EC-COUNCIL EC-Council Certified Security Analyst (ECSA) 認定 412-79 試験問題:
1. The Web parameter tampering attack is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials and permissions, price and quantity of products, etc. Usually, this information is stored in cookies, hidden form fields, or URL Query Strings, and is used to increase application functionality and control.
This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag in a form or a parameter in a URL) as the only security measure for certain operations. Attackers can easily modify these parameters to bypass the security mechanisms that rely on them.
What is the best way to protect web applications from parameter tampering attacks?
A) Using an easily guessable hashing algorithm
B) Applying effective input field filtering parameters
C) Minimizing the allowable length of parameters
D) Validating some parameters of the web application
2. Which of the following will not handle routing protocols properly?
A) "Internet-firewall -net architecture"
B) "Internet-firewall/router(edge device)-net architecture"
C) "Internet-router-firewall-net architecture"
D) "Internet-firewall-router-net architecture"
3. Identify the injection attack represented in the diagram below:
A) XML Injection Attack
B) Frame Injection Attack
C) XPath Injection Attack
D) XML Request Attack
4. Why is a legal agreement important to have before launching a penetration test?
A) It establishes the legality of the penetration test by documenting the scope of the project and the consent of the company.
B) Guarantees your consultant fees
C) Allows you to perform a penetration test without the knowledge and consent of the organization's upper management
D) It is important to ensure that the target organization has implemented mandatory security policies
5. Vulnerability assessment is an examination of the ability of a system or application, including current security procedures and controls, to withstand assault. It recognizes, measures, and classifies security vulnerabilities in a computer system, network, and communication channels.
A vulnerability assessment is used to identify weaknesses that could be exploited and predict the effectiveness of additional security measures in protecting information resources from attack.
Which of the following vulnerability assessment technique is used to test the web server infrastructure for any misconfiguration and outdated content?
A) Host-based Assessment
B) Application Assessment
C) Passive Assessment
D) External Assessment
質問と回答:
質問 # 1 正解: B | 質問 # 2 正解: D | 質問 # 3 正解: A | 質問 # 4 正解: A | 質問 # 5 正解: B |