Want to pass your EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing ECSAV10 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
Richard is working on a web app pen testing assignment for one of his clients. After preliminary
information, gathering and vulnerability scanning Richard runs the SQLMAP tool to extract the database
information.
Which of the following commands will give Richard an output as shown in the screenshot?
A. sqlmap –url http://quennhotel.com/about.aspx?name=1 –D queenhotel --tables
B. sqlmap –url http://quennhotel.com/about.aspx?name=1 –dbs
C. sqlmap –url http://quennhotel.com/about.aspx?name=1 –D queenhotel –T --columns
D. sqlmap –url http://quennhotel.com/about.aspx?name=1 –database queenhotel –tables
A team of cyber criminals in Germany has sent malware-based emails to workers of a fast-food center which is having multiple outlets spread geographically. When any of the employees click on the malicious email, it will give backdoor access to the point of sale (POS) systems located at various outlets. After gaining access to the POS systems, the criminals will be able to obtain credit card details of the fast-food center's customers. In the above scenario, identify the type of attack being performed on the fast-food center?
A. Phishing
B. Vishing
C. Tailgating
D. Dumpster diving
What is the objective of the following bash script?
A. It gives a list of IP addresses that have an FTP port open
B. It tries to connect to FTP port on a target machine C. It checks if a target host has the FTP port open and quits
D. It checks if an FTP port on a target machine is vulnerable to arracks