Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ECSA101/ ECSA 101 Hyperspace Questions and Verified Answers| 100% Correct |Latest 2024/ 2025 Updates STUDY BUNDLE WITH COMPLETE SOLUTIONS)

Beoordeling
5.0
(1)
Verkocht
-
Pagina's
25
Cijfer
A+
Geüpload op
23-11-2024
Geschreven in
2024/2025

ECSA101/ ECSA 101 Hyperspace Questions and Verified Answers| 100% Correct |Latest 2024/ 2025 Updates STUDY BUNDLE WITH COMPLETE SOLUTIONS)

Instelling
Vak

Voorbeeld van de inhoud

ECSA101/ ECSA 101 Hyperspace Questions and
Verified Answers| 100% Correct |Latest 2024/
2025 Updates STUDY BUNDLE WITH COMPLETE
SOLUTIONS)

Your company's network just finished going through a SAS 70 audit. This audit
reported that
overall, your network is secure, but there are some areas that needs improvement.
The major area
was SNMP security. The audit company recommended turning off SNMP, but that is
not an option
since you have so many remote nodes to keep track of. What step could you take to
help secure
SNMP on your network?
A. Change the default community string names
B. Block all internal MAC address from using SNMP
C. Block access to UDP port 171
D. Block access to TCP port 171 - ANSWERA

At what layer of the OSI model do routers function on?
A. 3
B. 4
C. 5
D. 1 - ANSWERA

An "idle" system is also referred to as what?
A. Zombie
B. PC not being used
C. Bot
D. PC not connected to the Internet - ANSWERA

What operating system would respond to the following command?

C:\ nmap -sW <ip>

A. Mac OS X
B. Windows XP
C. Windows 95
D. FreeBSD - ANSWERD

Why are Linux/Unix based computers better to use than Windows computers for idle
scanning?
A. Windows computers will not respond to idle scans

,B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers are constantly talking - ANSWERD

How many bits is Source Port Number in TCP Header packet?
A. 48
B. 32
C. 64
D. 16 - ANSWERD

Why are Linux/Unix based computers better to use than Windows computers for idle
scanning?
A. Windows computers are constantly talking
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers will not respond to idle scans - ANSWERA

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly
terminated and wants
to hack into his former company's network. Since Simon remembers some of the
server names,
he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to
accomplish
here?
A. Enumerate all the users in the domain
B. Perform DNS poisoning
C. Send DOS commands to crash the DNS servers
D. Perform a zone transfer - ANSWERD

You are carrying out the last round of testing for your new website before it goes
live. The website
has many dynamic pages and connects to a SQL backend that accesses your product
inventory in
a database. You come across a web security site that recommends inputting the
following code
into a search field on web pages to check for vulnerabilities:
<script>alert("This is a test.")</script>
When you type this and click on search, you receive a pop-up window that says:
"This is a test."
What is the result of this test?
A. Your website is vulnerable to web bugs
B. Your website is vulnerable to CSS
C. Your website is not vulnerable
D. Your website is vulnerable to SQL injection - ANSWERB

After attending a CEH security seminar, you make a list of changes you would like to
perform on

, your network to increase its security. One of the first things you change is to switch
the
RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would
prevent
anonymous users from establishing a null session on the server. Using Userinfo tool
mentioned at the seminar, you succeed in establishing a null session with one of the
servers. Why is that?
A. RestrictAnonymous must be set to "2" for complete security
B. RestrictAnonymous must be set to "3" for complete security
C. There is no way to always prevent an anonymous null session from establishing
D. RestrictAnonymous must be set to "10" for complete security - ANSWERA

What will the following command accomplish?

C:\ nmap -v -sS -Po <ip> -data_length 6600 0-packet_trace

A. Test ability of a router to handle over-sized packets
B. Test the ability of a router to handle fragmented packets
C. Test the ability of a WLAN to handle fragmented packets
D. Test the ability of a router to handle under-sized packets - ANSWERA

What are the security risks of running a "repair" installation for Windows XP?
A. There are no security risks when running the "repair" installation for Windows XP
B. Pressing Shift+F1gives the user administrative rights
C. Pressing Ctrl+F10 gives the user administrative rights
D. Pressing Shift+F10 gives the user administrative rights - ANSWERD

You are the security analyst working for a private company out of France. Your
current assignment
is to obtain credit card information from a Swiss bank owned by that company. After
initial
reconnaissance, you discover that the bank security defenses are very strong and
would take too
long to penetrate. You decide to get the information by monitoring the traffic
between the bank and
one of its subsidiaries in London. After monitoring some of the traffic, you see a lot
of FTP packets
traveling back and forth. You want to sniff the traffic and extract usernames and
passwords. What
tool could you use to get this information?

A. RaidSniff
B. Snort
C. Ettercap
D. Airsnort - ANSWERC

Gekoppeld boek

Geschreven voor

Vak

Documentinformatie

Geüpload op
23 november 2024
Aantal pagina's
25
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
1 jaar geleden

5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
knoowy0010 Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5
Lid sinds
1 jaar
Aantal volgers
0
Documenten
1039
Laatst verkocht
1 week geleden

4.7

141 beoordelingen

5
112
4
14
3
12
2
3
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen