HTTTrack to mirror the complete website
109. Analyze
the screenshot below:
What
the attacker is trying to achieve?
- Stealing cookies using parameter tampering
- Stealing cookies using XSS attack
- Manipulating cookies using the CSRF attack
- Manipulating cookies using XSS attack
110. In
Linux, the /etc/shadow file stores the real password in encrypted
format for user accounts with added properties associated with the
user’s password. In the example of a /etc/shadow file entry below,
what does the Bold Red string indicate?
Vivek:
$1$fnffc$GteyHdicpGOfffXX40w#5:13064:0:99999:7
- Number of days the user is warned before the expiration date
- Last time the password changed
- Minimum number of days required between password changes
- The number of days after which password must be changed
111. Smith
is performing a black-box test for one of his clients. He
successfully gained a SSH shell and write access to the /tmp
directory on a Unix web server. This directory did not have any
sensitive information stored in it and was therefore not locked down.
Smith, however, was able upload a .shtml web page containing the
following include statement:
<!---
#exec cmd="/bin/cat /etc/passwd" --->
What
Smith is trying to do?
- Smith is trying to bruteforce password hashes stored in the machine
- Smith is using Server Side Includes (SSI) to execute a malicious command on the server
- Smith is trying to escalate his privileges on the webserver machine
- Smith is performing directory traversal to steal the /etc/passwd file from the webserver
112. An
attacker has inserted ‘Integrated Security = true;’ to the end of
the string in the hopes of connecting to the database using the OS
account the web application is running to avoid normal
authentication:
Data
source = mySource; Initial Catalog = db1; Integrated Security = no;
user id = myName; ; Password = 123; Integrated Security = true;
What
is attacker trying to do?
- The attacker is performing Connection String Parameter Pollution (CSPP) attack
- The attacker is performing Connection String Injection attack
- The attacker is performing Connection Pool DoS attack
- The attacker is checking the web application for XSRF attack
What
could be the probable reason?
- DNSSEC does not protect the integrity of a DNS response
- DNSSEC does not guarantee the non-existence of a domain name or type
- DNSSEC does not provide protection against Denial of Service (DoS) attacks
- DNSSEC does not guarantee authenticity of a DNS response during an attack
114. Daniel
is an ECSA certified penetration tester who is an expert at
performing penetration tests for mobile devices. He is working on a
project where he needs to pen test iPhone devices for a company. As
part of the job, Daniel wants to intercept the traffic of the iPhone
mobile devices using the Charles proxy tool. He installs the Charles
proxy tool on a workstation and tries to configure the HTTP Proxy
settings on a WiFi network in the iPhone's settings. During the
configuration, he needs to enter a port number on which Charles is
running.
Which
of the following port number values does he need to enter to continue
the configuration?
- 8088
- 8888
- 8008
- 8080
115. You
are working on a pentesting assignment for National Healthcare Inc.
The client has specifically asked you for a Data Use Agreement (DUA).
What
does it indicate?
- You are working with a HIPPA compliant organization
- The client organization does not want you to exploit vulnerabilities
- You are working with a publicly traded organization
- You are working on a target that is not connected to the Internet
116. A
reputed ethical hacker and penetration testing consultant, was hired
by Global Finance Services, to audit the security of their web
applications. Sam is currently auditing the coding and logical issues
that might be affecting the company's web applications. In the first
step, he collected valid session ID values by sniffing traffic from
authenticated users. By looking at the different requests, Sam
realized the web application is using a weak session ID generation
mechanism and session Ids can be guessed easily.
Analyze
some of the requests sniffed by Sam below:
http://www.juggyboy.com/view/JBEX2109201412
http://www.juggyboy.com/view/JBEX2109201424
http://www.juggyboy.com/view/JBEX2109201436
http://www.juggyboy.com/view/JBEX2109201448
Considering
that the above sessions are generated by the web server in the same
order, which of the following will be the next session generated by
the server?
http://www.juggyboy.com/view/JBEX2408201484
http://www.juggyboy.com/view/JBEX2009201472
http://www.juggyboy.com/view/JBEX2109201460
117. As
a part of the pentesting process, James performs a FIN scan as given
below:
Scan
directed at open port:
Client
Server
192.5.2.92:4079
-----FIN----->192.5.2.110:23
192.5.2.92:4079
<----____________------192.5.2.110:23
Scan
directed at closed port:
Client
Server
192.5.2.92:4079
-----FIN----->192.5.2.110:23
192.5.2.92:4079<-----RST/ACK----------192.5.2.110:23
What
will be the response if the port is open?
- FIN/ACK
- RST
- FIN/RST
- No response
118. Edward,
a network administrator, was worried about a report of one employee
using an FTP site to send confidential data out of the office. Edward
intends to confront the suspect employee with evidence he using FTP
against the company’s security policies. Edward sniffs the network
traffic using the Wireshark tool.
Which
Wireshark filter will display all the FTP packets originating from
the suspect employee’s machine?
- tcp.port eq 23 || ip.src==192.168.0.4
- tcp contains ftp&&23
- ftp&&ip.src==192.168.0.4
- proto==ftp&&ip.src==192.168.0.4
119. Adam
is a senior penetration tester at XYZsecurity Inc. He is auditing a
wireless network for vulnerabilities. Before starting the audit, he
wants to ensure that the wireless card in his machine supports
injection. He decided to use the latest version of aircrack-ng tool.
Which
of the following commands will help Adam check his wireless card for
injection?
- aireplay-ng -5 –b wlan0
- airdecap-ng -3 wlan0
- airodump-ng wlan0
- aireplay-ng -9 wlan0
120. David
is auditing the IDS systems deployed at one of his client
organizations. During reconnaissance he realized the organization is
using an outdated IDS system that does not reconstruct sessions
before performing any pattern matching on the data. He then sends
several data packets to the IDS with a time delay and is successful
in keeping the session active longer than the IDS will spend on
reassembling. With this the IDS stopped working and the packets David
sent bypassed the IDS to reach the
intended
destination host.
Which
of the following IDS evasion techniques was used?
- Fragmentation
- Session Splicing
- Session Hijacking
- Session Extension
121. You
are joining a new organization as a VAPT Manager. Your predecessor
informs you that the organization’s complete information security
infrastructure is in the middle of a regular vulnerability management
life cycle. He prioritized the vulnerabilities in the system and you
have to start with patching these vulnerabilities first.
Which
phase of vulnerability management is the information system in now?
- Risk Assessment
- Vulnerability Assessment
- Creating Baseline
- Remediation
122. WallSec
Inc. has faced several network security issues in the past and hire
Williamson, a professional pentester, to audit its information
systems. Before starting his work, Williamson, with the help of his
legal advisor, signed an agreement with his client. This agreement
states that confidential information of the client should not be
revealed outside of the engagement.
What
is the name of the agreement that Williamson and his client signed?
- Engagement letter
- TPOC agreement
- Authorization letter
- Non-disclosure agreement
123. Identify
the PRGA from the following screenshot:
- fragment-0124-161129.xor
- replay_src-0124-161120.cap
- 0505 933f af2f 740e
- 0842 0201 000f b5ab cb9d 0014 6c7e 4080
i.
Prepare a cost-benefit analysis to secure the network application(s)
ii.
Create a network application traffic matrix to identify the
protection method
iii.
Identify the network application(s) vulnerabilities
iv.
Identify the network applications that are of utmost importance
v.
Create a firewall ruleset which depends on the application’s
traffic matrix
- iv → iii → i → ii → v
- iii → i → iv → ii → v
- iii →iv → ii → i → v
- iv → ii → v → iii → i
125. Jason
is working on a pentesting assignment. He is sending customized ICMP
packets to a host in the target network. However, the ping requests
to the target failed with “ICMP Time Exceeded Type = 11” error
messages.
What
can Jason do to overcome this error?
- Increase the TTL value in the packets
- Increase the Window size in the packets
- Increase the ICMP header length
- Set a Fragment Offset
126. Recently,
Jakob was assigned a project to test the perimeter security of one of
a client. As part of the project, Jakob wants to test whether or not
a particular port on the firewall is open or closed. He used the
hping utility with the following syntax:
#hping
–S –c 1 –p <port> <IP Address> -t <TTL>
What
response will indicate the particular port is allowed in the
firewall?
- Host Unreachable
- ICMP Port Unreachable
- TTL Exceeded
- No Response
127. What
is the objective of the following bash script?
- It checks if an FTP port on a target machine is vulnerable to attacks
- It gives a list of IP addresses that have an FTP port open
- It tries to connect to FTP port on a target machine
- It checks if a target host has the FTP port open and quits
128. Jacob
is performing a vulnerability assessment of the web resources in his
organization. During the scanning phase, Jacob discovered a web
server is running an FTP server. Jacob performed research on this FTP
server and discovered it has a vulnerability enabling an attacker to
perform directory traversal. The next step is using directory
traversal attacks on the webserver.
Which
type of vulnerability assessment is Jacob performing?
- Inference-based Assessment
- Passive Assessment
- Tree-based Assessment
- Zero-day Assessment
129. William,
a penetration tester in a pen test firm, was asked to get the
information about the SMTP server on a target network.
What
does William need to do to get the SMTP server information?
- Send an email message to a non-existing user of the target organization and check for bounced mail header
- Examine the session variables
- Look for information available in web page source code
- Examine TCP sequence numbers
130. James
is a security consultant at Big Frog Software Pvt Ltd. He is an
expert in Footprinting and Social engineering tasks. His team lead
tasked him to find details about the target through passive
reconnaissance. James used websites to check the link popularity of
the client’s domain name.
What
information does the link popularity provide?
- Information about the partners of the organization
- Information about the server and its infrastructure
- Information about visitors, their geolocations, etc.
- Information about the network resources
131. Xsecurity
Inc. is worried about the latest security incidents and data theft
reports. The management wants a comprehensive vulnerability
assessment of the complete information system at the company.
However, Xsecurity does not have the required resources or
capabilities to perform a vulnerability assessment. They decide to
hire services of a company that will perform a periodic vulnerability
assessment and present reports for management to implement
remediation.
What
vulnerability assessment approach is Xsecurity following?
- Service-based Assessment
- Tree-based Assessment
- Product-based Assessment
- Inference-based Assessment
132. Depp
Networks is a leader in providing ethical hacking services. They were
tasked to examine the strength of a client network. After using a
wide range of tests, they finally zeroed in on ICMP tunneling to
bypass the firewall.
What
factor makes ICMP tunneling appropriate to bypass the firewall?
- Firewalls can not inspect ICMP packets
- The payload portion is arbitrary and not examined by most firewalls
- Deep packet inspection
- Firewalls can not handle the fragmented packets
133. George,
a reputed ethical hacker and penetration testing consultant, was
hired by FNB Services, a startup financial services company, to audit
the security of their web applications. During his investigation,
George discovered that the company’s website is vulnerable to blind
SQL injection attacks. George, entered a custom SQL query in a form
located on the vulnerable page which resulted in a back-end SQL
query
similar to the one given below:
http://fnb.com/
forms/?id=1+AND+555=if(ord(mid((select+pass
from+users+limit+0,1),1,2))=
97,555,777)
What
is George trying to achieve with this custom SQL query?
- George is searching for the first character of the first table entry
- George is searching for the first character of the second table entry
- George is searching for the second character of the first table entry
- George is searching for the first character of all the table entries
134. HDC
Networks Ltd. is a leading security services company. Matthew works
as a penetrating tester with this firm. He was asked to gather
information about the target company. Matthew begins with social
engineering by following the steps:
I.
Secretly observes the target to gain critical information
II.
Looks at employee’s password or PIN code with the help of
binoculars or a lowpower telescope
Based
on the above description, identify the information gathering
technique.
- Phishing
- Shoulder surfing
- Tailgating
- Dumpster diving
135. During
a DHCP handshake in an IPv4 network, which of the following messages
contains the actual IP addressing information for the clients to use?
- DHCPACK
- SOLICIT
- REPLY
- DHCPDISCOVER
136. An
attacker injects malicious query strings in user input fields to
bypass the web service authentication mechanisms and to access
back-end databases.
Which
of the following attacks is this?
- LDAP Injection Attack
- SOAP Injection Attack
- XPath Injection Attack
- Frame Injection Attack
137. Henderson
has completed the pen testing tasks. He is now compiling the final
report for the client. Henderson needs to include the result of
scanning that revealed a SQL injection vulnerability and different
SQL queries that he used to bypass web application authentication.
In
which section of the pen testing report, should Henderson include
this information in?
- Comprehensive technical report section
- Executive summary section
- General opinion section
- Methodology section
138. A
hacker initiates so many invalid requests to a cloud network host
that the host uses all its resources responding to the invalid
requests and ignores the legitimate requests.
Identify
the type of attack
- Denial of Service (DoS) attacks
- Authentication attacks.
- Man-in-the-middle cryptographic attacks
- Side Channel attacks.
26. Identify the attack from the description below:
I.
User A sends an ARP request to a switch
II.
The switch broadcasts the ARP request in the network
III.
An attacker eavesdrops on the ARP request and responds by spoofing as
a legitimate user
IV.
The attacker sends his MAC address to User A
- ARP poisoning
- MAC spoofing
- ARP injection
- ARP flooding
Thanks for the information ..keep posting like this
ReplyDeleteECSA Training in India
Hi, This is a great article. Loved your efforts on it buddy. Thanks for sharing this with us.
ReplyDeleteECSA Certification Training course
Hey,
ReplyDeleteIt's great post.
ECSA Training
Someone pass the exam thanks to this questions?
ReplyDeleteThe information which you have provided is very good. It is very useful who is looking for Game testing services
ReplyDeletenice
ReplyDeleteThis post will be very useful to us....i like your blog and helpful to me....nice thoughts for your great work....
ReplyDeletewireless network penetration testing and security auditing
Very nice and informative blog, i really come to know something unique and new. Hope you will provide more information to us, we also provide digital marketing service including all tasks like: SEO, SEM, PPC, SMO, SMM, E-mail marketing, Webdesign and development. If anyone in need, feel free to contact us:
ReplyDeleteDigital marketing Company in Delhi
SMM Services
PPC Services in Delhi
Website Design & Development Packages
SEO Services Packages
Local SEO services
E-mail marketing services
YouTube plans
Digital Marketing Service in Delhi
Very nice work, really appreciable. Good to know something new today, keep it up.
ReplyDelete1000 free youtube subscribers
SMM service
Very nice blog...... Hot Tot Hair Products seems to be very useful.... I would like to try them if i could buy them in Australia.... Nice work, keep it up.
ReplyDelete13485 certification
Securium Solutions is one of the best Cyber Security Company in Dubai. We provide the best Server Penetration Testing Services.
ReplyDeletehttps://ae.securiumsolutions.com/server-penetration-testing/
Well explained…great work…thank you so much for sharing such a valuable information. Looking for the best cloud penetration testing services in Hyderabad Contact Cyanous software solutions now.
ReplyDeleteBest cloud penetration testing services in Hyderabad
Best software & web development company in Hyderabad
Thank you so much for your wonderful information…great work keep going…Looking for the best network penetration testing services in Hyderabad in your budget contact Cyanous software solutions now.
ReplyDeleteBest network penetration testing services in Hyderabad
Best software & web development company in Hyderabad
playbazaar
ReplyDeleteplaybazaar good sites
ReplyDeleteAmazing content! I'm reading your complete blog really very impressive.
Find the best Mobile jammers in exams - All Universities have their own Virtual Private Networks; Signal jammers will be installed in exam halls across the country, Delhi Call at +91-9999332499, 9999332099.
I really love your post.
ReplyDeleteAdvanced Penetration Testing Certification Course
Ecsa Exam Preparation Questions >>>>> Download Now
ReplyDelete>>>>> Download Full
Ecsa Exam Preparation Questions >>>>> Download LINK
>>>>> Download Now
Ecsa Exam Preparation Questions >>>>> Download Full
>>>>> Download LINK AZ
Ecsa Exam Preparation Questions >>>>> Download Now
ReplyDelete>>>>> Download Full
Ecsa Exam Preparation Questions >>>>> Download LINK
>>>>> Download Now
Ecsa Exam Preparation Questions >>>>> Download Full
>>>>> Download LINK 3A
ReplyDeleteAREE said:
Wed, 05 May 2021 15:14:37 +0800
Most of the time I don’t make comments on websites, but I'd like to say that this article really forced me to do so. Really nice post6.External Penetration Testing
The post is written in very a good manner and it contains many useful information for me.External Network Penetration Testing
ReplyDeleteThis hacker side
ReplyDeletewas amazing and very informative . Thanks for sharing to this blog site post.