A pen tester has extracted a database name by using a blind SQL injection. Now he begins to test the table inside the database using the below query and finds the table:
http://juggyboy.com/page.aspx?id=1;
IF (LEN(SELECT TOP 1 NAME from sysobjects where xtype
'U')=3) WAITFOR DELAY '00:00:10'--
http://juggyboy.com/page.aspx?id=1;
IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),1,1)))=101) WAITFOR DELAY
'00:00:10'--
http://juggyboy.com/page.aspx?id=1;
IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),2,1)))=109) WAITFOR DELAY
'00:00:10'--
http://juggyboy.com/page.aspx?id=1;
IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),3,1)))=112) WAITFOR DELAY
'00:00:10'-
What is the table name?
A. EMP
B. ABC
C. QRT
D. CTS
正解:A
質問 2:
Nessus can test a server or a network for DoS vulnerabilities. Which one of the following script tries to kill a service?
A. ACT_KILL_HOST
B. ACT_ATTACK
C. ACT_DENIAL
D. ACT_FLOOD
正解:C
質問 3:
Which one of the following architectures has the drawback of internally considering the hosted services individually?
A. "Three-Homed Firewall" DMZ Architecture
B. Strong Screened-Subnet Architecture
C. Weak Screened Subnet Architecture
D. "Inside Versus Outside" Architecture
正解:A
質問 4:
In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?
A. UDP evasion technique
B. IPS evasion technique
C. IDS evasion technique
D. TTL evasion technique
正解:D
質問 5:
This is a group of people hired to give details of the vulnerabilities present in the system found after a penetration test. They are elite and extremely competent penetration testers and intrusion analysts. This team prepares a report on the vulnerabilities in the system, attack methods, and how to defend against them.

What is this team called?
A. Lion team
B. Blue team
C. Gorilla team
D. Tiger team
正解:D
質問 6:
During external penetration testing, which of the following techniques uses tools like Nmap to predict the sequence numbers generated by the targeted server and use this information to perform session hijacking techniques?
A. IPID State Number Prediction
B. IPID Sequence Number Prediction
C. TCP Sequence Number Prediction
D. TCP State Number Prediction
正解:C
Misaki -
Pass4Testさんの問題集412-79は最高でした。やっと合格できた!
こんな俺が1ヵ月の勉強のみで合格できたので
是非参考にして合格し就活や転職の成功の足しにしてくれ。
EC-COUNCILさん、本当に感謝してます!