New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free ECSAv10 EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the ECCouncil ECSAv10 Exam the most current and reliable questions . To help people study, we've made some of our EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing exam materials available for free to everyone. You can take the Free ECSAv10 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

During the process of fingerprinting a web application environment, what do you need to do in order to analyze HTTP and HTTPS request headers and the HTML source code?

A.

Examine Source of the Available Pages

B.

Perform Web Spidering

C.

Perform Banner Grabbing

D.

Check the HTTP and HTML Processing by the Browser

Question # 7

One needs to run “Scan Server Configuration” tool to allow a remote connection to Nessus from the remote Nessus clients. This tool allows the port and bound interface of the Nessus daemon to be configured.

By default, the Nessus daemon listens to connections on which one of the following?

A.

Localhost (127.0.0.1) and port 1241

B.

Localhost (127.0.0.1) and port 1240

C.

Localhost (127.0.0.1) and port 1246

D.

Localhost (127.0.0.0) and port 1243

Question # 8

Many security and compliance projects begin with a simple idea: assess the organization's risk, vulnerabilities, and breaches. Implementing an IT security risk assessment is critical to the overall security posture of any organization.

An effective security risk assessment can prevent breaches and reduce the impact of realized breaches.

ECSAv10 question answer

What is the formula to calculate risk?

A.

Risk = Budget x Time

B.

Risk = Goodwill x Reputation

C.

Risk = Loss x Exposure factor

D.

Risk = Threats x Attacks

Question # 9

Which one of the following is a command line tool used for capturing data from the live network and copying those packets to a file?

A.

Wireshark: Capinfos

B.

Wireshark: Tcpdump

C.

Wireshark: Text2pcap

D.

Wireshark: Dumpcap

Question # 10

Which of the following policies states that the relevant application owner must authorize requests for additional access to specific business applications in writing to the IT Department/resource?

A.

Special-Access Policy

B.

User Identification and Password Policy

C.

Personal Computer Acceptable Use Policy

D.

User-Account Policy

Question # 11

A penetration test will show you the vulnerabilities in the target system and the risks associated with it. An educated valuation of the risk will be performed so that the vulnerabilities can be reported as High/Medium/Low risk issues.

ECSAv10 question answer

What are the two types of ‘white-box’ penetration testing?

A.

Announced testing and blind testing

B.

Blind testing and double blind testing

C.

Blind testing and unannounced testing

D.

Announced testing and unannounced testing

Question # 12

The term social engineering is used to describe the various tricks used to fool people (employees, business partners, or customers) into voluntarily giving away information that would not normally be known to the general public.

ECSAv10 question answer

What is the criminal practice of social engineering where an attacker uses the telephone system in an attempt to scam the user into surrendering private information?

A.

Phishing

B.

Spoofing

C.

Tapping

D.

Vishing

Question # 13

Which of the following are the default ports used by NetBIOS service?

A.

135, 136, 139, 445

B.

134, 135, 136, 137

C.

137, 138, 139, 140

D.

133, 134, 139, 142

Question # 14

Which one of the following acts related to the information security in the US fix the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting?

A.

California SB 1386

B.

Sarbanes-Oxley 2002

C.

Gramm-Leach-Bliley Act (GLBA)

D.

USA Patriot Act 2001

Question # 15

A framework is a fundamental structure used to support and resolve complex issues. The framework that delivers an efficient set of technologies in order to develop applications which are more secure in using Internet and Intranet is:

A.

Microsoft Internet Security Framework

B.

Information System Security Assessment Framework (ISSAF)

C.

Bell Labs Network Security Framework

D.

The IBM Security Framework

Question # 16

An attacker injects malicious query strings in user input fields to bypass web service authentication mechanisms and to access back-end databases. Which of the following attacks is this?

A.

Frame Injection Attack

B.

LDAP Injection Attack

C.

XPath Injection Attack

D.

SOAP Injection Attack

Question # 17

Which of the following methods is used to perform server discovery?

A.

Banner Grabbing

B.

Who is Lookup

C.

SQL Injection

D.

Session Hijacking

Question # 18

A firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. It examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped.

ECSAv10 question answer

Why is an appliance-based firewall is more secure than those implemented on top of the commercial operating system (Software based)?

A.

Appliance based firewalls cannot be upgraded

B.

Firewalls implemented on a hardware firewall are highly scalable

C.

Hardware appliances does not suffer from security vulnerabilities associated with the underlying operating system

D.

Operating system firewalls are highly configured

Question # 19

The Web parameter tampering attack is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials and permissions, price and quantity of products, etc.

Usually, this information is stored in cookies, hidden form fields, or URL Query Strings, and is used to increase application functionality and control. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag in a form or a parameter in a URL) as the only security measure for certain operations.

Attackers can easily modify these parameters to bypass the security mechanisms that rely on them.

ECSAv10 question answer

What is the best way to protect web applications from parameter tampering attacks?

A.

Validating some parameters of the web application

B.

Minimizing the allowable length of parameters

C.

Using an easily guessable hashing algorithm

D.

Applying effective input field filtering parameters

Question # 20

Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. 

He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

A.

CVE

B.

IANA

C.

RIPE

D.

APIPA

Question # 21

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search.

link:www.ghttech.net

What will this search produce?

A.

All sites that link to ghttech.net

B.

Sites that contain the code: link:www.ghttech.net

C.

All sites that ghttech.net links to

D.

All search engines that link to .net domains

Question # 22

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

A.

Smurf scan

B.

Tracert

C.

Ping trace

D.

ICMP ping sweep

Question # 23

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set.

What is Terri trying to accomplish by sending this IP packet?

A.

Poison the switch's MAC address table by flooding it with ACK bits

B.

Enable tunneling feature on the switch

C.

Trick the switch into thinking it already has a session with Terri's computer

D.

Crash the switch with a DoS attack since switches cannot send ACK bits

Question # 24

Which of the following approaches to vulnerability assessment relies on the administrator providing baseline of system configuration and then scanning continuously without incorporating any information found at the time of scanning?

ECSAv10 question answer

A.

Service-based Assessment Solutions

B.

Product-based Assessment Solutions

C.

Tree-based Assessment

D.

Inference-based Assessment

Question # 25

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the AXFR and IXFR commands using DIG.

What is Simon trying to accomplish here?

A.

Enumerate all the users in the domain

B.

Perform DNS poisoning

C.

Send DOS commands to crash the DNS servers

D.

Perform a zone transfer

Question # 26

Identify the person who will lead the penetration-testing project and be the client point of contact.

A.

Database Penetration Tester

B.

Policy Penetration Tester

C.

Chief Penetration Tester

D.

Application Penetration Tester

Question # 27

Which of the following defines the details of services to be provided for the client’s organization and the list of services required for performing the test in the organization?

A.

Draft

B.

Report

C.

Requirement list

D.

Quotation

Question # 28

Which of the following attributes has a LM and NTLMv1 value as 64bit + 64bit + 64bit and NTLMv2 value as 128 bits?

A.

Hash Key Length

B.

C/R Value Length

C.

C/R Key Length

D.

Hash Value Length

Question # 29

What is the difference between penetration testing and vulnerability testing?

ECSAv10 question answer

A.

Penetration testing goes one step further than vulnerability testing; while vulnerability tests check for known vulnerabilities, penetration testing adopts the concept of ‘in-depth ethical hacking’

B.

Penetration testing is based on purely online vulnerability analysis while vulnerability testing engages ethical hackers to find vulnerabilities

C.

Vulnerability testing is more expensive than penetration testing

D.

Penetration testing is conducted purely for meeting compliance standards while vulnerability testing is focused on online scans

Question # 30

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities:

<script>alert("This is a test.")</script>

When you type this and click on search, you receive a pop-up window that says:

"This is a test."

What is the result of this test?

A.

Your website is vulnerable to web bugs

B.

Your website is vulnerable to XSS

C.

Your website is not vulnerable

D.

Your website is vulnerable to SQL injection

Question # 31

Which of the following attacks does a hacker perform in order to obtain UDDI information such as businessEntity, businesService, bindingTemplate, and tModel?

A.

Web Services Footprinting Attack

B.

Service Level Configuration Attacks

C.

URL Tampering Attacks

D.

Inside Attacks

Question # 32

DMZ is a network designed to give the public access to the specific internal resources and you might want to do the same thing for guests visiting organizations without compromising the integrity of the internal resources. In general, attacks on the wireless networks fall into four basic categories.

Identify the attacks that fall under Passive attacks category.

A.

Wardriving

B.

Spoofing

C.

Sniffing

D.

Network Hijacking

Question # 33

DNS information records provide important data about:

A.

Phone and Fax Numbers

B.

Location and Type of Servers

C.

Agents Providing Service to Company Staff

D.

New Customer

Question # 34

Which of the following scan option is able to identify the SSL services?

A.

–sS

B.

–sV

C.

–sU

D.

–sT

Question # 35

The objective of this act was to protect consumers personal financial information held by financial institutions and their service providers.

A.

HIPAA

B.

Sarbanes-Oxley 2002

C.

Gramm-Leach-Bliley Act

D.

California SB 1386a

Question # 36

A pen tester has extracted a database name by using a blind SQL injection. Now he begins to test the table inside the database using the below query and finds the table:

http://juggyboy.com/page.aspx?id=1; IF (LEN(SELECT TOP 1 NAME from sysobjects where xtype='U')=3) WAITFOR DELAY '00:00:10'--

http://juggyboy.com/page.a spx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),1,1)))=101) WAITFOR DELAY '00:00:10'--

http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),2,1)))=109) WAITFOR DELAY '00:00:10'--

http://juggyboy.com/page.aspx?id=1; IF (ASCII(lower(substring((SELECT TOP 1 NAME from sysobjects where xtype=char(85)),3,1)))=112) WAITFOR DELAY '00:00:10'—

What is the table name?

A.

CTS

B.

QRT

C.

EMP

D.

ABC

Question # 37

What is a difference between host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS)?

ECSAv10 question answer

A.

NIDS are usually a more expensive solution to implement compared to HIDS.

B.

Attempts to install Trojans or backdoors cannot be monitored by a HIDS whereas NIDS can monitor and stop such intrusion events.

C.

NIDS are standalone hardware appliances that include network intrusion detection capabilities whereas HIDS consist of software agents installed on individual computers within the system.

D.

HIDS requires less administration and training compared to NIDS.

Question # 38

Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies.

A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces.

What could have prevented this information from being stolen from the laptops?

A.

SDW Encryption

B.

EFS Encryption

C.

DFS Encryption

D.

IPS Encryption

Question # 39

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT.

Which firewall would be most appropriate for Harold?

A.

Application-level proxy firewall

B.

Data link layer firewall

C.

Packet filtering firewall

D.

Circuit-level proxy firewall

Question # 40

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable.

What kind of results did Jim receive from his vulnerability analysis?

A.

True negatives

B.

False negatives

C.

False positives

D.

True positives

Question # 41

By default, the TFTP server listens on UDP port 69. Which of the following utility reports the port status of target TCP and UDP ports on a local or a remote computer and is used to troubleshoot TCP/IP connectivity issues?

A.

PortQry

B.

Netstat

C.

Telnet

D.

Tracert

Question # 42

Which of the following statement holds true for TCP Operation?

ECSAv10 question answer

A.

Port numbers are used to know which application the receiving host should pass the data to

B.

Sequence numbers are used to track the number of packets lost in transmission

C.

Flow control shows the trend of a transmitting host overflowing the buffers in the receiving host

D.

Data transfer begins even before the connection is established

Question # 43

Which of the following reports provides a summary of the complete pen testing process, its outcomes, and recommendations?

A.

Vulnerability Report

B.

Executive Report

C.

Client-side test Report

D.

Host Report

Question # 44

Besides the policy implications of chat rooms, Internet Relay Chat (IRC) is frequented by attackers and used as a command and control mechanism. IRC normally uses which one of the following TCP ports?

A.

6566 TCP port

B.

6771 TCP port

C.

6667 TCP port

D.

6257 TCP port

Question # 45

John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found.

What information will he be able to gather from this?

A.

The SID of Hillary's network account

B.

The network shares that Hillary has permissions

C.

The SAM file from Hillary's computer

D.

Hillary's network username and password hash

Question # 46

Why is a legal agreement important to have before launching a penetration test?

ECSAv10 question answer

A.

Guarantees your consultant fees

B.

Allows you to perform a penetration test without the knowledge and consent of the organization's upper management

C.

It establishes the legality of the penetration test by documenting the scope of the project and the consent of the company.

D.

It is important to ensure that the target organization has implemented mandatory security policies

Question # 47

HTTP protocol specifies that arbitrary binary characters can be passed within the URL by using %xx notation, where 'xx' is the

A.

ASCII value of the character

B.

Binary value of the character

C.

Decimal value of the character

D.

Hex value of the character

Question # 48

What is the maximum value of a “tinyint” field in most database systems?

A.

222

B.

224 or more

C.

240 or less

D.

225 or more

Question # 49

As a security analyst you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?

A.

The employees network usernames and passwords

B.

The MAC address of the employees' computers

C.

The IP address of the employees computers

D.

Bank account numbers and the corresponding routing numbers

Question # 50

Traffic on which port is unusual for both the TCP and UDP ports?

A.

Port 81

B.

Port 443

C.

Port 0

D.

Port 21

Question # 51

Timing is an element of port-scanning that can catch one unaware. If scans are taking too long to complete or obvious ports are missing from the scan, various time parameters may need to be adjusted.

Which one of the following scanned timing options in NMAP’s scan is useful across slow WAN links or to hide the scan?

A.

Paranoid

B.

Sneaky

C.

Polite

D.

Normal

Question # 52

Which of the following is not a characteristic of a firewall?

A.

Manages public access to private networked resources

B.

Routes packets between the networks

C.

Examines all traffic routed between the two networks to see if it meets certain criteria

D.

Filters only inbound traffic but not outbound traffic

Question # 53

After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the Restrict Anonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server.

Using User info tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

A.

Restrict Anonymous must be set to "2" for complete security

B.

Restrict Anonymous must be set to "3" for complete security

C.

There is no way to always prevent an anonymous null session from establishing

D.

Restrict Anonymous must be set to "10" for complete security

Question # 54

Transmission Control Protocol (TCP) is a connection-oriented four layer protocol. It is responsible for breaking messages into segments, re-assembling them at the destination station, and re-sending. Which one of the following protocols does not use the TCP?

A.

Reverse Address Resolution Protocol (RARP)

B.

HTTP (Hypertext Transfer Protocol)

C.

SMTP (Simple Mail Transfer Protocol)

D.

Telnet

Question # 55

Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.

A.

Unannounced Testing

B.

Double Blind Testing

C.

Announced Testing

D.

Blind Testing

Question # 56

Which of the following protocols cannot be used to filter VoIP traffic?

A.

Media Gateway Control Protocol (MGCP)

B.

Real-time Transport Control Protocol (RTCP)

C.

Session Description Protocol (SDP)

D.

Real-Time Publish Subscribe (RTPS)

Question # 57

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram.

Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs) are identified by a TYPE field.

If the destination is not reachable, which one of the following are generated?

A.

Type 8 ICMP codes

B.

Type 12 ICMP codes

C.

Type 3 ICMP codes

D.

Type 7 ICMP codes

Question # 58

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers.

What type of firewall must you implement to abide by this policy?

A.

Circuit-level proxy firewall

B.

Packet filtering firewall

C.

Application-level proxy firewall

D.

Statefull firewall

Question # 59

Which one of the following is a supporting tool for 802.11 (wireless) packet injections, it spoofs 802.11 packets to verify whether the access point is valid or not?

A.

Airsnort

B.

Aircrack

C.

Airpwn

D.

WEPCrack

Question # 60

A chipset is a group of integrated circuits that are designed to work together and are usually marketed as a single product.” It is generally the motherboard chips or the chips used on the expansion card.

Which one of the following is well supported in most wireless applications?

A.

Orinoco chipsets

B.

Prism II chipsets

C.

Atheros Chipset

D.

Cisco chipset

ECSAv10 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ECSAv10 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing
  • Last Update: Dec 14, 2025
  • Questions and Answers: 201
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ECSAv10 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included