Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ECSAv10 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ECSAv10 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing
  • Last Update: Apr 29, 2024
  • Questions and Answers: 201
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ECSAv10 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ECSAv10 Practice Exam Questions with Answers EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing Certification

Question # 6

In which of the following firewalls are the incoming or outgoing packets blocked from accessing services for which there is no proxy?

A.

Circuit level firewalls

B.

Packet filters firewalls

C.

Stateful multilayer inspection firewalls

D.

Application level firewalls

Full Access
Question # 7

One of the steps in information gathering is to run searches on a company using complex keywords in Google.

ECSAv10 question answer

Which search keywords would you use in the Google search engine to find all the PowerPoint presentations containing information about a target company, ROCHESTON?

A.

ROCHESTON fileformat:+ppt

B.

ROCHESTON ppt:filestring

C.

ROCHESTON filetype:ppt

D.

ROCHESTON +ppt:filesearch

Full Access
Question # 8

Which among the following information is not furnished by the Rules of Engagement (ROE) document?

A.

Techniques for data collection from systems upon termination of the test

B.

Techniques for data exclusion from systems upon termination of the test

C.

Details on how data should be transmitted during and after the test

D.

Details on how organizational data is treated throughout and after the test

Full Access
Question # 9

Which of the following documents helps in creating a confidential relationship between the pen tester and client to protect critical and confidential information or trade secrets?

A.

Penetration Testing Agreement

B.

Rules of Behavior Agreement

C.

Liability Insurance

D.

Non-Disclosure Agreement

Full Access
Question # 10

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum.

Different types of Internet Control Message Protocols (ICMPs) are identified by a type and code field.

ECSAv10 question answer

Which of the following ICMP messages will be generated if the destination port is not reachable?

A.

ICMP Type 11 code 1

B.

ICMP Type 5 code 3

C.

ICMP Type 3 code 2

D.

ICMP Type 3 code 3

Full Access
Question # 11

Which of the following is developed to address security concerns on time and reduce the misuse or threat of attacks in an organization?

A.

Vulnerabilities checklists

B.

Configuration checklists

C.

Action Plan

D.

Testing Plan

Full Access
Question # 12

As a security analyst you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?

A.

The employees network usernames and passwords

B.

The MAC address of the employees' computers

C.

The IP address of the employees computers

D.

Bank account numbers and the corresponding routing numbers

Full Access
Question # 13

Identify the attack represented in the diagram below:

ECSAv10 question answer

A.

Input Validation

B.

Session Hijacking

C.

SQL Injection

D.

Denial-of-Service

Full Access
Question # 14

Why is a legal agreement important to have before launching a penetration test?

ECSAv10 question answer

A.

Guarantees your consultant fees

B.

Allows you to perform a penetration test without the knowledge and consent of the organization's upper management

C.

It establishes the legality of the penetration test by documenting the scope of the project and the consent of the company.

D.

It is important to ensure that the target organization has implemented mandatory security policies

Full Access
Question # 15

Many security and compliance projects begin with a simple idea: assess the organization's risk, vulnerabilities, and breaches. Implementing an IT security risk assessment is critical to the overall security posture of any organization.

An effective security risk assessment can prevent breaches and reduce the impact of realized breaches.

ECSAv10 question answer

What is the formula to calculate risk?

A.

Risk = Budget x Time

B.

Risk = Goodwill x Reputation

C.

Risk = Loss x Exposure factor

D.

Risk = Threats x Attacks

Full Access
Question # 16

Mason is footprinting an organization to gather competitive intelligence. He visits the company's website for contact information and telephone numbers but does not find any. He knows the entire staff directory was listed on their website 12 months. How can he find the directory?

A.

Visit Google’s search engine and view the cached copy

B.

Crawl and download the entire website using the Surfoffline tool and save them to his computer

C.

Visit the company's partners’ and customers' website for this information

D.

Use Way Back Machine in Archive.org web site to retrieve the Internet archive

Full Access
Question # 17

What does ICMP Type 3/Code 13 mean?

A.

Host Unreachable

B.

Port Unreachable

C.

Protocol Unreachable

D.

Administratively Blocked

Full Access
Question # 18

John, a penetration tester from a pen test firm, was asked to collect information about the host file in a Windows system directory. Which of the following is the location of the host file in Window system directory?

A.

C:\Windows\System32\Boot

B.

C:\WINNT\system32\drivers\etc

C.

C:\WINDOWS\system32\cmd.exe

D.

C:\Windows\System32\restore

Full Access
Question # 19

Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?

A.

Hash Key Length

B.

C/R Value Length

C.

C/R Key Length

D.

Hash Value Length

Full Access
Question # 20

Which of the following scan option is able to identify the SSL services?

A.

–sS

B.

–sV

C.

–sU

D.

–sT

Full Access
Question # 21

You work as an IT security auditor hired by a law firm in Boston. You have been assigned the responsibility to audit the client for security risks. When assessing the risk to the clients network, what step should you take first?

A.

Analyzing, categorizing and prioritizing resources

B.

Evaluating the existing perimeter and internal security

C.

Checking for a written security policy

D.

Analyzing the use of existing management and control architecture

Full Access
Question # 22

Which one of the following acts related to the information security in the US fix the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting?

A.

California SB 1386

B.

Sarbanes-Oxley 2002

C.

Gramm-Leach-Bliley Act (GLBA)

D.

USA Patriot Act 2001

Full Access
Question # 23

Which type of vulnerability assessment tool provides security to the IT system by testing for vulnerabilities in the applications and operation system?

A.

Active/Passive Tools

B.

Application-layer Vulnerability Assessment Tools

C.

Location/Data Examined Tools

D.

Scope Assessment Tools

Full Access
Question # 24

Wireless communication allows networks to extend to places that might otherwise go untouched by the wired networks. When most people say ‘Wireless’ these days, they are referring to one of the 802.11 standards. There are three main 802.11 standards: B, A, and G.

Which one of the following 802.11 types uses DSSS Modulation, splitting the 2.4ghz band into channels?

A.

802.11b

B.

802.11g

C.

802.11-Legacy

D.

802.11n

Full Access
Question # 25

A penetration test consists of three phases: pre-attack phase, attack phase, and post-attack phase.

ECSAv10 question answer

Active reconnaissance which includes activities such as network mapping, web profiling, and perimeter mapping is a part which phase(s)?

A.

Post-attack phase

B.

Pre-attack phase and attack phase

C.

Attack phase

D.

Pre-attack phase

Full Access
Question # 26

Which of the following policies states that the relevant application owner must authorize requests for additional access to specific business applications in writing to the IT Department/resource?

A.

Special-Access Policy

B.

User Identification and Password Policy

C.

Personal Computer Acceptable Use Policy

D.

User-Account Policy

Full Access
Question # 27

Identify the port numbers used by POP3 and POP3S protocols.

A.

113 and 981

B.

111 and 982

C.

110 and 995

D.

109 and 973

Full Access
Question # 28

A firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. It examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped.

ECSAv10 question answer

Why is an appliance-based firewall is more secure than those implemented on top of the commercial operating system (Software based)?

A.

Appliance based firewalls cannot be upgraded

B.

Firewalls implemented on a hardware firewall are highly scalable

C.

Hardware appliances does not suffer from security vulnerabilities associated with the underlying operating system

D.

Operating system firewalls are highly configured

Full Access
Question # 29

In the process of hacking a web application, attackers manipulate the HTTP requests to subvert the application authorization schemes by modifying input fields that relate to the user ID, username, access group, cost, file names, file identifiers, etc.

They first access the web application using a low privileged account and then escalate privileges to access protected resources. What attack has been carried out?

A.

XPath Injection Attack

B.

Authorization Attack

C.

Authentication Attack

D.

Frame Injection Attack

Full Access
Question # 30

War Driving is the act of moving around a specific area, mapping the population of wireless access points for statistical purposes. These statistics are then used to raise awareness of the security problems associated with these types of networks.

Which one of the following is a Linux based program that exploits the weak IV (Initialization Vector) problem documented with static WEP?

A.

Airsnort

B.

Aircrack

C.

WEPCrack

D.

Airpwn

Full Access